WHITE PAPER SPON. Messaging and Web Security Best Practices for 2011 and Beyond. Published March 2011 SPONSORED BY. An Osterman Research White Paper

Size: px
Start display at page:

Download "WHITE PAPER SPON. Messaging and Web Security Best Practices for 2011 and Beyond. Published March 2011 SPONSORED BY. An Osterman Research White Paper"

Transcription

1 WHITE PAPER N Messaging and Web Security Best Practices fr 2011 and Beynd An Osterman Research White Paper Published March 2011 spnsred by SPONSORED BY SPON spnsred by Osterman Research, Inc. P.O. Bx 1058 Black Diamnd, Washingtn USA Tel: Fax: inf@stermanresearch.cm twitter.cm/msterman

2 Executive Summary In an Osterman Research survey cnducted during January 2011, decisin makers and influencers demnstrated that they are decidedly pessimistic abut the future f spam and malware prblems fr 2011, as shwn in the fllwing figure. Predictins Abut Glbal Spam and Malware Prblems in 2011 They have little reasn t be ptimistic: despite recent, albeit temprary gd news such as reductins in the number f spam messages traversing the Internet there has been relatively little gd news in the cntext f threats directed against messaging and Web users. Further, while many decisin makers are taking messaging and Web security threats quite seriusly, a sft ecnmy cupled with threats that are rapidly increasing in sphisticatin and severity means that many rganizatins are nt keeping pace with the threats they face. Fr example: Symantec.clud reprted that 41.1% f all f the malicius dmains they blcked during January 2011 were new, representing an increase f 7.9% frm the mnth befre i. The Rustck btnet was mre r less shut dwn during the 2010 Hliday seasn. Hwever, GFI Sftware reprts that in January 2011 Rustck was reactivated and its spam vlume increased by 98% ii almst vernight. As f late March 2011, Rustck has been silenced nce again, but has the ptential fr cming back nline Osterman Research, Inc. 1

3 SpamTitan reprted results frm a 2010 survey that fund that 49% f small- t mid-sized businesses had nt taken even basic steps tward crafting a scial media plicy iii. Edgewave reprted that during the mnth ending February 23, 2011, there were anywhere frm 49 t 352 new spam campaigns launched every day iv. In 2010, Websense Security Labs fund that 61% f all data stealing attacks ccurred ver the Web r v. KEY TAKEAWAYS There are five key pints that readers f this white paper shuld understand and appreciate: Spam is still a majr prblem Despite sme recent gd news n the spam frnt, spam vlumes cntinue t increase and are expected t d s fr many years t cme. Because it saps strage, bandwidth and emplyee prductivity; and is increasingly used as part f malware-distributin campaigns, spam cntinues t be a very serius prblem. Malware is a rapidly grwing threat Malware infiltratin cntinues t be a vexing issue fr IT management because f a) the increasing sphisticatin f the threats, b) the financial and ther damage they can cause, and c) the sheer vlume f new malware that is being distributed acrss the Internet. There are mre places fr spam and malware t enter an rganizatin The number f venues fr unwanted cntent t enter an rganizatin is grwing. In additin t the nrmal channel, this cntent nw increasingly enters an rganizatin thrugh scial media tls like Twitter and Facebk, persnal Webmail accunts used fr wrk-related applicatins, Web-enabled smartphnes, ther mbile devices like ipads, the grwing number f clud-based applicatins used in the wrkplace, vice-ver-ip systems, real time cmmunicatin tls like instant messaging, flash drives, applicatins that users dwnlad that are nt sanctined by IT, and nrmal Web surfing t legitimate Web sites. The netwrk perimeter is disappearing, making rganizatins mre vulnerable Related t the pint abve is that the netwrk perimeter is rapidly disappearing. Where there used t be a clear distinctin between the crprate netwrk and the utside wrld, the grwing number f emplyees wh wrk frm hme, cupled with the increasing number f mbile devices used fr bth wrk and persnal applicatins, means that the netwrk perimeter ften des nt exist. Data lss is becming a greater risk The granularity and thrughness f the plicies t manage messaging and Web applicatins have nt kept pace with the threats that rganizatins face. This makes rganizatins mre vulnerable t data lss, financial lss, damage t crprate reputatin, higher remediatin csts and ther prblems. The risk f data lss thrugh the Web has been exacerbated dramatically with the rapid grwth f scial media and ther Web 2.0 applicatins Osterman Research, Inc. 2

4 ABOUT THIS WHITE PAPER This white paper discusses the threats that rganizatins face frm spam, malware and ther threats directed at their messaging and Web capabilities. It uses research frm recent Osterman Research surveys, as well as infrmatin frm a variety f ther data surces. It was spnsred by a leading vendr f messaging and Web security capabilities Websense; infrmatin abut and cntact infrmatin fr the cmpany is included at the end f this white paper. Electrnic Cmmunicatin and Cllabratin is Dangerus MOST ORGANIZATIONS HAVE EXPERIENCED MALWARE INFILTRATION Mst rganizatins have experienced sme srt f malware infiltratin thrugh a variety f surces, as shwn in the fllwing figure frm an Osterman Research survey vi cnducted during Security Prblems That Occurred During the Previus 12 Mnths The ccurrence f malware infiltratin has becme decidedly wrse ver the past several years. Fr example, in a 2007 survey cnducted by Osterman Research vii, we fund that malware had infiltrated thrugh in nly 25% f rganizatins surveyed, while nly 22% had 2011 Osterman Research, Inc. 3

5 experienced malware infiltratin thrugh the Web decidedly fewer than in the mre recent survey nted abve. McAfee reprted that their identificatin f new malware increased frm rughly 16,000 new samples per day in 2007 t 29,000 in 2008 t 46,000 per day in 2009 t 60,000 in 2010 viii an increase f 275% in just three years. SPAM CONTINUES TO BE A SERIOUS PROBLEM In additin t the rapid increase in malware penetratin ver the past few years, the spam prblem cntinues t vex rganizatins large and small. Fr example, Symantec.clud reprted that spam accunted fr 89.1% f in 2010, r rughly billin spam messages sent n a typical day ix. While spam levels have drpped significantly in recent mnths in part due t the clsure f pharmaceutical affiliate seller Spamit and btnets Xarvester, Rustck and Lethic in 2010 x there cntinue t be mre than 100 billin spam messages traversing the Internet each day a figure that will increase ver the lng term. WHERE DO THE PROBLEMS COME FROM? There are a large and grwing number f platfrms and venues frm which malware and spam can enter an rganizatin: was the dminant methd fr distributing malware frm the early 2000s t rughly 2009 befre it was vertaken by the Web as the primary attack vectr. Hwever, cntinues t be the primary methd fr distributing spam thrugh a variety f venues desktp , mbile phnes using SMS, etc. Tday, is used largely fr blended threats spam messages that cntain links t malware-hsting sites. Blended threats are a mre sphisticated frm f attack because they require a greater level f security integratin by cmbining traditinal and Web security capabilities. Websense fund that 89.9% f all unwanted s in circulatin during 2010 cntained links t spam sites r malicius websites xi. User mistakes Users will smetimes install malware r cmprmised cde n their systems, mstly ften inadvertently. This ccurs when they install ActiveX cntrls, dwnlad cdecs r varius applicatins that are intended t address sme perceived need (such as capability that IT des nt supprt r that a user needs when wrking frm hme), r when they respnd t scareware and fake anti-virus (Rgue AV r Fake AV) sftware. Rgue AV is a particularly dangerus type f malware, largely because it preys n users wh are attempting t d the right thing t prtect their cmputers frm threats. Even users wh are reasnably experienced can be fled by a well-crafted Rgue AV message. Underscring the seriusness f the prblem, Symantec fund that in the year ended June 2009, there were 43 millin Rgue AV installatin attempts frm mre than 250 different prgrams xii. Varius Web site threats There are a number f ways fr malware t enter an rganizatin thrugh Web surfing r the use f Web-based applicatins: 2011 Osterman Research, Inc. 4

