SecureData grows through managed security services

Size: px
Start display at page:

Download "SecureData grows through managed security services"

Transcription

1 SecureData grows through managed security services How has SecureData grown its managed services business? SecureData has invested heavily in training and recruiting skilled security professionals to provide 24-hour support to its customers SecureData adopts a pragmatic approach to security, offering a robust end-to-end strategy It differentiates itself by its ability to combine its own security solutions with those of its technology partners to create offerings that are tailored to its customers unique needs As businesses become more open to outsourcing some of their IT needs, channel partners have started to move away from relying solely on a volume-based product sales model to offering consultancy and managed services to capitalize on the opportunity. While this business model offers higher margins and provides a source of more predictable recurring revenue for partners, the transition requires a lot of investment and strategic changes to ongoing business processes. In the enterprise security market, SecureData stands out as a partner that has invested in this opportunity by transforming into a managed security service provider (MSSP). Investing in its people and technology SecureData was founded in 1992 and is based in the UK with a presence in Europe, Africa and the United States. It was initially a value-added reseller (VAR) of enterprise security products. In 2002, it made the decision to move into services, which it believed would evolve to become a significant part of the IT industry as a product-based approach could not solve all of a customer s problems. It started by building an approach that was primarily product-led, but began to wrap services around its offerings. It accepted early on that it could not build an effective services business without taking a short-term dip in profits. It began to gradually build a services business, one contract at a time. It grew its monthly customer contracts and also began to work with systems integrators, such as CAP Gemini, Atos and BT, which resell its specialist security services. This indirect approach accounts for approximately 25% of its business. Three years ago, SecureData decided to put services at the front of its business, with products providing the underlying platform. It has developed a successful service-led business model by developing its own services, which are layered over the technology of its vendor partners. Today, managed services account for 46% of its total revenue, with consultancy 26%, product revenue 16% and solutions support 12%. This is a major shift from previously being primarily product-revenue driven. The company has seen good growth since its inception, with a turnover of about US$41 million for financial year 2014, representing growth of 30% year on year. SecureData obtained the backing of investment firm August Equity in 2012, which has helped it expand geographically and also enabled it to make acquisitions.

2 To grow its managed services business, investments have been made in two key areas: people and backend technology. Of its 129 employees, 70% are security professionals, including 30 security architects and around 60 certified technical experts. Its technical experts are distributed across two Security Operations Centers (SOCs) located in the UK to provide 24/7 customer support. With 70% of its employees being security professionals, it has shown that it is focused on ensuring that customers security needs post-sales are well supported. Recruiting skilled security professionals is a major challenge for MSSPs, due to skill shortages and high costs in recruiting and retaining talent. The company made early investments in this area by developing its own training program from the ground up and delivering this through its academy system based in Eastern Europe. This has ensured that it has a steady pool of security professionals to tap into. Taking ownership of the training program and not relying on third-partyprovided training has helped it overcome a key barrier, and maintain a high standard of skilled staff trained to support its internal security strategy. But it has also effectively used acquisitions to expand its skill sets. The purchase of SensePost in 2013, a South African company focused on security consultancy and delivering training programs to IT managers, enabled SecureData to expand its technical expertise. The transition from a VAR to an MSSP was not easy, as its sales team was only proficient in selling products. Selling services requires more customization according to individual customers needs. It is difficult to get sales people used to selling product licenses to sell services on a monthly basis. SecureData offered its own structured two-year training program in its academy to equip its sales team with the necessary skills. To incentivize its team, the commission reward for closing a services deal is three times more than for a product sale. Each sales person is focused on driving either direct or indirect sales. The direct sales team meets regularly with prospective large enterprise customers and engages them through targeted messaging campaigns on social media around its solutions and industry trends through its blog and white papers. The indirect team actively reaches out to large service providers and systems integrators to raise awareness about the services it can provide. Most of the sales will be done

