WHITE PAPER SPON. Messaging and Web Security Best Practices for 2011 and Beyond. Published March 2011 SPONSORED BY. An Osterman Research White Paper
|
|
- Jean Rodgers
- 8 years ago
- Views:
Transcription
1 WHITE PAPER N Messaging and Web Security Best Practices fr 2011 and Beynd An Osterman Research White Paper Published March 2011 spnsred by SPONSORED BY SPON spnsred by Osterman Research, Inc. P.O. Bx 1058 Black Diamnd, Washingtn USA Tel: Fax: inf@stermanresearch.cm twitter.cm/msterman
2 Executive Summary In an Osterman Research survey cnducted during January 2011, decisin makers and influencers demnstrated that they are decidedly pessimistic abut the future f spam and malware prblems fr 2011, as shwn in the fllwing figure. Predictins Abut Glbal Spam and Malware Prblems in 2011 They have little reasn t be ptimistic: despite recent, albeit temprary gd news such as reductins in the number f spam messages traversing the Internet there has been relatively little gd news in the cntext f threats directed against messaging and Web users. Further, while many decisin makers are taking messaging and Web security threats quite seriusly, a sft ecnmy cupled with threats that are rapidly increasing in sphisticatin and severity means that many rganizatins are nt keeping pace with the threats they face. Fr example: Symantec.clud reprted that 41.1% f all f the malicius dmains they blcked during January 2011 were new, representing an increase f 7.9% frm the mnth befre i. The Rustck btnet was mre r less shut dwn during the 2010 Hliday seasn. Hwever, GFI Sftware reprts that in January 2011 Rustck was reactivated and its spam vlume increased by 98% ii almst vernight. As f late March 2011, Rustck has been silenced nce again, but has the ptential fr cming back nline Osterman Research, Inc. 1
3 SpamTitan reprted results frm a 2010 survey that fund that 49% f small- t mid-sized businesses had nt taken even basic steps tward crafting a scial media plicy iii. Edgewave reprted that during the mnth ending February 23, 2011, there were anywhere frm 49 t 352 new spam campaigns launched every day iv. In 2010, Websense Security Labs fund that 61% f all data stealing attacks ccurred ver the Web r v. KEY TAKEAWAYS There are five key pints that readers f this white paper shuld understand and appreciate: Spam is still a majr prblem Despite sme recent gd news n the spam frnt, spam vlumes cntinue t increase and are expected t d s fr many years t cme. Because it saps strage, bandwidth and emplyee prductivity; and is increasingly used as part f malware-distributin campaigns, spam cntinues t be a very serius prblem. Malware is a rapidly grwing threat Malware infiltratin cntinues t be a vexing issue fr IT management because f a) the increasing sphisticatin f the threats, b) the financial and ther damage they can cause, and c) the sheer vlume f new malware that is being distributed acrss the Internet. There are mre places fr spam and malware t enter an rganizatin The number f venues fr unwanted cntent t enter an rganizatin is grwing. In additin t the nrmal channel, this cntent nw increasingly enters an rganizatin thrugh scial media tls like Twitter and Facebk, persnal Webmail accunts used fr wrk-related applicatins, Web-enabled smartphnes, ther mbile devices like ipads, the grwing number f clud-based applicatins used in the wrkplace, vice-ver-ip systems, real time cmmunicatin tls like instant messaging, flash drives, applicatins that users dwnlad that are nt sanctined by IT, and nrmal Web surfing t legitimate Web sites. The netwrk perimeter is disappearing, making rganizatins mre vulnerable Related t the pint abve is that the netwrk perimeter is rapidly disappearing. Where there used t be a clear distinctin between the crprate netwrk and the utside wrld, the grwing number f emplyees wh wrk frm hme, cupled with the increasing number f mbile devices used fr bth wrk and persnal applicatins, means that the netwrk perimeter ften des nt exist. Data lss is becming a greater risk The granularity and thrughness f the plicies t manage messaging and Web applicatins have nt kept pace with the threats that rganizatins face. This makes rganizatins mre vulnerable t data lss, financial lss, damage t crprate reputatin, higher remediatin csts and ther prblems. The risk f data lss thrugh the Web has been exacerbated dramatically with the rapid grwth f scial media and ther Web 2.0 applicatins Osterman Research, Inc. 2