6 Crss-cmpnent attacks ccur when tw inncuus pieces f malware cde appear n the same Web page. Separately, they are harmless and difficult t detect; hwever, when they appear simultaneusly n a single page, they can infect a user s machine with malware. With Crss Site Request Frgery (CSRF) attacks, inncent-lking Web sites generate requests t different sites. CSRF attacks have explited vulnerabilities in Twitter, enabling site wners t acquire the Twitter prfiles f their visitrs. As Web 2.0 applicatins ften leverage XML, XPath, JavaScript and JSON, Adbe Flash and ther rich Internet applicatins, thse applicatins are frequently vulnerable t injectin attacks using these envirnments. These technlgies are ften used t evade anti-virus defenses, mtivating attackers t leverage them. Crss-site scripting attacks embed tags in URLs when users click n these links, malicius Javascript cde will be executed n their machines. SQL injectin attacks ccur when SQL cmmands and meta-characters are inserted int input fields n a Web site, the gal f which is t execute back-end SQL cde. Smartphnes Anther surce f Web threats is the grwing use f Web-enabled smartphnes. Osterman Research has fund that few rganizatins require any srt f malware prtectin n these devices, making netwrks vulnerable t malware that enters thrugh a mbile device when users surf the Web, access r scial media, etc. Cmpunding the prblem is the fact that mbile devices are widely used (mre than 90% f crprate infrmatin wrkers als have an emplyer-prvided mbile device xiii ) and a large prprtin f users emply their mbile device as their primary client fr checking wrk-related frm hme. The grwth and imprtance f smartphnes is being explited by criminals. Fr example, ING custmers in Pland have been hit with a man-in-the-middle attack (a variant f Zeus) that will install malware designed t intercept passcdes sent t Blackberry and Symbian devices via SMS as part f a tw-factr authenticatin scheme xiv. The first malware that targets the Ggle Andrid OS was discvered in August McAfee reprted a 46% increase in mbile-fcused malware during 2010 cmpared t the year befre. Cmprmised search engine queries Cmprmised search engine queries are anther methd fr criminals t distribute malware. This frm f attack relies n users making typgraphical errrs when typing search queries, resulting in the presentatin f malware-laden sites during Web queries. Search engine pisning is particularly effective fr timely and ppular search terms, such as the latest celebrity gssip. Websense reprted that searching fr breaking trends and current news represented a higher risk (22.4%) than searching fr bjectinable cntent (21.8%) xv. Drive-by dwnlads Related t the blended threat is a drive-by dwnlad that ccurs when a user visits a Web site and has malware autmatically dwnladed t his r her cmputer. In sme cases, a user will visit a Web site and see a ppup windw upn clicking the OK buttn in the 2011 Osterman Research, Inc. 5

7 ppup, a Java applet, an ActiveX cntrl, etc. will be installed n the user s cmputer withut their cnsent. Direct hacker attacks Direct hacker attacks can include a variety f explits, including hackers attacking a knwn vulnerability in a Web brwser, r expliting an lder versin f a brwser r ActiveX cntrl. Cmprmised, legitimate Web sites Many legitimate Web sites have been hacked and have served up malware t unsuspecting visitrs. Kaspersky fund that ne in every 3,000 Web sites served up sme srt f malware in 2010 xvi, while the Online Trust Alliance reprted that in excess f 10 billin advertising impressins in 2010 cntained malware xvii, with a dramatic increased nted during the last quarter f 2010 xviii. Websense reprted that 79.9% f Web sites with malicius cde in 2010 were legitimate sites that had been cmprmised xix. Gelcatin A grwing number f applicatins use individuals real-time lcatin, permitting criminals t execute mre targeted attacks phishing attacks that emply gelcatin may be mre difficult fr users t discern as a threat. Many users seem unaware f the malware and ther threats they face frm revealing their lcatin, and ften will freely share this infrmatin withut cnsidering the cnsequences. Other prblems Off-netwrk users, such as emplyees wh wrk frm hme, are anther surce f Webbased threats. An unprtected user f a crprate asset, such as Outlk Web Access that is nt accessed via a VPN, r a laptp cmputer that becmes infected and later is cnnected t the crprate netwrk, can cnstitute a serius threat. Insufficient authenticatin cntrls will smetimes enable cyber-criminals t crack administrative accunts in rder t gain access t sensitive infrmatin. Fr example, BitDefender fund in a check f randmly verified accunts that three-quarters f users emply the same passwrd fr their and scial media accunts. GROWING USE OF SOCIAL MEDIA, WEB 2.0 INCREASES THE PROBLEM Scial netwrking tls are explding in ppularity. Fr example, Facebk had millin unique visitrs in December 2010 in just the United States, an increase f 38% frm December 2009 xx. December 2010 als saw 26.6 millin US visitrs t LinkedIn and 23.6 millin visitrs t Twitter, representing increases f 30% and 18%, respectively, cmpared t a year earlier xxi. Further, nt nly the access t scial media, but their penetratin is grwing: fr example, while the number f unique visitrs t Facebk increased by 38% during the year ended December 2010, ttal minutes spent n the site increased by 79% xxii. The grwth in ppularity f scial media tls has nt been lst n hackers and ther criminals, leading t active targeting f scial media tls acrss a wide spectrum. Fr example: 2011 Osterman Research, Inc. 6

8 While phishing sites that target scial media accunt fr less than ne percent f current phishing sites wrldwide, these sites received 62.4% f all phishing impressins in the six mnths ended June 2010 xxiii. Rughly 20% f the news feeds n Web sites cntain sme srt f malware infectin xxiv. The criminal rganizatin that perates Kbface maintains, as f late 2010, nearly 22,000 Facebk accunts (with 935,000 friends), mre than 350,000 Blgger accunts, and mre than 520,000 Ggle accunts xxv. Websense fund that 10% f links psted in Facebk are either spam r malicius xxvi. One f the fundamental prblems with scial media is that many mre rganizatins allw the use f scial media (ften ding nthing t prtect the rganizatin frm its threats) than cnsider it t be legitimate fr use in their rganizatins, as shwn in the fllwing table frm a recent Osterman Research survey. Organizatinal Views Abut Varius Scial Media Tls xxvii Tl Allw Use Cnsider t be Legitimate Difference LinkedIn 70% 64% 6% YuTube 52% 35% 17% Twitter 50% 34% 16% Facebk 48% 31% 17% MySpace 35% 17% 18% Peer-t-peer file sharing 22% 21% 1% Anther imprtant cnsideratin, albeit nt directly a security issue per se, is that strictly persnal use f scial media can represent an enrmus prductivity cst t an rganizatin. Fr example, if users are updating their persnal status n Facebk, lking fr a new jb n LinkedIn, r simply surfing fr funny cmments n Twitter, that represents an enrmus lss f prductivity. Using SpamTitan s calculatr, an rganizatin f 100 users, each f whm spends 20 minutes per day n persnal Facebk use at wrk and whse average annual salary is $45,000, will cst the rganizatin nearly $186,000 in lst prductivity each year. What this demnstrates is that scial media use is allwed in mre rganizatins than actually cnsider it t be legitimate, indicating that many in IT departments may nt accept its use, but they are ding little r nthing t prevent it frm being used, resulting in bth prductivity lsses and excessive expsure t malware Osterman Research, Inc. 7

9 The Cnsequences f Pr Cmmunicatin Security USERS NEED CONTINUOUS ACCESS TO COMMUNICATIONS Organizatins have lng struggled with hw they shuld r shuld nt manage the use f varius cmmunicatin tls like , the Internet in general, the Web and Web 2.0 tls. The emergence f scial media applicatins and services makes that questin mre relevant and als mre difficult. Given the range f security threats that can be received by and the Web, as well as launched frm scial media sites, rganizatins need t be extremely careful abut their emplyees use f thse sites in a wrk envirnment. The prblem is exacerbated by the grwing trend fr emplyees t wrk frm hme, at times n unprtected r inadequately prtected systems that can easily intrduce threats int the crprate netwrk. These are prblems that must be addressed. Cntinuing grwth in the use f , the Web, clud-based applicatins, and the grwing variety f Web 2.0 tls make emplyees mre prductive and efficient. Further, these capabilities supprt the greater cncept f mbility allwing emplyees t wrk frm hme r n the rad with the same capabilities they wuld have in the ffice. Mbility in its larger cntext will becme increasingly imprtant as rganizatins lk t drive dwn the cst f real estate, taxes and pwer by perating with the same number f emplyees, but with less ffice space. The last pint is ne that cannt be underestimated: as cmpanies seek t reduce their cst f peratins, they will fcus mre n having emplyees wrk remtely. Highly reliable cmmunicatins and infrmatin access will be critical t supprting these emplyees and rbust security will be even mre imprtant t enable these emplyees t wrk remtely. THE CONSEQUENCES OF POOR SECURITY The prblems assciated with security explits impact just abut every aspect f an rganizatin: Decrease in emplyee and IT staff prductivity Emplyees waiting fr malware t be remved frm their cmputers will be significantly less prductive during these dwntime perids in sme cases, 100% less prductive. Further, any srt f messaging r Web explit will require IT staff t address the issue as sn as pssible after the prblem is discvered. This can lead t IT staff wrking n weekends, the delay f varius IT prjects, rebuilding desktps, and ther csts that may be difficult t estimate. Security explits can als lead t extended r ther service utages that can have serius ramificatins n user prductivity. Financial lsses Lss f funds that arise frm the use f malware like Zeus that is designed t steal mney frm victims financial accunts can have a devastating impact n an rganizatin. Just ne f the many examples f Zeus victims is Parkinsn Cnstructin, a firm with $20 millin in annual revenue that lst $92,000 nearly 0.5% f its annual revenue simply because the wner f the firm clicked n claiming t be frm the Scial Security Administratin xxviii. Lss f custmer data Data breaches can result in the need t remediate them in expensive ways, such as ntifying custmers via pstal mail that their data was lst, prvisin f credit reprting services t the victims fr a year r lnger, lss f future business, embarrassing press 2011 Osterman Research, Inc. 8