3 by its partners sales team. This has allowed the company to focus on delivering its services, as the systems integrators account managers tend to do their own internal referrals for specialist MSSPs across accounts. In terms of technology, SecureData has been actively growing its ecosystem with key security vendors. It has 17 technology partners to date, including security vendors such as Cisco, Juniper Networks, Check Point, Arbor Networks and LogRhythm. SecureData has also invested in growing its own solutions, particularly in big data analytics, which it has identified as an opportunity for growth. It recently acquired a 25% stake in Paterva, a South African analytics software company. SecureData will be able to deploy and integrate the big data analytics software, Maltego, into its solutions, which will further strengthen its SIEM offering. This presents it with a strong differentiator by cutting through a lot of the logging reports produced by solutions such as Splunk and provide its customers with relevant information on key network incidents. SecureData s key differentiator over other MSSPs is its ability to combine its own security solutions with those of its technology partners to create offerings that are tailored to its customers needs. But it will still take some time for it to be able to fully integrate its solutions. A comprehensive security strategy is needed Security threats have become more advanced and traditional signature solutions alone are no longer sufficient to defend against attacks. A comprehensive security solution includes a combination of traditional signature solutions complemented with advanced security capabilities and a highly skilled team equipped to identify and mitigate such attacks. But many companies inhouse IT security teams have limited resources and are often overwhelmed by the large inflow of data to investigate. This has resulted in huge financial losses for businesses as attacks slip through undetected. Many have considered outsourcing their security infrastructure to third parties able to offer dedicated 24-hour support and better equipped to handle such attacks to complement their existing security teams.

4 SecureData has been able to differentiate itself through its end-to-end security solutions. It understands the need for a comprehensive security strategy and has based its solutions around its core security strategy, Access, Detect, Protect and Respond (see Canalys report, Access, detect, protect and respond, published 16 December 2013). As part of this strategy, there are over 17 networking and security services, from switching and routers to data loss prevention (DLP) and firewalls, which can be customized to suit a customer s requirements. These services can be delivered as managed services or as on-demand cloud services. Managed services can be delivered either as on-site services or through its data centers located in the UK. Its managed services range from firewalls and web content security to switches/routers and Chief Information Security Officer (CISO)-as-a-service, in which a senior security consultant will be on-site on designated days every month to provide support to the customer. These services can be further customized according to customers needs by providing additional functionalities, such as data-loss prevention or distributed denial of service. Cloud services are deployed as a hosted service to its customers. These include Internet Gateway, which uses the private IP VPN provided by BT to simplify and secure network traffic. Other services include phishing-as-a-service, vulnerability assessments, SIEM, global load balancing and intelligence-as-a-service. This is a threat intelligence platform using the big data analytics software of Maltego, Skybox and LogRhythm, complemented by SecureData s own monitoring platform. The offering aims to create more meaningful reports and event alerts by cutting through the volumes of events data collected from monitoring and logging systems. Driving greater growth Canalys expects managed services, particularly security, will continue to be a key driver of growth in the channel over the next few years. SecureData has a comprehensive security solution to address this opportunity. In light of the NSA revelations, businesses and governments are increasingly conscious about where their data will be stored when deciding to outsource security infrastructure to a third party. This will be an important consideration for many due to the nature of security and the sensitive data it entails. With all three of its data centers located in the UK, SecureData has a stronger value proposition in selling to the European market as compared with other MSSPs that do not have a dedicated data center in the region. But it must have additional data centers in key markets such as Germany, either its own or through its partners. SecureData will also need to demonstrate that it is able to provide the necessary support as it takes on more customers and fulfill its service level agreements (SLAs). Growth will, however, depend on the UK economy as the UK market accounts for more than half of its total revenue. It will need to scale its business model to expand further. SecureData will also face greater competition as it has to compete against larger channel partners and vendors, such as AT&T, NTT Communications and Fujitsu, which have ventured into managed security

5 services and are financially strong. The competition will intensify as many of its existing technology partners, such as Websense and Check Point, have been developing their own managed services offerings. These vendors would be less motivated to direct customers to SecureData. It will need to handle its relationships with these vendors carefully and consider partnering with local MSSPs or security consultancy firms to leverage their expertise of local markets and provide on-the-ground support to its customers in a country. With the flurry of M&A activity in the security market in recent years, SecureData may become a possible acquisition target by systems integrators and service providers, including its indirect partners, that wish to acquire a specialist vendor to better support their customers security needs. Published in: IT Security Analysis EMEA (ISAE), IT Security Analysis Worldwide (ISAW) To change which s you receive please go to the Canalys client web site and manage your profile. Canalys has a liberal policy with regard to the re-use of information that it provides to its clients, whether within reports, databases, presentations, s or any other format. A client may circulate Canalys information to colleagues within his or her organization worldwide, including wholly-owned subsidiaries, but not to a third party. For the avoidance of doubt, sharing of information is not permitted with organizations that are associated with the client by a joint venture, investment or common shareholding. If you wish to share information with the press or use any information in a public forum then you must receive prior explicit written approval from Canalys. Copyright Canalys All rights reserved. Americas: Suite 316, 855 El Camino Real, Palo Alto, CA 94301, US tel: APAC: Room F/G, 7/F, Jinjiang Xiangyang Tower, 993 Nanjing West Road, Jing An District, Shanghai, tel: APAC: 1 Robinson Road, AIA Tower, #14-02, Singapore, tel: EMEA: Diddenham Court, Lambwood Hill, Grazeley, Reading RG7 1JQ, UK tel: inquiry@canalys.com web:

Worldwide enterprise IT security

Worldwide enterprise IT security Worldwide enterprise IT security Market overview Q1 2013 Slow start to the year as investment declines End-user value ($ million) 6,000 5,000 Security management Network security Content security Worldwide

More information

The shi'ing reseller landscape: responding to new channel dynamics

The shi'ing reseller landscape: responding to new channel dynamics The shi'ing reseller landscape: responding to new channel dynamics Alastair Edwards Chief Analyst, Canalys Two ques:ons? For vendors: For distributors: How is the number of your ac:ve channel partners

More information

SecureData: A Fast-Growing, U.K.-Headquartered Security Services Vendor

SecureData: A Fast-Growing, U.K.-Headquartered Security Services Vendor VENDOR PROFILE SecureData: A Fast-Growing, U.K.-Headquartered Security Services Vendor Juan Sacchi IDC OPINION SecureData is a growing managed security services provider headquartered in the U.K. with

More information

Professional and Managed Services

Professional and Managed Services SUPPORT SERVICES Professional and Managed Services Exclusive Networks offers an extensive professional and managed services portfolio, which enables our business partners to successfully expand their product

More information

Proof of Concept service. Professional and Managed Services. Installation services. First Looks

Proof of Concept service. Professional and Managed Services. Installation services. First Looks SUPPORT SERVICES Professional and Managed Services Exclusive Networks offers an extensive professional and managed services portfolio, which enables our business partners to successfully expand their product

More information

Managed Security Service Providers vs. SIEM Product Solutions

Managed Security Service Providers vs. SIEM Product Solutions White Paper The Business Case for Managed Security Services Managed Security Service Providers vs. SIEM Product Solutions www.solutionary.com (866) 333-2133 The Business Case for Managed Security Services

More information

With Cloud Defender, Alert Logic combines products to deliver outcome-based security

With Cloud Defender, Alert Logic combines products to deliver outcome-based security With Cloud Defender, Alert Logic combines products to deliver outcome-based security Analyst: Javvad Malik 13 Nov, 2014 Security has typically been a technology-driven area. If a company puts up a website,

More information

2012 North American Managed Security Service Providers Growth Leadership Award

2012 North American Managed Security Service Providers Growth Leadership Award 2011 South African Data Centre Green Excellence Award in Technology Innovation Cybernest 2012 2012 North American Managed Security Service Providers Growth Leadership Award 2011 Frost & Sullivan 1 We Accelerate

More information

A COMPLETE APPROACH TO SECURITY

A COMPLETE APPROACH TO SECURITY A COMPLETE APPROACH TO SECURITY HOW TO ACHEIVE AGILE SECURITY OPERATIONS THREAT WATCH Cyber threats cost the UK economy 27 billion a year 200,000 new threats are identified every day 58% of businesses

More information

EXPERTISE AN INNOVATIVE PROGRAMME ENABLING YOU TO LEVERAGE BT S CISCO RELATIONSHIP AND TO STIMULATE REVENUE

EXPERTISE AN INNOVATIVE PROGRAMME ENABLING YOU TO LEVERAGE BT S CISCO RELATIONSHIP AND TO STIMULATE REVENUE 1 WE MAKE IT POSSIBLE AN INNOVATIVE PROGRAMME ENABLING YOU TO LEVERAGE BT S CISCO RELATIONSHIP AND EXPERTISE TO STIMULATE REVENUE Join with BT Wholesale and Cisco to go Beyond Connectivity with the BTW

More information

How To Make Money On Security For A Large Organization

How To Make Money On Security For A Large Organization SecureOps Cost-optimized Operational Information Security for Large Organizations Operational Information Security SecureOps is a pure-play security outsourcer that near-shores operational information

More information

Managed Security Services

Managed Security Services NEAT EVALUATION FOR UNISYS: Managed Security Services Market Segment: Overall This document presents Unisys with the NelsonHall NEAT vendor evaluation for Managed Security Services (MSS) for the Overall