4 ABOUT THIS WHITE PAPER This white paper discusses the threats that rganizatins face frm spam, malware and ther threats directed at their messaging and Web capabilities. It uses research frm recent Osterman Research surveys, as well as infrmatin frm a variety f ther data surces. It was spnsred by a leading vendr f messaging and Web security capabilities Websense; infrmatin abut and cntact infrmatin fr the cmpany is included at the end f this white paper. Electrnic Cmmunicatin and Cllabratin is Dangerus MOST ORGANIZATIONS HAVE EXPERIENCED MALWARE INFILTRATION Mst rganizatins have experienced sme srt f malware infiltratin thrugh a variety f surces, as shwn in the fllwing figure frm an Osterman Research survey vi cnducted during Security Prblems That Occurred During the Previus 12 Mnths The ccurrence f malware infiltratin has becme decidedly wrse ver the past several years. Fr example, in a 2007 survey cnducted by Osterman Research vii, we fund that malware had infiltrated thrugh in nly 25% f rganizatins surveyed, while nly 22% had 2011 Osterman Research, Inc. 3
5 experienced malware infiltratin thrugh the Web decidedly fewer than in the mre recent survey nted abve. McAfee reprted that their identificatin f new malware increased frm rughly 16,000 new samples per day in 2007 t 29,000 in 2008 t 46,000 per day in 2009 t 60,000 in 2010 viii an increase f 275% in just three years. SPAM CONTINUES TO BE A SERIOUS PROBLEM In additin t the rapid increase in malware penetratin ver the past few years, the spam prblem cntinues t vex rganizatins large and small. Fr example, Symantec.clud reprted that spam accunted fr 89.1% f in 2010, r rughly billin spam messages sent n a typical day ix. While spam levels have drpped significantly in recent mnths in part due t the clsure f pharmaceutical affiliate seller Spamit and btnets Xarvester, Rustck and Lethic in 2010 x there cntinue t be mre than 100 billin spam messages traversing the Internet each day a figure that will increase ver the lng term. WHERE DO THE PROBLEMS COME FROM? There are a large and grwing number f platfrms and venues frm which malware and spam can enter an rganizatin: was the dminant methd fr distributing malware frm the early 2000s t rughly 2009 befre it was vertaken by the Web as the primary attack vectr. Hwever, cntinues t be the primary methd fr distributing spam thrugh a variety f venues desktp , mbile phnes using SMS, etc. Tday, is used largely fr blended threats spam messages that cntain links t malware-hsting sites. Blended threats are a mre sphisticated frm f attack because they require a greater level f security integratin by cmbining traditinal and Web security capabilities. Websense fund that 89.9% f all unwanted s in circulatin during 2010 cntained links t spam sites r malicius websites xi. User mistakes Users will smetimes install malware r cmprmised cde n their systems, mstly ften inadvertently. This ccurs when they install ActiveX cntrls, dwnlad cdecs r varius applicatins that are intended t address sme perceived need (such as capability that IT des nt supprt r that a user needs when wrking frm hme), r when they respnd t scareware and fake anti-virus (Rgue AV r Fake AV) sftware. Rgue AV is a particularly dangerus type f malware, largely because it preys n users wh are attempting t d the right thing t prtect their cmputers frm threats. Even users wh are reasnably experienced can be fled by a well-crafted Rgue AV message. Underscring the seriusness f the prblem, Symantec fund that in the year ended June 2009, there were 43 millin Rgue AV installatin attempts frm mre than 250 different prgrams xii. Varius Web site threats There are a number f ways fr malware t enter an rganizatin thrugh Web surfing r the use f Web-based applicatins: 2011 Osterman Research, Inc. 4
6 Crss-cmpnent attacks ccur when tw inncuus pieces f malware cde appear n the same Web page. Separately, they are harmless and difficult t detect; hwever, when they appear simultaneusly n a single page, they can infect a user s machine with malware. With Crss Site Request Frgery (CSRF) attacks, inncent-lking Web sites generate requests t different sites. CSRF attacks have explited vulnerabilities in Twitter, enabling site wners t acquire the Twitter prfiles f their visitrs. As Web 2.0 applicatins ften leverage XML, XPath, JavaScript and JSON, Adbe Flash and ther rich Internet applicatins, thse applicatins are frequently vulnerable t injectin attacks using these envirnments. These technlgies are ften used t evade anti-virus defenses, mtivating attackers t leverage them. Crss-site scripting attacks