10 cverage and lss f gdwill. The Pnemn Institute has determined that the cst f a single data breach ranges frm $98 in the United Kingdm t $204 in the United States xxix. Lss f internal data Trade secrets, cnfidential infrmatin and ther intellectual prperty can be lst as a result f pr security. These lsses can ccur acrss a wide range f venues and activities, including sensitive cntent that is mistakenly sent in an r an unencrypted file transfer, data that is lst n an unencrypted mbile device r flash drive, r data that is taken hme by emplyees and stred withut any IT cntrls. Vilatin f statutes and cmpliance requirements If adequate security defenses are nt maintained, rganizatins can run aful f a wide variety f statutes that require data t be prtected and retained. Hwever, ne study fund that decisin makers in ne ut f five rganizatins d nt knw which cmpliance laws apply t their rganizatin xxx. A small sampling f these statutes but by n means an exhaustive list include the fllwing: The Payment Card Industry Data Security Standard (PCI DSS) encmpasses a set f requirements fr prtecting the security f cnsumers and thers payment accunt infrmatin. It includes prvisins fr building and maintaining a secure netwrk, encrypting cardhlder data when it is sent ver public netwrks and assigning unique IDs t each individual that has access t cardhlder infrmatin. The Gramm-Leach-Bliley Act (GLBA) requires financial institutins that hld persnal infrmatin t transmit and stre this infrmatin in such a way that its integrity is nt cmprmised. GLBA requires financial institutins t cmply with a variety f Securities and Exchange Cmmissin and NASD rules. A keystrke lgger r crss-site scripting attack, fr example, that permits sensitive financial data t be expsed t a third party culd ptentially vilate GLBA. The UK Data Prtectin Act impses requirements n businesses perating in the United Kingdm t prtect the security f the persnal infrmatin it hlds. Japan s Persnal Data Prtectin Law is designed t prtect cnsumers and emplyees persnal infrmatin. It includes prvisins fr ensuring the security and disclsure f databases that cntain this infrmatin, amng ther requirements. The Persnal Infrmatin Prtectin and Electrnic Dcuments Act (PIPEDA) is a Canadian privacy law that applies t all cmpanies perating in Canada. Like many ther privacy laws, it requires that persnal infrmatin be stred and transmitted securely. Califrnia s SB1386 (the Database Security Breach Ntificatin Act) is a far reaching law that requires any hlder f persnal infrmatin abut a Califrnia resident regardless f where they are lcated t ntify each resident whse infrmatin may have been cmprmised in sme way. Since Califrnia passed this grundbreaking data breach ntificatin law, mst ther US states have passed similar laws. These laws require 2011 Osterman Research, Inc. 9

11 rganizatins t ntify custmers and thers fr whm sensitive data is held if their data is expsed t an unauthrized party an expensive prpsitin in almst every case. Other issues There are a number f ther prblems that can ccur frm malware and ther threats delivered via , the Web, Web 2.0 applicatins and ther capabilities, including: Internet service utages, which can create serius prblems fr cre business services such as , cllabratin, and clud-based CRM systems. Related t these utages are the ptential fr data leakage, and lack f cmpliance with mnitring capabilities and archiving requirements when emplyees use persnal Webmail systems t send crprate data. Web sites being taken dwn fr lng perids in rder t patch the cde t eliminate an explit. The expsure f FTP and ther lgin credentials t attackers and ther cybercriminals. The dwnlad f malware that can turn crprate and hme-based cmputers int zmbies used as part f a bt netwrk. Users dwnlading illegal cntent, such as cpyrighted wrks r prngraphy using crprate assets. Fr example, a study published by Cisc ScanSafe fund that the number f emplyees wh had attempted t dwnlad MP3 files and illegally btained sftware has recently increased xxxi. A BitDefender study fund that 63% f users seeking prngraphy nline had been infected with malware at least twice xxxii. What Shuld Yu D t Address the Prblem? DEFINE WHAT YOU MUST DO It may sund bvius, but IT and business decisin makers must determine exactly what they must prtect tday, and what they can reasnably expect that they will need t prtect ver the next few years. Fr example, this list shuld include things like: On-premise, IT-deplyed crprate systems, smartphnes, ipads and ther capabilities frm spam and malware. Threats intrduced by emplyee devices that are brught int the wrkplace and that are used t access crprate resurces. This shuld include ipads, persnal smartphnes, persnal laptps, etc. Mnitring and/r preventing what leaves the rganizatin via crprate , persnal Webmail, laptps, smartphnes and ther mbile devices, scial media psts, flash drives, prtable hard drives, etc. t prtect against data lss. Cnsider hw yur data plicies can be applied acrss all channels Osterman Research, Inc. 10

12 Encryptin f sensitive cmmunicatins t remain in cmpliance with bth regulatry requirements and best practices. Mnitring internal cmmunicatins fr sexually r racially ffensive cntent, as well as sensitive infrmatin that culd be stred n desktps, servers r ther systems withut apprpriate access cntrls. Mnitring emplyees activities when accessing crprate resurces frm persnally wned devices when wrking frm hme r remtely. Archiving business recrds that shuld be retained. While archiving may nt seem like a security issue per se, archiving systems shuld be cnsidered alng with spam- and malware-filtering systems because f the ramificatins that each has n the ther. Nn-traditinal security threats, such as cnfidential infrmatin that might be left n PCs at a htel s business center. Fr example, a senir manager at a leading anti-virus cmpany recently reprted that he fund the itinerary fr a general s visit t a military installatin n a htel business center s PC. DETERMINE WHAT NOT TO DO As imprtant as establishing what must be dne is t establish what must nt be dne. Fr example, a blanket prhibitin n the use f scial media tls like Facebk r Twitter, r preventing users frm emplying persnal Webmail systems at wrk can have negative ramificatins n a number f levels. Emplyee mrale may suffer as a result, as well as user prductivity if emplyees are nt permitted t use certain cnsumer-fcused tls that can help them get their wrk dne. Plus, emplyees will prbably use these tls anyway unless IT impses dracnian cntrls that will mst likely have the side effect f impairing emplyee prductivity. ESTABLISH DETAILED AND THOROUGH POLICIES Any rganizatin that seeks t prtect their users, data and netwrks frm Web-based threats must establish detailed and thrugh plicies abut acceptable use f all f their nline tls: , instant messaging, Web 2.0 applicatins, cllabratin tls, smartphnes, flash drives and the Web itself. Successfully addressing these prblems must start with an acknwledgement f the threat landscape and the crrespnding plicies abut hw tls will be used befre technlgies are deplyed t address the prblems. Further, there must be buy-in acrss the rganizatin in rder fr plicies t be effective. Fr example, a plicy against the use f scial media tls may seriusly impact a marketing department s effectiveness at building the crprate brand; similarly, nt allwing the use f unauthrized file transfer tls may prevent users frm sending large files t prspects r custmers in a timely manner. It is imprtant t nte that cmmunicatin plicies must be apprpriate and nt s brad as t prevent emplyees frm participating in lawful activities. Fr example, the Natinal Labr Relatins Bard has taken the psitin that plicies fcused n scial media are apprpriate t a pint. Hwever, crprate plicies that prevent emplyees frm discussing their emplyer n their wn time, sharing cmments abut unin rganizatin, etc. may nt be legal xxxiii Osterman Research, Inc. 11