More information

SAP Solutions for Small Businesses and Midsize Companies. Press Fact Sheet March 2008

SAP Solutions for Small Businesses and Midsize Companies. Press Fact Sheet March 2008 SAP Solutions for Small Businesses and Midsize Companies Press Fact Sheet March 2008 Small businesses and midsize companies (SME) are facing greater competition than ever across diverse industries. With

More information

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS Gaining the SITUATIONAL AWARENESS needed to MITIGATE CYBERTHREATS Industry Perspective EXECUTIVE SUMMARY To become more resilient against cyberthreats, agencies must improve visibility and understand events

More information

Comstor Security Initiative. Comstor Security Initiative

Comstor Security Initiative. Comstor Security Initiative Comstor Comstor Work in partnership with Comstor and Cisco to unlock the potential of Cyber security Cyber security is projected to be a $170 billion market by 2020. There are 10 billion connected sensors

More information

Performanta Pty Ltd. Company Profile. May 2012. Trust. Practical. Performanta.

Performanta Pty Ltd. Company Profile. May 2012. Trust. Practical. Performanta. May 2012 Trust. Practical. Performanta. Company Overview Performanta Pty Ltd is an information security organisation that has a practical approach, competitively priced services, strong client commitment,

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

4net Technologies. Managed Services and Cloud Solutions

4net Technologies. Managed Services and Cloud Solutions 4net Technologies Managed Services and Cloud Solutions Managed Services and Cloud Solutions Managed Services and Cloud Solutions are an opportunity for organisations to bring control to complexity by managing

More information

ADVANCING SECURITY, TOGETHER ADVANCING. THRIVE IN THE FAST- GROWTH SECURITY MARKET Security Focused Easier Achievements Faster Rewards

ADVANCING SECURITY, TOGETHER ADVANCING. THRIVE IN THE FAST- GROWTH SECURITY MARKET Security Focused Easier Achievements Faster Rewards SYMANTEC SECURE ONE GUIDE DECEMBER 2 0 1 5 ADVANCING SECURITY, TOGETHER ADVANCING THRIVE IN THE FAST- GROWTH SECURITY MARKET Security Focused Easier Achievements Faster Rewards Symantec Secure One Guide

More information

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary

More information

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average

More information

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Introduction There are numerous statistics published by security vendors, Government

More information

W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s

W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s IDC Middle East, Africa, and Turkey, Al Thuraya Tower 1, Level 15, Dubai

More information

Customer Benefits Through Automation with SDN and NFV

Customer Benefits Through Automation with SDN and NFV Customer Benefits Through Automation with SDN and NFV Helping service providers solve specific challenges they are facing today while improving the overall customer service life cycle 1 Table of Contents

More information

How To Protect Your It Infrastructure

How To Protect Your It Infrastructure Proactive Real-Time Monitoring and Risk Management Managed Security Services NCS Group Offices Australia Bahrain Brunei China Dubai Hong Kong SAR Korea Malaysia Philippines Singapore Sri Lanka Understanding

More information

REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION

REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION The modern data centre has ever-increasing demands for throughput and performance, and the security infrastructure required to protect and segment the network

More information

COMBATING CYBER THREATS: A HOW TO FOR THE CISO.

COMBATING CYBER THREATS: A HOW TO FOR THE CISO. www.wipro.com COMBATING CYBER THREATS: A HOW TO FOR THE CISO. Gopinathan. K, Practice Head - Managed Security and Network Services, Global Infrastructure Services (GIS), Wipro Infotech Contents 02 -------------------------------------

More information

SIEM AND THE ART OF LOG MANAGEMENT. 2015 Trustwave Holdings, Inc.

SIEM AND THE ART OF LOG MANAGEMENT. 2015 Trustwave Holdings, Inc. SIEM AND THE ART OF LOG MANAGEMENT PRESENTERS Jeff Pold Director, Security Information Services, SpiderLabs Research 11 years on SIS Intellitactics: 2004-2010 Trustwave: 2010-current Ron Pettit SR. Security

More information

Juniper Solutions for Turnkey, Managed Cloud Services

Juniper Solutions for Turnkey, Managed Cloud Services Juniper Solutions for Turnkey, Managed Cloud Services Three use cases for hosting and colocation service providers looking to deliver massively scalable, highly differentiated cloud services. Challenge

More information

Secure Your Success. Intel Security Partner Program

Secure Your Success. Intel Security Partner Program Secure Your Success Intel Security Partner Program Today s digital security threats are more sophisticated and complex than ever. At the same time, computing advancements are opening up new possibilities