embed tags in URLs when users click n these links, malicius Javascript cde will be executed n their machines. SQL injectin attacks ccur when SQL cmmands and meta-characters are inserted int input fields n a Web site, the gal f which is t execute back-end SQL cde. Smartphnes Anther surce f Web threats is the grwing use f Web-enabled smartphnes. Osterman Research has fund that few rganizatins require any srt f malware prtectin n these devices, making netwrks vulnerable t malware that enters thrugh a mbile device when users surf the Web, access r scial media, etc. Cmpunding the prblem is the fact that mbile devices are widely used (mre than 90% f crprate infrmatin wrkers als have an emplyer-prvided mbile device xiii ) and a large prprtin f users emply their mbile device as their primary client fr checking wrk-related frm hme. The grwth and imprtance f smartphnes is being explited by criminals. Fr example, ING custmers in Pland have been hit with a man-in-the-middle attack (a variant f Zeus) that will install malware designed t intercept passcdes sent t Blackberry and Symbian devices via SMS as part f a tw-factr authenticatin scheme xiv. The first malware that targets the Ggle Andrid OS was discvered in August McAfee reprted a 46% increase in mbile-fcused malware during 2010 cmpared t the year befre. Cmprmised search engine queries Cmprmised search engine queries are anther methd fr criminals t distribute malware. This frm f attack relies n users making typgraphical errrs when typing search queries, resulting in the presentatin f malware-laden sites during Web queries. Search engine pisning is particularly effective fr timely and ppular search terms, such as the latest celebrity gssip. Websense reprted that searching fr breaking trends and current news represented a higher risk (22.4%) than searching fr bjectinable cntent (21.8%) xv. Drive-by dwnlads Related t the blended threat is a drive-by dwnlad that ccurs when a user visits a Web site and has malware autmatically dwnladed t his r her cmputer. In sme cases, a user will visit a Web site and see a ppup windw upn clicking the OK buttn in the 2011 Osterman Research, Inc. 5
7 ppup, a Java applet, an ActiveX cntrl, etc. will be installed n the user s cmputer withut their cnsent. Direct hacker attacks Direct hacker attacks can include a variety f explits, including hackers attacking a knwn vulnerability in a Web brwser, r expliting an lder versin f a brwser r ActiveX cntrl. Cmprmised, legitimate Web sites Many legitimate Web sites have been hacked and have served up malware t unsuspecting visitrs. Kaspersky fund that ne in every 3,000 Web sites served up sme srt f malware in 2010 xvi, while the Online Trust Alliance reprted that in excess f 10 billin advertising impressins in 2010 cntained malware xvii, with a dramatic increased nted during the last quarter f 2010 xviii. Websense reprted that 79.9% f Web sites with malicius cde in 2010 were legitimate sites that had been cmprmised xix. Gelcatin A grwing number f applicatins use individuals real-time lcatin, permitting criminals t execute mre targeted attacks phishing attacks that emply gelcatin may be mre difficult fr users t discern as a threat. Many users seem unaware f the malware and ther threats they face frm revealing their lcatin, and ften will freely share this infrmatin withut cnsidering the cnsequences. Other prblems Off-netwrk users, such as emplyees wh wrk frm hme, are anther surce f Webbased threats. An unprtected user f a crprate asset, such as Outlk Web Access that is nt accessed via a VPN, r a laptp cmputer that becmes infected and later is cnnected t the crprate netwrk, can cnstitute a serius threat. Insufficient authenticatin cntrls will smetimes enable cyber-criminals t crack administrative accunts in rder t gain access t sensitive infrmatin. Fr example, BitDefender fund in a check f randmly verified accunts that three-quarters f users emply the same passwrd fr their and scial media accunts. GROWING USE OF SOCIAL MEDIA, WEB 2.0 INCREASES THE PROBLEM Scial netwrking tls are explding in ppularity. Fr example, Facebk had millin unique visitrs in December 2010 in just the United States, an increase f 38% frm December 2009 xx. December 2010 als saw 26.6 millin US visitrs t LinkedIn and 23.6 millin visitrs t Twitter, representing increases f 30% and 18%, respectively, cmpared t a year earlier xxi. Further, nt nly the access t scial media, but their penetratin is grwing: fr example, while the number f unique visitrs t Facebk increased by 38% during the year ended December 2010, ttal minutes spent n the site increased by 79% xxii. The grwth in ppularity f scial media tls has nt been lst n hackers and ther criminals, leading t active targeting f scial media tls acrss a wide spectrum. Fr example: 2011 Osterman Research, Inc. 6