13 DEPLOY A MULTI-LAYERED, MULTI-LEVEL DEFENSE STRATEGY It is als imprtant t deply a multi-layered, multi-level defense strategy. This is becming increasingly critical as the netwrk perimeter becmes less well defined ver time as nted earlier. Fr example, a traditinal security architecture had a clearly defined firewall that separated internal IT-managed resurces frm the utside wrld. Hwever, the increasing use f persnal devices that can cnnect as easily t a Starbucks Wi-Fi netwrk as they can t a crprate netwrk, Web 2.0 applicatins like Twitter, r emplyees using their persnal smartphnes t access crprate n weekends means that the netwrk perimeter is rapidly disappearing. This has made security a much mre difficult prpsitin fr IT decisin makers, largely because there are s many mre devices and data surces t prtect. Cnsequently, any rganizatin shuld cnsider deplying: -based defenses that include anti-virus, anti-malware, anti-spam and DLP capabilities. Web cntent mnitring capabilities that include basic URL filtering, granular remediatin capabilities that allw mre sphisticated threat management, and real-time security capabilities that will determine if requests frm users and applicatins cmply with security plicies. Integrated Web and security as a way t defend against mre sphisticated blended threats and reduce the cst f managing multiple systems. Endpint capabilities that include anti-virus capabilities n client machines, remvable media scanning capabilities, and prtectin fr emplyees persnal, hme-based platfrms. Clud-based threat intelligence, such as reputatin services, that can determine if cntent is likely t be acceptable r unacceptable befre it is delivered t the crprate netwrk. Real-time mnitring and reprting capabilities that will prvide visibility int emplyee activity in rder t reduce verall risk expsure. Feedback lp systems that will enable cmmunity-watch defenses and reprts n threats like spam and phishing attempts. CONSIDER VARIOUS DELIVERY MODELS There are a variety f ways in which messaging and Web security capabilities can be managed, including: Server-based systems On-premise slutins deplyed at the server level, where mst data typically resides, reslve many f the prblems assciated with client-side systems by allwing easier deplyment and management capabilities, as well as the ability t mre easily enfrce crprate plicies and changes thrugh a centralized management interface. Gateway-based systems Gateway security stps threats at the earliest pssible pint in the n-premise infrastructure and is a best practice fr rganizatins that manage n-premise defenses Osterman Research, Inc. 12

14 Client-side systems Client-based systems, such as URL filtering tls, anti-virus tls, spyware blckers and the like prvide useful capabilities and can be effective at preventing a variety f threats client-side anti-virus tls, fr example, are an imprtant best practice fr any rganizatin t prevent malware frm being intrduced via flash drives r ther lcal surces. It is imprtant t nte here that mst traditinal, cnsumer-riented anti-virus prducts are client-based tls. Client-side capabilities can be relatively inexpensive and are ften prvided as part f desktp prtectin suites that include anti-virus, anti-spam and ther capabilities. While client-side systems are effective in smaller rganizatins, they ften d nt scale well. They are time-cnsuming t install and update fr large numbers f users and can be quite expensive t deply in larger rganizatins. Centralized management and deplyment capabilities are essential t cst-effectively install, update and enfrce crprate plicies using client-based systems, particularly fr larger rganizatins. SaaS/clud-based services SaaS and hsted services are increasing in ppularity and ffer anther ptin fr rganizatins t implement a variety f threat-prtectin capabilities. The primary advantages f this mdel are that n investments in infrastructure are required, up-frnt csts are minimal, nging csts are predictable, and all management and upgrades f the system are prvided by the SaaS r clud service. A ptential disadvantage f SaaS r clud services, particularly fr Web traffic, is prxying all traffic t the hst and addressing latency issues. Their csts can be higher than fr npremise systems in sme situatins, althugh they will nt necessarily be mre expensive. Fr example, SaaS vendrs merely rent space n a server, prviding a very inexpensive methd fr accessing sftware and infrastructure technlgies. Althugh rganizatins may pay mre t a SaaS r hsted security vendr than they wuld fr an n-site slutin, the value f the hsted infrastructure and administratin prvided by the third party vendr can prvide a lwer ttal cst f wnership in many cases. Managed services Managed services are similar in cncept t hsted services, but a third party either with staff n-site r via a remte service manages the n-premise infrastructure, installs upgrades, updates signature files and the like. Csts can vary widely fr managed services depending n the size f the rganizatin, whether third-party management persnnel are lcated n-premise r in the third party s data center, and ther factrs. Virtual appliances Anther ptin, and ne that is finding significant uptake in security applicatins, is the virtual appliance mdel a pre-cnfigured cmbinatin f a dedicated perating system and security sftware that runs in a virtualized envirnment. Advantages f the virtual appliance apprach include the ease f deplying new capabilities, the ability t mve virtual appliances frm ne physical server t anther fr purpses f maintenance r failver prtectin, very high availability, reduced pwer cnsumptin and minimal IT staff time t manage Osterman Research, Inc. 13

15 Hybrid fferings A newer apprach that is increasingly ffered by vendrs is t cmbine n-premise infrastructure with hsted r clud based services. Fr example, an security vendr may prvide a malware-filtering appliance n-site, but cuple this with a hsted filtering service that acts as a srt f pre-filter; r they may rely n a hsted anti-virus service and desktp anti-virus tls. The fundamental advantage f this apprach is that the n-premise infrastructure is prtected frm spikes and verall increases in the vlume f malicius traffic ver time, thereby preserving the n-premise investment and maintaining acceptable perfrmance f messaging. A hybrid apprach may als be deplyed fr Web security, where n-premise infrastructure is used t secure larger ffices and clud-based services are used t secure smaller sites where n-premise infrastructure is t expensive t supprt. Enterprises still prefer in-huse ver hsted slutins, althugh this is changing ver time. Hsted slutins tend t be mre accepted in small- t medium-sized business with less develped IT staff and fewer resurces. These rganizatins ften need external expertise and can benefit frm the CAPEX and OPEX savings f clud slutins. Similarly, appliances als tend t ffer the SMB the cnvenience f an integrated slutin. Larger rganizatins tend t have well-staffed IT departments, and s gain less frm the benefits f appliances, unless thse appliances are fr remte r branch lcatins where there may be a lack f lcal expertise. Plus, large rganizatins tend t have extra server hardware enabling them t realize the CAPEX cst savings affrded by service prviders. Evidence t this pint is the ppularity f in-huse managed server sftware. Given the size f their requirements, large rganizatins can als justify internal persnnel and s may nt be realize the OPEX savings f clud services. Having said that, while large rganizatins may nt have been the ideal play fr clud service prviders in the past, the market is definitely shifting. As IT cntinues t dwnsize and utsurce, clud prviders are gaining tractin in larger rganizatins precisely because f the savings they can ffer. This is particularly true when the buy discussin is cnducted at the CIO level. When evaluating security capabilities, it is imprtant t keep in mind three key questins: Will there be the resurces available t cntinually maintain the infrastructure, either thrugh IT staff cntinually updating capabilities r via an autmated update prcess? If nt, anti-malware and anti-spam capabilities can becme utdated and leave rganizatins mre vulnerable t infiltratin by unwanted and damaging cntent. Related t the questin abve, will the in-huse persnnel have the training and time available t manage the infrastructure? This is a particularly imprtant cnsideratin fr SMBs that may lack the persnnel, training r time t prperly manage the security infrastructure. Organizatins whse IT staff may cnsist f a few hurs per week frm 2011 Osterman Research, Inc. 14

16 the ffice manager can end up with security capabilities that are nt prperly cnfigured because they are simply are t cmplex nt t be managed by a full-time IT staff member. Organizatins need t cnsider the cst f managing multiple layers f defense and multiple delivery mdels. D IT resurces exist t manage everything? If nt, cnsider slutins that cnslidate security capabilities, as well as delivery mdels. Spnsr f This White Paper Websense Srrent Valley Rad San Dieg, CA USA Websense, Inc., a glbal leader in unified Web, data and cntent security slutins, delivers the best security fr mdern threats at the lwest ttal cst f wnership t tens f thusands f enterprise, midmarket and small rganizatins arund the wrld. Distributed thrugh a glbal netwrk f channel partners and delivered as sftware, appliance and sftware-as-a-service (SaaS), Websense cntent security slutins help rganizatins leverage new cmmunicatin, cllabratin and Web 2.0 business tls while prtecting frm advanced persistent threats, preventing the lss f cnfidential infrmatin and enfrcing Internet use and security plicies Osterman Research, Inc. 15