More information

Requirements When Considering a Next- Generation Firewall

Requirements When Considering a Next- Generation Firewall White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration

More information

Partnering with. all about Growth

Partnering with. all about Growth Partnering with Alcatel-Lucent Enterprise all about Growth Alcatel-Lucent, a powerful brand your Enterprise customers trust Alcatel-Lucent is a world leader in communications and networking solutions for

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions Managed Security Managed Security MANAGED SECURITY SOLUTIONS I would highly recommend for your company s network review... were by far the best company IT Manager, Credit Management Agency Presenting IT

More information

Caretower s SIEM Managed Security Services

Caretower s SIEM Managed Security Services Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During

More information

How To Buy Nitro Security

How To Buy Nitro Security McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security

More information

SIP Trunking: The New Normal in the Cloud Era

SIP Trunking: The New Normal in the Cloud Era SIP Trunking: The New Normal in the Cloud Era Executive Summary As IP and VoIP technologies continue to mature and the thirst for cloud services escalates, the SIP Trunking market is growing rapidly, driven

More information

Operations Excellence in Professional Services Firms

Operations Excellence in Professional Services Firms Operations Excellence in Professional Services Firms Published by KENNEDY KENNEDY Consulting Research Consulting Research & Advisory & Advisory Sponsored by Table of Contents Introduction... 3 Market Challenges

More information

The Case for Managed Security Services for Log Monitoring and Management

The Case for Managed Security Services for Log Monitoring and Management White Paper The Case for Managed Security Services for Log Monitoring and Management www.solutionary.com (866) 333-2133 The Case for Managed Security Services for Log Monitoring and Management Contents

More information

Arrow ECS Training Services. Technology training. for the real world

Arrow ECS Training Services. Technology training. for the real world Arrow ECS Training Services Technology training for the real world Arrow ECS Training Services aims to ensure that our end user customers gain maximum return on their technology investments and that our

More information

WHITE PAPER. IT in the Cloud: Using VMware vcloud for Reliable, Flexible, Shared IT Resources

WHITE PAPER. IT in the Cloud: Using VMware vcloud for Reliable, Flexible, Shared IT Resources WHITE PAPER IT in the Cloud: Using VMware vcloud for Reliable, Flexible, Shared IT Resources Table of Contents IT in the Cloud: Using VMware vcloud for Reliable, Flexible, Shared IT Resources... 3 Cloud

More information

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security 1 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

More information

FireEye Fuel Partner Program

FireEye Fuel Partner Program FireEye Fuel Partner Program Welcome FireEye has pioneered the next generation threat protection platform to help organizations protect themselves from being compromised. The FireEye platform creates

More information

IT Security Strategy and Priorities. Stefan Lager CTO Services stefan.lager@addpro.se

IT Security Strategy and Priorities. Stefan Lager CTO Services stefan.lager@addpro.se IT Security Strategy and Priorities Stefan Lager CTO Services stefan.lager@addpro.se Cyberthreat update Why would anyone want to hack me? I am not a bank! Security Incidents with Confirmed Data Loss Source:

More information

The Information Security Specialists

The Information Security Specialists The Information Security Specialists The IPSec information shield safeguarding business success. IPSec are specialists in information asset security; technology experts who know how to mitigate risk to

More information

Tata Communications Security Outsourcing. A Must-have for Entry into the Global Economy. www.tatacommunications.com. www.tatacommunications.

Tata Communications Security Outsourcing. A Must-have for Entry into the Global Economy. www.tatacommunications.com. www.tatacommunications. Tata Communications Security Outsourcing A Must-have for Entry into the Global Economy www.tatacommunications.com www.tatacommunications.com 2 Tata Communications Security Outsourcing A Must-have for Entry

More information

SIEM 2.0: AN IANS INTERACTIVE PHONE CONFERENCE INTEGRATING FIVE KEY REQUIREMENTS MISSING IN 1ST GEN SOLUTIONS SUMMARY OF FINDINGS

SIEM 2.0: AN IANS INTERACTIVE PHONE CONFERENCE INTEGRATING FIVE KEY REQUIREMENTS MISSING IN 1ST GEN SOLUTIONS SUMMARY OF FINDINGS SIEM 2.0: INTEGRATING FIVE KEY REQUIREMENTS MISSING IN 1ST GEN SOLUTIONS AN IANS INTERACTIVE PHONE CONFERENCE SUMMARY OF FINDINGS OCTOBER 2009 Chris Peterson, LogRhythm CTO, Founder Chris brings a unique

More information

Converged Private Networks. Supporting voice and business-critical applications across multiple sites

Converged Private Networks. Supporting voice and business-critical applications across multiple sites Converged Private Networks Supporting voice and business-critical applications across multiple sites Harness converged voice and high-speed data connectivity MPLS-based WAN solution that supports voice

More information

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer IBM Security QRadar SIEM & Fortinet / FortiAnalyzer Introducing new functionality for IBM QRadar Security Intelligence Platform: integration with Fortinet s firewalls and logs forwarded by FortiAnalyzer.