8 While phishing sites that target scial media accunt fr less than ne percent f current phishing sites wrldwide, these sites received 62.4% f all phishing impressins in the six mnths ended June 2010 xxiii. Rughly 20% f the news feeds n Web sites cntain sme srt f malware infectin xxiv. The criminal rganizatin that perates Kbface maintains, as f late 2010, nearly 22,000 Facebk accunts (with 935,000 friends), mre than 350,000 Blgger accunts, and mre than 520,000 Ggle accunts xxv. Websense fund that 10% f links psted in Facebk are either spam r malicius xxvi. One f the fundamental prblems with scial media is that many mre rganizatins allw the use f scial media (ften ding nthing t prtect the rganizatin frm its threats) than cnsider it t be legitimate fr use in their rganizatins, as shwn in the fllwing table frm a recent Osterman Research survey. Organizatinal Views Abut Varius Scial Media Tls xxvii Tl Allw Use Cnsider t be Legitimate Difference LinkedIn 70% 64% 6% YuTube 52% 35% 17% Twitter 50% 34% 16% Facebk 48% 31% 17% MySpace 35% 17% 18% Peer-t-peer file sharing 22% 21% 1% Anther imprtant cnsideratin, albeit nt directly a security issue per se, is that strictly persnal use f scial media can represent an enrmus prductivity cst t an rganizatin. Fr example, if users are updating their persnal status n Facebk, lking fr a new jb n LinkedIn, r simply surfing fr funny cmments n Twitter, that represents an enrmus lss f prductivity. Using SpamTitan s calculatr, an rganizatin f 100 users, each f whm spends 20 minutes per day n persnal Facebk use at wrk and whse average annual salary is $45,000, will cst the rganizatin nearly $186,000 in lst prductivity each year. What this demnstrates is that scial media use is allwed in mre rganizatins than actually cnsider it t be legitimate, indicating that many in IT departments may nt accept its use, but they are ding little r nthing t prevent it frm being used, resulting in bth prductivity lsses and excessive expsure t malware Osterman Research, Inc. 7
9 The Cnsequences f Pr Cmmunicatin Security USERS NEED CONTINUOUS ACCESS TO COMMUNICATIONS Organizatins have lng struggled with hw they shuld r shuld nt manage the use f varius cmmunicatin tls like , the Internet in general, the Web and Web 2.0 tls. The emergence f scial media applicatins and services makes that questin mre relevant and als mre difficult. Given the range f security threats that can be received by and the Web, as well as launched frm scial media sites, rganizatins need t be extremely careful abut their emplyees use f thse sites in a wrk envirnment. The prblem is exacerbated by the grwing trend fr emplyees t wrk frm hme, at times n unprtected r inadequately prtected systems that can easily intrduce threats int the crprate netwrk. These are prblems that must be addressed. Cntinuing grwth in the use f , the Web, clud-based applicatins, and the grwing variety f Web 2.0 tls make emplyees mre prductive and efficient. Further, these capabilities supprt the greater cncept f mbility allwing emplyees t wrk frm hme r n the rad with the same capabilities they wuld have in the ffice. Mbility in its larger cntext will becme increasingly imprtant as rganizatins lk t drive dwn the cst f real estate, taxes and pwer by perating with the same number f emplyees, but with less ffice space. The last pint is ne that cannt be underestimated: as cmpanies seek t reduce their cst f peratins, they will fcus mre n having emplyees wrk remtely. Highly reliable cmmunicatins and infrmatin access will be critical t supprting these emplyees and rbust security will be even mre imprtant t enable these emplyees t wrk remtely. THE CONSEQUENCES OF POOR SECURITY The prblems assciated with security explits impact just abut every aspect f an rganizatin: Decrease in emplyee and IT staff prductivity Emplyees waiting fr malware t be remved frm their cmputers will be significantly less prductive during these dwntime perids in sme cases, 100% less prductive. Further, any srt f messaging r Web explit will require IT staff t address the issue as sn as pssible after the prblem is discvered. This can lead t IT staff wrking n weekends, the delay f varius IT prjects, rebuilding desktps, and ther csts that may