17 2011 Osterman Research, Inc. All rights reserved. N part f this dcument may be reprduced in any frm by any means, nr may it be distributed withut the permissin f Osterman Research, Inc., nr may it be resld r distributed by any entity ther than Osterman Research, Inc., withut prir written authrizatin f Osterman Research, Inc. Osterman Research, Inc. des nt prvide legal advice. Nthing in this dcument cnstitutes legal advice, nr shall this dcument r any sftware prduct r ther ffering referenced herein serve as a substitute fr the reader s cmpliance with any laws (including but nt limited t any act, statue, regulatin, rule, directive, administrative rder, executive rder, etc. (cllectively, Laws )) referenced in this dcument. If necessary, the reader shuld cnsult with cmpetent legal cunsel regarding any Laws referenced herein. Osterman Research, Inc. makes n representatin r warranty regarding the cmpleteness r accuracy f the infrmatin cntained in this dcument. THIS DOCUMENT IS PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND. ALL EXPRESS OR IMPLIED REPRESENTATIONS, CONDITIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE DETERMINED TO BE ILLEGAL. i Symantec.clud MessageLabs January 2011 Intelligence Reprt ii iii iv v Websense 2010 Threat Reprt vi Messaging and Web Security Market Trends, , Osterman Research, Inc. vii Messaging, Web and IM Security Market Trends, , Osterman Research, Inc. viii ix Symantec.clud MessageLabs January 2011 Intelligence Reprt x RSSfeed_IWK_News xi Websense 2010 Threat Reprt xii xiii Mbile Messaging Market Trends, , Osterman Research, Inc. xiv xv Websense 2010 Threat Reprt xvi xvii xviii xix Websense 2010 Threat Reprt xx U.S. Digital Year in Review 2010, cmscre xxi U.S. Digital Year in Review 2010, cmscre xxii U.S. Digital Year in Review 2010, cmscre xxiii Micrsft Security Intelligence Reprt, Vlume 9, January thrugh June 2010 xxiv xxv Kbface: Inside a Crimeware Netwrk, Nvember 12, 2010 xxvi Websense 2010 Threat Reprt xxvii Messaging and Web Security Market Trends, , Osterman Research, Inc. xxviii xxix Five Cuntries: Cst f a Data Breach, Pnemn Institute LLC xxx Surce: Webrt Sftware, Inc. xxxi Illegal internet dwnlads at wrk skyrcket, IT Pr, January 13, 2010 xxxii xxxiii Hw t Stay n the NLRB's "Friends" List, Bullivant Huser Bailey PC 2011 Osterman Research, Inc. 16

The Cost Benefits of the Cloud are More About Real Estate Than IT

The Cost Benefits of the Cloud are More About Real Estate Than IT y The Cst Benefits f the Clud are Mre Abut Real Estate Than IT #$#%&'()*( An Osterman Research Executive Brief Published December 2010 "#$#%&'()*( Osterman Research, Inc. P.O. Bx 1058 Black Diamnd, Washingtn

More information

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop. Web Develpment Offshre Develpment Outsurcing SEO ACTIVITY MONITOR This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it

More information

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department

More information

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library

More information

WHITE PAPER SPON. Protecting Mobile Devices from Malware Attack. Published March 2015. An Osterman Research White Paper. sponsored by.

WHITE PAPER SPON. Protecting Mobile Devices from Malware Attack. Published March 2015. An Osterman Research White Paper. sponsored by. WHITE PAPER N Prtecting Mbile Devices frm An Osterman Research White Paper Published March 2015 spnsred by SPON spnsred by Osterman Research, Inc. P.O. Bx 1058 Black Diamnd, Washingtn 98010-1058 USA Tel:

More information

Data Protection Act Data security breach management

Data Protection Act Data security breach management Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing

More information

White Paper for Mobile Workforce Management and Monitoring Copyright 2014 by Patrol-IT Inc. www.patrol-it.com

White Paper for Mobile Workforce Management and Monitoring Copyright 2014 by Patrol-IT Inc. www.patrol-it.com White Paper fr Mbile Wrkfrce Management and Mnitring Cpyright 2014 by Patrl-IT Inc. www.patrl-it.cm White Paper fr Mbile Wrkfrce Management and Mnitring Cpyright 2014 by Patrl-IT Inc. www.patrl-it.cm 2

More information

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1 Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues

More information

Key Steps for Organizations in Responding to Privacy Breaches

Key Steps for Organizations in Responding to Privacy Breaches Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins

More information

Information Services Hosting Arrangements

Information Services Hosting Arrangements Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based

More information

File Sharing And Swimming Sprawl

File Sharing And Swimming Sprawl WHITE PAPER N The Need fr Enterprise-Grade Synchrnizatin An Osterman Research White Paper Published August 2012 spnsred by spnsred by SPONSORED BY SPON spnsred by Osterman Research, Inc. P.O. Bx 1058 Black

More information

White Paper. SharePoint and the Consumerization of IT: Considerations for BYOD Success. Authors: Aseem Pandit and Prateek Bhargava

White Paper. SharePoint and the Consumerization of IT: Considerations for BYOD Success. Authors: Aseem Pandit and Prateek Bhargava White Paper SharePint and the Cnsumerizatin f IT: Cnsideratins fr BYOD Success Authrs: Aseem Pandit and Prateek Bhargava The Evlutin f IT Cnsumerizatin & BYOD BYOD refers t the plicy f permitting emplyees

More information

The ADVANTAGE of Cloud Based Computing:

The ADVANTAGE of Cloud Based Computing: The ADVANTAGE f Clud Based Cmputing: A Web Based Slutin fr: Business wners and managers that perate equipment rental, sales and/r service based rganizatins. R M I Crpratin Business Reprt RMI Crpratin has

More information

WHITE PAPER SPON. The Need for Enterprise-Grade File Sharing and Synchronization. Published August 2012 SPONSORED BY. An Osterman Research White Paper

WHITE PAPER SPON. The Need for Enterprise-Grade File Sharing and Synchronization. Published August 2012 SPONSORED BY. An Osterman Research White Paper WHITE PAPER N The Need fr Enterprise-Grade Synchrnizatin An Osterman Research White Paper Published August 2012 spnsred by spnsred by SPONSORED BY SPON spnsred by Osterman Research, Inc. P.O. Bx 1058 Black

More information

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite Vlume Licensing brief Licensing the Cre Client Access License (CAL) Suite and Enterprise CAL Suite Table f Cntents This brief applies t all Micrsft Vlume Licensing prgrams. Summary... 1 What s New in This

More information

VCU Payment Card Policy

VCU Payment Card Policy VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this

More information

First Global Data Corp.

First Global Data Corp. First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First

More information

Integrate Marketing Automation, Lead Management and CRM

Integrate Marketing Automation, Lead Management and CRM Clsing the Lp: Integrate Marketing Autmatin, Lead Management and CRM Circular thinking fr marketers 1 (866) 372-9431 www.clickpintsftware.cm Clsing the Lp: Integrate Marketing Autmatin, Lead Management

More information

Customers FAQs for Webroot SecureAnywhere Identity Shield

Customers FAQs for Webroot SecureAnywhere Identity Shield Custmers FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere sftware?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is Webrt

More information

Data Protection Policy & Procedure

Data Protection Policy & Procedure Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015

More information

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013 Research Reprt Abstract: Advanced Malware Detectin and Prtectin Trends By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm, Senir Prject Manager September 2013 2013 by The Enterprise Strategy Grup,

More information

Introduction to Mindjet MindManager Server

Introduction to Mindjet MindManager Server Intrductin t Mindjet MindManager Server Mindjet Crpratin Tll Free: 877-Mindjet 1160 Battery Street East San Francisc CA 94111 USA Phne: 415-229-4200 Fax: 415-229-4201 mindjet.cm 2013 Mindjet. All Rights

More information

WHITE PAPER SPON. The Critical Need for Enterprise-Grade File Sync and Share Solutions. Published August 2015. An Osterman Research White Paper