More information

How To Protect Your Network From Attack From A Network Security Threat

How To Protect Your Network From Attack From A Network Security Threat Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your

More information

Network Security Monitoring: Looking Beyond the Network

Network Security Monitoring: Looking Beyond the Network 1 Network Security Monitoring: Looking Beyond the Network Ian R. J. Burke: GCIH, GCFA, EC/SA, CEH, LPT iburke@headwallsecurity.com iburke@middlebury.edu February 8, 2011 2 Abstract Network security monitoring

More information

Security and Services

Security and Services Written by Maxine Holt, May 2005 TA000824SAS Technology Infrastructure Butler Group Subscription Services Security and Services TECHNOLOGY AUDIT Symantec Corporation Managed Security Service (MSS) Abstract

More information

Brochure More information from http://www.researchandmarkets.com/reports/3493712/

Brochure More information from http://www.researchandmarkets.com/reports/3493712/ Brochure More information from http://www.researchandmarkets.com/reports/3493712/ Security Analytics Market by Application (Network Security, Application Security, Data and Information Security, Endpoint

More information

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion

More information

The Power of Partnership

The Power of Partnership The Power of Partnership Welcome Market Leading Virtualization and Cloud Computing Solutions, Award-Winning Programs, Unparalleled Value By joining the VMware Partner Network (VPN), our comprehensive partner

More information

Recruitment Process Outsourcing Methodology Statement

Recruitment Process Outsourcing Methodology Statement Recruitment Process Outsourcing Methodology Statement Contents An Overview... 3 Steps To Success The Components of an Outsourced Recruitment Process... 4 Why Use RPO?... 6 Why Consult Group?... 8 About

More information

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

More information

HR SOLUTIONS RECRUITING FOR A NEW AGE

HR SOLUTIONS RECRUITING FOR A NEW AGE HR SOLUTIONS RECRUITING FOR A NEW AGE Successful businesses never stop evolving Staying ahead of the competition means your business never stops evolving and innovating. The approach to recruitment should

More information

The Power of Partnership

The Power of Partnership The Power of Partnership Welcome Market Leading Virtualization and Cloud Computing Solutions, Award-Winning Programs, Unparalleled Value By joining the VMware Partner Network (VPN), our comprehensive partner

More information

Opportunities for Optimism? A New Vision for Value in Asset Management

Opportunities for Optimism? A New Vision for Value in Asset Management Opportunities for Optimism? A New Vision for Value in Asset Management Featuring the findings of the 2015 State Street Asset Manager Survey Opportunities for Optimism? A New Vision for Value in Asset Management

More information

COMPANY PROFILE. Expert Advice. Experience Advantage. Proactive Security Solutions Through Cutting-Edge Research. www.pandoralabs.

COMPANY PROFILE. Expert Advice. Experience Advantage. Proactive Security Solutions Through Cutting-Edge Research. www.pandoralabs. A Security-as-a-Service Company. We Make IT Secure. COMPANY PROFILE Expert Advice. Experience Advantage. Proactive Security Solutions Through Cutting-Edge Research. Table of Contents PANDORA SECURITY LABS...

More information

Akamai for Software as a Service (SaaS)

Akamai for Software as a Service (SaaS) Do your customers suffer from application performance and availability problems due to WAN related issues outside of your data-center? Trust Akamai to boost the satisfaction of your global customers while

More information

2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY

2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY 2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY 1 EXECUTIVE SUMMARY INTRODUCING THE 2015 GLOBAL THREAT INTELLIGENCE REPORT Over the last several years, there has been significant security industry

More information

Remote Management Services Portfolio Overview

Remote Management Services Portfolio Overview Enterprise environments today have various technologies and concerns in their network environment; from telephony, Internet, video, compute, and infrastructure, to regulatory and security management. On