be difficult t estimate. Security explits can als lead t extended r ther service utages that can have serius ramificatins n user prductivity. Financial lsses Lss f funds that arise frm the use f malware like Zeus that is designed t steal mney frm victims financial accunts can have a devastating impact n an rganizatin. Just ne f the many examples f Zeus victims is Parkinsn Cnstructin, a firm with $20 millin in annual revenue that lst $92,000 nearly 0.5% f its annual revenue simply because the wner f the firm clicked n claiming t be frm the Scial Security Administratin xxviii. Lss f custmer data Data breaches can result in the need t remediate them in expensive ways, such as ntifying custmers via pstal mail that their data was lst, prvisin f credit reprting services t the victims fr a year r lnger, lss f future business, embarrassing press 2011 Osterman Research, Inc. 8
10 cverage and lss f gdwill. The Pnemn Institute has determined that the cst f a single data breach ranges frm $98 in the United Kingdm t $204 in the United States xxix. Lss f internal data Trade secrets, cnfidential infrmatin and ther intellectual prperty can be lst as a result f pr security. These lsses can ccur acrss a wide range f venues and activities, including sensitive cntent that is mistakenly sent in an r an unencrypted file transfer, data that is lst n an unencrypted mbile device r flash drive, r data that is taken hme by emplyees and stred withut any IT cntrls. Vilatin f statutes and cmpliance requirements If adequate security defenses are nt maintained, rganizatins can run aful f a wide variety f statutes that require data t be prtected and retained. Hwever, ne study fund that decisin makers in ne ut f five rganizatins d nt knw which cmpliance laws apply t their rganizatin xxx. A small sampling f these statutes but by n means an exhaustive list include the fllwing: The Payment Card Industry Data Security Standard (PCI DSS) encmpasses a set f requirements fr prtecting the security f cnsumers and thers payment accunt infrmatin. It includes prvisins fr building and maintaining a secure netwrk, encrypting cardhlder data when it is sent ver public netwrks and assigning unique IDs t each individual that has access t cardhlder infrmatin. The Gramm-Leach-Bliley Act (GLBA) requires financial institutins that hld persnal infrmatin t transmit and stre this infrmatin in such a way that its integrity is nt cmprmised. GLBA requires financial institutins t cmply with a variety f Securities and Exchange Cmmissin and NASD rules. A keystrke lgger r crss-site scripting attack, fr example, that permits sensitive financial data t be expsed t a third party culd ptentially vilate GLBA. The UK Data Prtectin Act impses requirements n businesses perating in the United Kingdm t prtect the security f the persnal infrmatin it hlds. Japan s Persnal Data Prtectin Law is designed t prtect cnsumers and emplyees persnal infrmatin. It includes prvisins fr ensuring the security and disclsure f databases that cntain this infrmatin, amng ther requirements. The Persnal Infrmatin Prtectin and Electrnic Dcuments Act (PIPEDA) is a Canadian privacy law that applies t all cmpanies perating in Canada. Like many ther privacy laws, it requires that persnal infrmatin be stred and transmitted securely. Califrnia s SB1386 (the Database Security Breach Ntificatin Act) is a far reaching law that requires any hlder f persnal infrmatin abut a Califrnia resident regardless f where they are lcated t ntify each resident whse infrmatin may have been cmprmised in sme way. Since Califrnia passed this grundbreaking data breach ntificatin law, mst ther US states have passed similar laws. These laws require 2011 Osterman Research, Inc. 9
11 rganizatins t ntify custmers and thers fr whm sensitive data is held if their data is expsed t an unauthrized party an expensive prpsitin in almst every case. Other issues There are a number f ther prblems that can ccur frm malware and ther threats delivered via , the Web, Web 2.0 applicatins and ther capabilities, including: Internet service utages, which can create serius prblems fr cre business services such as , cllabratin, and clud-based CRM systems. Related t these utages are the ptential fr data leakage, and lack f cmpliance with mnitring capabilities and archiving requirements when emplyees use persnal Webmail systems t send crprate data. Web sites being taken dwn fr lng perids in rder t patch the cde t eliminate an explit. The expsure f FTP and ther lgin credentials t attackers