WHITE PAPER SPON. The Critical Need for Enterprise-Grade File Sync and Share Solutions. Published August 2015. An Osterman Research White Paper WHITE PAPER Grade File Sync and Share An Osterman Research White Paper Published August 2015 spnsred by spnsred by SPON spnsred by Osterman Research, Inc. P.O. Bx 1058 Black Diamnd, Washingtn 98010-1058

More information

WHITE PAPER SPON. The Need for Enterprise-Grade File Sync and Share. Published February 2015 SPONSORED BY. An Osterman Research White Paper

WHITE PAPER SPON. The Need for Enterprise-Grade File Sync and Share. Published February 2015 SPONSORED BY. An Osterman Research White Paper WHITE PAPER N The Need fr Enterprise-Grade An Osterman Research White Paper Published February 2015 SPONSORED BY spnsred by SPON spnsred by Osterman Research, Inc. P.O. Bx 1058 Black Diamnd, Washingtn

More information

WHITE PAPER SPON. Important Issues to Consider Before Migrating to a New Version of Exchange. Published August 2011 SPONSORED BY

WHITE PAPER SPON. Important Issues to Consider Before Migrating to a New Version of Exchange. Published August 2011 SPONSORED BY WHITE PAPER N Imprtant Issues t Cnsider Befre Migrating t a New Versin f Exchange An Osterman Research White Paper Published August 2011 SPONSORED BY SPON spnsred by spnsred by Osterman Research, Inc.

More information

In addition to assisting with the disaster planning process, it is hoped this document will also::

In addition to assisting with the disaster planning process, it is hoped this document will also:: First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business

More information

WHITE PAPER SPON. The Need for Enterprise-Grade File Sharing and Synchronization. Published July 2012 SPONSORED BY. An Osterman Research White Paper

WHITE PAPER SPON. The Need for Enterprise-Grade File Sharing and Synchronization. Published July 2012 SPONSORED BY. An Osterman Research White Paper WHITE PAPER N The Need fr Enterprise-Grade Synchrnizatin An Osterman Research White Paper Published July 2012 spnsred by spnsred by SPONSORED BY spnsred by SPON spnsred by spnsred by Osterman Research,

More information

Corporate Account Takeover & Information Security Awareness

Corporate Account Takeover & Information Security Awareness Crprate Accunt Takever & Infrmatin Security Awareness What is Crprate Accunt Takever? A fast grwing electrnic crime where thieves typically use sme frm f malware t btain lgin credentials t Crprate Online

More information

Junos Pulse Instructions for Windows and Mac OS X

Junos Pulse Instructions for Windows and Mac OS X Juns Pulse Instructins fr Windws and Mac OS X When yu pen the Juns client fr the first time yu get the fllwing screen. This screen shws yu have n cnnectins. Create a new cnnectin by clicking n the + icn.

More information

The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future

The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future The Imprtance Advanced Data Cllectin System Maintenance Berry Drijsen Glbal Service Business Manager WHITE PAPER knwledge t shape yur future The Imprtance Advanced Data Cllectin System Maintenance Cntents

More information

UC4 AUTOMATED VIRTUALIZATION Intelligent Service Automation for Physical and Virtual Environments

UC4 AUTOMATED VIRTUALIZATION Intelligent Service Automation for Physical and Virtual Environments Fr mre infrmatin abut UC4 prducts please visit www.uc4.cm. UC4 AUTOMATED VIRTUALIZATION Intelligent Service Autmatin fr Physical and Virtual Envirnments Intrductin This whitepaper describes hw the UC4

More information

Disk Redundancy (RAID)

Disk Redundancy (RAID) A Primer fr Business Dvana s Primers fr Business series are a set f shrt papers r guides intended fr business decisin makers, wh feel they are being bmbarded with terms and want t understand a cmplex tpic.

More information

Licensing Windows Server 2012 R2 for use with virtualization technologies

Licensing Windows Server 2012 R2 for use with virtualization technologies Vlume Licensing brief Licensing Windws Server 2012 R2 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 R2 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents

More information

MaaS360 Cloud Extender

MaaS360 Cloud Extender MaaS360 Clud Extender Installatin Guide Cpyright 2012 Fiberlink Cmmunicatins Crpratin. All rights reserved. Infrmatin in this dcument is subject t change withut ntice. The sftware described in this dcument

More information

FAQs for Webroot SecureAnywhere Identity Shield

FAQs for Webroot SecureAnywhere Identity Shield FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere Identity Shield?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is the Webrt

More information

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

Licensing Windows Server 2012 for use with virtualization technologies

Licensing Windows Server 2012 for use with virtualization technologies Vlume Licensing brief Licensing Windws Server 2012 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents This

More information

expertise hp services valupack consulting description security review service for Linux

expertise hp services valupack consulting description security review service for Linux expertise hp services valupack cnsulting descriptin security review service fr Linux Cpyright services prvided, infrmatin is prtected under cpyright by Hewlett-Packard Cmpany Unpublished Wrk -- ALL RIGHTS

More information

WHITE PAPER SPON. The Critical Need for Enterprise-Grade File Sync and Share Solutions. Published August 2015. An Osterman Research White Paper

WHITE PAPER SPON. The Critical Need for Enterprise-Grade File Sync and Share Solutions. Published August 2015. An Osterman Research White Paper WHITE PAPER Grade File Sync and Share An Osterman Research White Paper Published August 2015 spnsred by spnsred by SPON spnsred by Osterman Research, Inc. P.O. Bx 1058 Black Diamnd, Washingtn 98010-1058

More information

Completing the CMDB Circle: Asset Management with Barcode Scanning

Completing the CMDB Circle: Asset Management with Barcode Scanning Cmpleting the CMDB Circle: Asset Management with Barcde Scanning WHITE PAPER The Value f Barcding Tday, barcdes are n just abut everything manufactured and are used fr asset tracking and identificatin

More information

In-House Counsel Day Priorities for 2012. Cloud Computing the benefits, potential risks and security for the future

In-House Counsel Day Priorities for 2012. Cloud Computing the benefits, potential risks and security for the future In-Huse Cunsel Day Pririties fr 2012 Clud Cmputing the benefits, ptential risks and security fr the future Presented by David Richardsn Thursday 1 March 2012 WIN: What in-huse lawyers need Knwledge, supprt

More information

The Law Office of the Future: Remote Access and Virtual Law Firms Jeffrey S. Krause, Esq.

The Law Office of the Future: Remote Access and Virtual Law Firms Jeffrey S. Krause, Esq. The Law Office f the Future: Remte Access and Virtual Law Firms Jeffrey S. Krause, Esq. Presentatin Outline Intrductin Wrking Remte vs. Virtual Office Wrking Remte Temprary way t wrk Access yur ffice cmputer

More information

Network Security Trends in the Era of Cloud and Mobile Computing

Network Security Trends in the Era of Cloud and Mobile Computing Research Reprt Abstract: Netwrk Security Trends in the Era f Clud and Mbile Cmputing By Jn Oltsik, Senir Principal Analyst and Bill Lundell, Senir Research Analyst With Jennifer Gahm, Senir Prject Manager

More information

Research Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012

Research Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012 Research Reprt Abstract: Security Management and Operatins: Changes n the Hrizn By Jn Oltsik, Senir Principal Analyst With Kristine Ka and Jennifer Gahm July 2012 2012, The Enterprise Strategy Grup, Inc.