More information

FULL SPEED AHEAD THE IXIA CHANNEL XCELERATE PROGRAM LATIN AMERICA

FULL SPEED AHEAD THE IXIA CHANNEL XCELERATE PROGRAM LATIN AMERICA FULL SPEED AHEAD THE IIA CHANNEL CELERATE PROGRAM LATIN AMERICA 1998-2016 Ixia All Rights Reserved. Be Part of the Momentum... Nothing beats playing on a winning team. Joining Ixia s Channel celerate Partner

More information

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service Business Case Outsourcing Information Security: The Benefits of a Managed Security Service seccuris.com (866) 644-8442 Contents Introduction... 3 Full- Time Experts vs. a Part- Time In- House Staff...

More information

Why Redknee s Pre-Integrated Real-Time Billing and Customer Care Solution is the Right Choice for CSPs

Why Redknee s Pre-Integrated Real-Time Billing and Customer Care Solution is the Right Choice for CSPs Why Redknee s Pre-Integrated Real-Time Billing and Customer Care Solution is the Right Choice for CSPs > > Summary In an increasingly saturated and competitive market, telecom operators face huge challenges

More information

CYBER SECURITY SERVICES PWNED

CYBER SECURITY SERVICES PWNED CYBER SECURITY SERVICES PWNED Jens Thonke Capital Market Day 16 Sept 2015 1 AGENDA Cyber Security Services in brief Market overview and key trends Offering and channels Competition Enabling growth Performance

More information

The Short-Term Insurance Industry: Organising by Common Capability

The Short-Term Insurance Industry: Organising by Common Capability The Short-Term Insurance Industry: Organising by Common Capability How and why short-term insurance organisations are consolidating common capabilities Contents Introduction 3 Legacy Organisational Structures

More information

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4

More information

The State of Big Data Infrastructure: Benchmarking global Big Data users to drive future performance

The State of Big Data Infrastructure: Benchmarking global Big Data users to drive future performance The State of Big Data Infrastructure: Benchmarking global Big Data users to drive future performance April 2015 Contents Key findings 3 Big Data projects have arrived 4 Level of adoption 4 Complexity of

More information

TIBCO Partner Network Program Guide

TIBCO Partner Network Program Guide TIBCO Partner Network Program Guide Partners are an important part of TIBCO s business model. Partnering with innovative providers in their areas of expertise provides outstanding value and a broader range

More information

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations

More information

Keeping up with the KPIs 10 steps to help identify and monitor key performance indicators for your business

Keeping up with the KPIs 10 steps to help identify and monitor key performance indicators for your business Keeping up with the KPIs 10 steps to help identify and monitor key performance indicators for your business KNOW YOUR KPI A key performance indicator (KPI) is a performance measure (metric) designed to

More information

Network Consulting Engineer

Network Consulting Engineer Brochure Network Consulting Engineer February, 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 7 The Cisco Support Center in Krakow To understand

More information

IBM Security QRadar Risk Manager

IBM Security QRadar Risk Manager IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Collect network security device configuration data to

More information

Banking on Business Intelligence (BI)

Banking on Business Intelligence (BI) Banking on Business Intelligence (BI) Building a business case for the Kenyan Banking Sector The new banking environment in Kenya is all about differentiating banking products, increased choices, security

More information

How Is Your Role Impacted by the Cloud Now, and in the Future?

How Is Your Role Impacted by the Cloud Now, and in the Future? SOLUTION WHITE PAPER How Is Your Role Impacted by the Cloud Now, and in the Future? Ian Moyse, Sales Director Workbooks.com, Eurocloud UK Board Member and Cloud Industry Forum Governance Board Member Cloud

More information

GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY

GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY Executive Summary ii Caption: Attacks b % of events 6% 8% 2% 10% 12% 4% THE CHANGING NATURE OF SECURITY Digital businesses are difficult to launch and

More information

Braindumps.700-295.50.QA

Braindumps.700-295.50.QA Braindumps.700-295.50.QA Number: 700-295 Passing Score: 800 Time Limit: 120 min File Version: 6.0 http://www.gratisexam.com/ Comprehensive, easy and to the point study material made it possible for me

More information

Odin. SMB Cloud InsightsTM UNITED STATES

Odin. SMB Cloud InsightsTM UNITED STATES Odin 2015 SMB Cloud InsightsTM UNITED STATES DEFINITIONS SMBs Defined We define SMBs also known as small and medium enterprises (SMEs) as companies with one to 999 employees. There are around 7 million