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy. Privacy Plicy The Central Equity Grup understands hw highly peple value the prtectin f their privacy. Fr that reasn, the Central Equity Grup takes particular care in dealing with any persnal and sensitive

More information

Installation Guide Marshal Reporting Console

Installation Guide Marshal Reporting Console Installatin Guide Installatin Guide Marshal Reprting Cnsle Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 2 Sftware Prerequisites 3 Installatin Prcedures 3 Appendix: Enabling

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

Implementing an electronic document and records management system using SharePoint 7

Implementing an electronic document and records management system using SharePoint 7 Reprt title Agenda item Implementing an electrnic dcument and recrds management system using SharePint 7 Meeting Finance, Prcurement & Prperty Cmmittee 16 June 2008 Date Reprt by Dcument Number Head f

More information

IN-HOUSE OR OUTSOURCED BILLING

IN-HOUSE OR OUTSOURCED BILLING IN-HOUSE OR OUTSOURCED BILLING Medical billing is ne f the mst cmplicated aspects f running a medical practice. With thusands f pssible cdes fr diagnses and prcedures, and multiple payers, the ability

More information

Plus500CY Ltd. Statement on Privacy and Cookie Policy

Plus500CY Ltd. Statement on Privacy and Cookie Policy Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and

More information

TrustED Briefing Series:

TrustED Briefing Series: TrustED Briefing Series: Since 2001, TrustCC has prvided IT audits and security assessments t hundreds f financial institutins thrugh ut the United States. Our TrustED Briefing Series are white papers

More information

WHITE PAPER. How Encrypting Content in Transit and at Rest Reduces Liabilities and Costs for any Organization SPON. Published August 2011 SPONSORED BY

WHITE PAPER. How Encrypting Content in Transit and at Rest Reduces Liabilities and Costs for any Organization SPON. Published August 2011 SPONSORED BY WHITE PAPER Hw Encrypting Cntent in Transit and at Rest Reduces Liabilities and Csts fr any Organizatin An Osterman Research White Paper Published August 2011 SPONSORED BY!! SPON spnsred by spnsred Osterman

More information

Mobile Workforce. Improving Productivity, Improving Profitability

Mobile Workforce. Improving Productivity, Improving Profitability Mbile Wrkfrce Imprving Prductivity, Imprving Prfitability White Paper The Business Challenge Between increasing peratinal cst, staff turnver, budget cnstraints and pressure t deliver prducts and services

More information

WHITE PAPER SPON. Best Practices for File Sharing. Published September 2014 SPONSORED BY. An Osterman Research White Paper. sponsored by.

WHITE PAPER SPON. Best Practices for File Sharing. Published September 2014 SPONSORED BY. An Osterman Research White Paper. sponsored by. WHITE PAPER N Best Practices fr File Sharing An Osterman Research White Paper Published September 2014 spnsred by SPONSORED BY π spnsred by SPON spnsred by Osterman Research, Inc. P.O. Bx 1058 Black Diamnd,

More information

Service Desk Self Service Overview

Service Desk Self Service Overview Tday s Date: 08/28/2008 Effective Date: 09/01/2008 Systems Invlved: Audience: Tpics in this Jb Aid: Backgrund: Service Desk Service Desk Self Service Overview All Service Desk Self Service Overview Service

More information

Cloud Services Frequently Asked Questions FAQ

Cloud Services Frequently Asked Questions FAQ Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like

More information

BYOD and Cloud Computing

BYOD and Cloud Computing BYOD and Clud Cmputing AIIM First Canadian Chapter May 22, 2014 Susan Nickle, Lndn Health Sciences Centre Chuck Rthman, Wrtzmans Sheila Taylr, Erg Infrmatin Management Cnsulting Clud cmputing Agenda What

More information

Transform your phones into a costcutting, worry-reducing, sales-driving machine.

Transform your phones into a costcutting, worry-reducing, sales-driving machine. Transfrm yur phnes int a cstcutting, wrry-reducing, sales-driving machine. LABUSA s Hsted PBX prvides an enterprise-grade VIP phne system. Delivered frm the clud, it keeps pace with yur grwth and prpels

More information

Using PayPal Website Payments Pro UK with ProductCart

Using PayPal Website Payments Pro UK with ProductCart Using PayPal Website Payments Pr UK with PrductCart Overview... 2 Abut PayPal Website Payments Pr & Express Checkut... 2 What is Website Payments Pr?... 2 Website Payments Pr and Website Payments Standard...

More information

IT Help Desk Service Level Expectations Revised: 01/09/2012

IT Help Desk Service Level Expectations Revised: 01/09/2012 IT Help Desk Service Level Expectatins Revised: 01/09/2012 Overview The IT Help Desk team cnsists f six (6) full time emplyees and fifteen (15) part time student emplyees. This team prvides supprt fr 25,000+

More information

Gartner Magic Quadrant Salesforce Automation 2009

Gartner Magic Quadrant Salesforce Automation 2009 Gartner Magic Quadrant Salesfrce Autmatin 2009 Sage CRM Slutins Opinin Brief Released July 24, 2009 Q. What is the Gartner Magic Quadrant (GMQ) fr SFA? A. The Gartner Magic Quadrant fr SFA is an analyst

More information

Basic concept of Cloud computing

Basic concept of Cloud computing Basic cncept f Clud cmputing Abstract:- Mnica R Kabra (Vivekanand Arts Sardar Dalipsingh Cmmerce and science cllege Aurangabad) Clud cmputing is becming a pwerful netwrk architecture t perfrm large-scale

More information

Often people have questions about new or enhanced services. This is a list of commonly asked questions and answers regarding our new WebMail format.

Often people have questions about new or enhanced services. This is a list of commonly asked questions and answers regarding our new WebMail format. Municipal Service Cmmissin Gerald P. Cle Frederick C. DeLisle Thmas M. Kaul Gregry L. Riggle Stanley A. Rutkwski Electric, Steam, Water Cable Televisin and High Speed Internet Service since 1889 Melanie

More information

A. Early Case Assessment

A. Early Case Assessment Electrnic Discvery Reference Mdel Standards fr the identificatin f electrnically stred infrmatin in discvery http://www.edrm.net/resurces/standards/identificatin A. Early Case Assessment Once a triggering

More information

Table of Contents. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.

Table of Contents. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Table f Cntents Tp Pricing and Licensing Questins... 2 Why shuld custmers be excited abut Micrsft SQL Server 2012?... 2 What are the mst significant changes t the pricing and licensing fr SQL Server?...

More information

Systems Support - Extended

Systems Support - Extended 1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets

More information

How To Write A Byod

How To Write A Byod Limitatins f the Walled Garden This is the secnd part in a series designed t help rganizatins develp their BYOD (bring-yur-wn-device) strategies fr persnally-wned smartphnes and tablets in the enterprise.

More information

The Impact of Messaging and Web Threats

The Impact of Messaging and Web Threats ! An Osterman Research White Paper Published April 2008 SPONSORED BY!! Osterman Research, Inc. P.O. Bx 1058 Black Diamnd, Washingtn 98010-1058 Phne: +1 253 630 5839 Fax: +1 866 842 3274 inf@stermanresearch.cm

More information

Treasury Gateway Getting Started Guide

Treasury Gateway Getting Started Guide Treasury Gateway Getting Started Guide Treasury Gateway is a premier single sign-n and security prtal which allws yu access t multiple services simultaneusly thrugh the same sessin, prvides cnvenient access

More information

WHITE PAPER. Vendor Managed Inventory (VMI) is Not Just for A Items

WHITE PAPER. Vendor Managed Inventory (VMI) is Not Just for A Items WHITE PAPER Vendr Managed Inventry (VMI) is Nt Just fr A Items Why it s Critical fr Plumbing Manufacturers t als Manage Whlesalers B & C Items Executive Summary Prven Results fr VMI-managed SKUs*: Stck-uts

More information

Christchurch Polytechnic Institute of Technology Access Control Security Standard

Christchurch Polytechnic Institute of Technology Access Control Security Standard CPIT Crprate Services Divisin: ICT Christchurch Plytechnic Institute f Technlgy Access Cntrl Security Standard Crprate Plicies & Prcedures Sectin 1: General Administratin Dcument CPP121a Principles Infrmatin

More information

QBT - Making business travel simple

QBT - Making business travel simple QBT - Making business travel simple In business travel, cmplexity csts. S, we ffer less f it. We adpt the latest technlgy and make it simple, transparent and highly persnal. S yu get mre f what yu need

More information

WHITE PAPER SPON. Evaluating Managed File Transfer in the Cloud: What You Need to Know. Published October 2012 SPONSORED BY

WHITE PAPER SPON. Evaluating Managed File Transfer in the Cloud: What You Need to Know. Published October 2012 SPONSORED BY WHITE PAPER N Transfer in the Clud: What Yu Need t Knw An Osterman Research White Paper Published Octber 2012 SPONSORED BY SPON spnsred by spnsred by! Osterman Research, Inc. P.O. Bx 1058 Black Diamnd,

More information

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy WHAT YOU NEED TO KNOW ABOUT Prtecting yur Privacy YOUR PRIVACY IS OUR PRIORITY Credit unins have a histry f respecting the privacy f ur members and custmers. Yur Bard f Directrs has adpted the Credit Unin

More information

PRIVACY POLICY Last revised: April 2015

PRIVACY POLICY Last revised: April 2015 PRIVACY POLICY Last revised: April 2015 ACD, LLC, and its affiliates (cllectively, we, us, ur ) understand that privacy is imprtant t ur cnsumers and want yu t make knwledgeable decisins abut the infrmatin

More information

How Does Cloud Computing Work?

How Does Cloud Computing Work? Hw Des Clud Cmputing Wrk? Carl Mazzanti, CEO, emazzanti Technlgies IT Supprt and Clud Cmputing Services fr Small Business Hbken, NJ and NYC, 201-360- 4400 Owner [Pick the date] Hw des Clud Cmputing Wrk?

More information

WHITE PAPER SPON. Archiving 2.0: What Can You Do Next? Published February 2015 SPONSORED BY. An Osterman Research White Paper.

WHITE PAPER SPON. Archiving 2.0: What Can You Do Next? Published February 2015 SPONSORED BY. An Osterman Research White Paper. WHITE PAPER N Archiving 2.0: What Can Yu D An Osterman Research White Paper Published February 2015 SPONSORED BY SPON spnsred by spnsred by Osterman Research, Inc. P.O. Bx 1058 Black Diamnd, Washingtn

More information

WEB APPLICATION SECURITY TESTING

WEB APPLICATION SECURITY TESTING WEB APPLICATION SECURITY TESTING Cpyright 2012 ps_testware 1/7 Intrductin Nwadays every rganizatin faces the threat f attacks n web applicatins. Research shws that mre than half f all data breaches are

More information

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012 Research Reprt Abstract: The Emerging Intersectin Between Big Data and Security Analytics By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm Nvember 2012 2012 by The Enterprise Strategy Grup, Inc.

More information

Integrating With incontact dbprovider & Screen Pops

Integrating With incontact dbprovider & Screen Pops Integrating With incntact dbprvider & Screen Pps incntact has tw primary pints f integratin. The first pint is between the incntact IVR (script) platfrm and the custmer s crprate database. The secnd pint

More information

Solution Brief. Aerohive and Impulse. Powerful Network Security for Education and Enterprise

Solution Brief. Aerohive and Impulse. Powerful Network Security for Education and Enterprise Slutin Brief Aerhive and Impulse Pwerful Netwrk Security fr Educatin and Enterprise Aerhive and Impulse Intrductin In tday s highly cnnected rganizatins, end users expect secure Wi-Fi access acrss the

More information

AML Internet Manor Court, Manor Farm House, London Road, Derby, Derbyshire, DE72 2GR. Tel: 01332 650 009 Fax: 01332 650 850 Email:

AML Internet Manor Court, Manor Farm House, London Road, Derby, Derbyshire, DE72 2GR. Tel: 01332 650 009 Fax: 01332 650 850 Email: AML Internet Manr Curt, Manr Farm Huse, Lndn Rad, Derby, Derbyshire, DE72 2GR. Tel: 01332 650 009 Fax: 01332 650 850 Email: Backup@AmlInternet.c.uk Cntents Page Situatin Analysis 3 AML Internet - The Slutin

More information

FundingEdge. Guide to Business Cash Advance & Bank Statement Loan Programs

FundingEdge. Guide to Business Cash Advance & Bank Statement Loan Programs Guide t Business Cash Advance & Bank Statement Lan Prgrams Cash Advances: $2,500 - $1,000,000 Business Bank Statement Lans: $5,000 - $500,000 Canada Cash Advances: $5,000 - $500,000 (must have 9 mnths

More information

Serv-U Distributed Architecture Guide

Serv-U Distributed Architecture Guide Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v14.0.1.0 Page 1 f 16 Intrductin Serv-U

More information

Service Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S

Service Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S Service Level Agreement (SLA) Hsted Prducts Netp Business Slutins A/S Cntents 1 Service Level Agreement... 3 2 Supprt Services... 3 3 Incident Management... 3 3.1 Requesting service r submitting incidents...

More information

AuditNet Survey of Bring your own Device (BYOD) - Control, Risk and Audit

AuditNet Survey of Bring your own Device (BYOD) - Control, Risk and Audit AuditNet Survey f Bring yur wn Device (BYOD) - Cntrl, Risk and Audit The pace f technlgy mves much faster than managers and auditrs can understand and react, with updated plicies, prcedures and cntrls.

More information

WHITE PAPER PON SPON. Key Issues to Consider in Mobile Device Management. Published May 2011 SPONSORED BY. An Osterman Research White Paper

WHITE PAPER PON SPON. Key Issues to Consider in Mobile Device Management. Published May 2011 SPONSORED BY. An Osterman Research White Paper WHITE PAPER PON Key Issues t Cnsider in Mbile Device Management An Osterman Research White Paper Published May 2011 SPONSORED BY SPON spnsred by spnsred by Osterman Research, Inc. P.O. Bx 1058 Black Diamnd,

More information

Economic Value Validation Summary MAY 2012. 2012. Enterprise Strategy Group, Inc. All Rights Reserved.

Economic Value Validation Summary MAY 2012. 2012. Enterprise Strategy Group, Inc. All Rights Reserved. Ecnmic Value Validatin Summary Bx Online File Sharing & C llabr atin f r Enterprise IT MAY 2012 2012. Enterprise Strategy Grup, Inc. All Rights Reserved. EVV REPORT: Bx Online File Sharing & Cllabratin

More information

SBClient and Microsoft Windows Terminal Server (Including Citrix Server)

SBClient and Microsoft Windows Terminal Server (Including Citrix Server) SBClient and Micrsft Windws Terminal Server (Including Citrix Server) Cntents 1. Intrductin 2. SBClient Cmpatibility Infrmatin 3. SBClient Terminal Server Installatin Instructins 4. Reslving Perfrmance

More information

CLOUD COMPUTING: SECURITY THREATS AND MECHANISM

CLOUD COMPUTING: SECURITY THREATS AND MECHANISM CLOUD COMPUTING: SECURITY THREATS AND MECHANISM Vaishali Jshi 1, Lakshmi 2, Vivek Gupta 3 1,2,3 Department f Cmputer Science Engineering, Acrplis Technical Campus, Indre ABSTRACT Clud cmputing is a mdel

More information

Password Reset for Remote Users

Password Reset for Remote Users 1 Passwrd Reset fr Remte Users Curin prvides a cmpnent fr the PasswrdCurier Passwrd Prvisining System that manages the lcal passwrd cache in cnjunctin with self-service passwrd reset activities. The slutin

More information

Internet and Social Media Solicitations: Wise Giving Tips

Internet and Social Media Solicitations: Wise Giving Tips Internet and Scial Media Slicitatins: Wise Giving Tips Charities use a wide variety f methds t slicit charitable dnatins. New and pwerful technlgies utilize nt just the internet and email, but als scial

More information

Osterman Research User Guides

Osterman Research User Guides Osterman Research User Guides Hw t Evaluate and Chse a Messaging Archival Slutin 2006 Editin Osterman Research, Cntural and RITE Chice have published a user guide that will help rganizatins f all sizes

More information

PCI - Why You Need to be Compliant When Accepting Credit Card Payments. Agenda. Breaches in the Headlines. Breach Events & Commonalities

PCI - Why You Need to be Compliant When Accepting Credit Card Payments. Agenda. Breaches in the Headlines. Breach Events & Commonalities PCI - Why Yu Need t be Cmpliant When Accepting Credit Card Payments Tuesday, March 27, 2012 Agenda Breach Events & Cmmnalities Evlutin f PCI PCI Requirements Risks f Nn-cmpliance Industry Initiatives t

More information

Cloud Services MDM. Windows 8 User Guide

Cloud Services MDM. Windows 8 User Guide Clud Services MDM Windws 8 User Guide 10/24/2014 CONTENTS Overview... 2 Supprted Devices... 2 System Capabilities... 2 Enrllment and Activatin... 3 Prcess Overview... 3 Verify Prerequisites... 3 Dwnlad

More information

Welcome to Remote Access Services (RAS)

Welcome to Remote Access Services (RAS) Welcme t Remte Access Services (RAS) Our gal is t prvide yu with seamless access t the TD netwrk, including the TD intranet site, yur applicatins and files, and ther imprtant wrk resurces -- whether yu

More information

Mobilizing Healthcare Staff with Cloud Services

Mobilizing Healthcare Staff with Cloud Services Mbilizing Healthcare Staff with Clud Services Published May 2012 Mbile Technlgies are changing hw healthcare staff delivers care. With new pwerful integrated slutins available fr the healthcare staff,

More information