More information

DDoS Prevention Appliances

DDoS Prevention Appliances IHS INFONETICS RESEARCH REPORT EXCERPTS DDoS Prevention Appliances Biannual Worldwide and Regional Market Share and Forecasts: 1st Edition Excerpts June 2015 By Research Director Jeff Wilson 695 C ampbell

More information

Emerging Trends in the Network Security Market in India, CY 2013

Emerging Trends in the Network Security Market in India, CY 2013 Emerging Trends in the Network Security Market in India, CY 2013 Advanced Threat Landscape will Give Rise to Increased Network Security Spending 9AC3-74 July 2014 Contents Section Slide Numbers Executive

More information

Ovum Decision Matrix: Selecting a Global Telco Managed Security Services Provider

Ovum Decision Matrix: Selecting a Global Telco Managed Security Services Provider Ovum Decision Matrix: Selecting a Global Telco Managed Security Services Provider Moving from network-centric security to the broader IT security suite Reference Code: TE007-000800 Publication Date: 17

More information

www.tatacommunications.com

www.tatacommunications.com Case Study Hosted Application Provider Outsourced data center solution from Tata Communications and TCS ensures superior end-user experience and improves business focus www.tatacommunications.com Customer

More information

BlackStratus for Managed Service Providers

BlackStratus for Managed Service Providers BLACKSTRATUS FOR MSP SOLUTION GUIDE PAGE TM BlackStratus for Managed Service Providers With BlackStratus MSP suite of solutions, you can quickly and effectively ramp up customer security offerings and

More information

Cloud Security Trust Cisco to Protect Your Data

Cloud Security Trust Cisco to Protect Your Data Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive

More information

A Blueprint to the Future of Managed Services Direction of Managed Services with Cloud Initiatives

A Blueprint to the Future of Managed Services Direction of Managed Services with Cloud Initiatives A Blueprint to the Future of Managed Services Direction of Managed Services with Cloud Initiatives Key Takeaways Economic pressures and the new expectations of users, which are being driven by the growth

More information

Why Your SIEM Isn t Adding Value And Why It May Not Be The Tool s Fault. Best Practices Whitepaper June 18, 2014

Why Your SIEM Isn t Adding Value And Why It May Not Be The Tool s Fault. Best Practices Whitepaper June 18, 2014 Why Your SIEM Isn t Adding Value And Why It May Not Be The Tool s Fault Best Practices Whitepaper June 18, 2014 2 Table of Contents LIVING UP TO THE SALES PITCH... 3 THE INITIAL PURCHASE AND SELECTION

More information

CLOUD & Managed Security Services

CLOUD & Managed Security Services CLOUD & Managed Security Services INFOCOM Security April 1 st 2015, Athens, Greece Angeliki Philippopoulou, MSEE, MBA Regional Sales Manager Copyright Fortinet Inc. All rights reserved. Agenda A few words

More information

Managed Network Services

Managed Network Services Managed Network Services Delivering innovative network data services to business NETWOR Communications are an essential and integral part of any IT strategy and are as important as the systems and processes

More information

How to Choose a Managed Network Services Provider

How to Choose a Managed Network Services Provider How to Choose a Managed Network Services Provider 6 Best Practices to Ensure a Thorough Evaluation Get Started Now: 877.611.6342 to learn more. www.megapath.com Could Managed Network Services Be Right

More information

Unified Threat Management, Managed Security, and the Cloud Services Model

Unified Threat Management, Managed Security, and the Cloud Services Model Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical

More information

MSSP Advanced Threat Protection Service

MSSP Advanced Threat Protection Service SOLUTION BRIEF SOLUTION BRIEF: MSSP ADVANCED THREAT PROTECTION SERVICE MSSP Advanced Threat Protection Service Fortinet Empowers MSSP Delivery of Complete ATP Managed Security Service The Need For ATP

More information

Business benef its of managed ICT services

Business benef its of managed ICT services Business benef its of managed ICT services A leadership perspectives white paper Recommended next steps for business and industry executives Issue 7 in a series Executive Summary With the steady decline

More information

nfx One for Managed Service Providers

nfx One for Managed Service Providers NFX FOR MSP SOLUTION GUIDE nfx One for Managed Service Providers With netforensics MSP suite of solutions, you can quickly and effectively ramp up customer security offerings and increase your bottom line

More information

for business integration

for business integration managed services for business integration To be successful and differentiate from the competition, organizations need to choose a clever integration of people, applications and business partners. Business

More information