and ther cybercriminals. The dwnlad f malware that can turn crprate and hme-based cmputers int zmbies used as part f a bt netwrk. Users dwnlading illegal cntent, such as cpyrighted wrks r prngraphy using crprate assets. Fr example, a study published by Cisc ScanSafe fund that the number f emplyees wh had attempted t dwnlad MP3 files and illegally btained sftware has recently increased xxxi. A BitDefender study fund that 63% f users seeking prngraphy nline had been infected with malware at least twice xxxii. What Shuld Yu D t Address the Prblem? DEFINE WHAT YOU MUST DO It may sund bvius, but IT and business decisin makers must determine exactly what they must prtect tday, and what they can reasnably expect that they will need t prtect ver the next few years. Fr example, this list shuld include things like: On-premise, IT-deplyed crprate systems, smartphnes, ipads and ther capabilities frm spam and malware. Threats intrduced by emplyee devices that are brught int the wrkplace and that are used t access crprate resurces. This shuld include ipads, persnal smartphnes, persnal laptps, etc. Mnitring and/r preventing what leaves the rganizatin via crprate , persnal Webmail, laptps, smartphnes and ther mbile devices, scial media psts, flash drives, prtable hard drives, etc. t prtect against data lss. Cnsider hw yur data plicies can be applied acrss all channels Osterman Research, Inc. 10
12 Encryptin f sensitive cmmunicatins t remain in cmpliance with bth regulatry requirements and best practices. Mnitring internal cmmunicatins fr sexually r racially ffensive cntent, as well as sensitive infrmatin that culd be stred n desktps, servers r ther systems withut apprpriate access cntrls. Mnitring emplyees activities when accessing crprate resurces frm persnally wned devices when wrking frm hme r remtely. Archiving business recrds that shuld be retained. While archiving may nt seem like a security issue per se, archiving systems shuld be cnsidered alng with spam- and malware-filtering systems because f the ramificatins that each has n the ther. Nn-traditinal security threats, such as cnfidential infrmatin that might be left n PCs at a htel s business center. Fr example, a senir manager at a leading anti-virus cmpany recently reprted that he fund the itinerary fr a general s visit t a military installatin n a htel business center s PC. DETERMINE WHAT NOT TO DO As imprtant as establishing what must be dne is t establish what must nt be dne. Fr example, a blanket prhibitin n the use f scial media tls like Facebk r Twitter, r preventing users frm emplying persnal Webmail systems at wrk can have negative ramificatins n a number f levels. Emplyee mrale may suffer as a result, as well as user prductivity if emplyees are nt permitted t use certain cnsumer-fcused tls that can help them get their wrk dne. Plus, emplyees will prbably use these tls anyway unless IT impses dracnian cntrls that will mst likely have the side effect f impairing emplyee prductivity. ESTABLISH DETAILED AND THOROUGH POLICIES Any rganizatin that seeks t prtect their users, data and netwrks frm Web-based threats must establish detailed and thrugh plicies abut acceptable use f all f their nline tls: , instant messaging, Web 2.0 applicatins, cllabratin tls, smartphnes, flash drives and the Web itself. Successfully addressing these prblems must start with an acknwledgement f the threat landscape and the crrespnding plicies abut hw tls will be used befre technlgies are deplyed t address the prblems. Further, there must be buy-in acrss the rganizatin in rder fr plicies t be effective. Fr example, a plicy against the use f scial media tls may seriusly impact a marketing department s effectiveness at building the crprate brand; similarly, nt allwing the use f unauthrized file transfer tls may prevent users frm sending large files t prspects r custmers in a timely manner. It is imprtant t nte that cmmunicatin plicies must be apprpriate and nt s brad as t prevent emplyees frm participating in lawful activities. Fr example, the Natinal Labr Relatins Bard has taken the psitin that plicies fcused n scial media are apprpriate t a pint. Hwever, crprate plicies that prevent emplyees frm discussing their emplyer n their wn time, sharing cmments abut unin rganizatin, etc. may nt be legal xxxiii Osterman Research, Inc. 11
13 DEPLOY A MULTI-LAYERED, MULTI-LEVEL DEFENSE STRATEGY It is als imprtant t deply a multi-layered, multi-level defense strategy. This is becming increasingly critical as the netwrk perimeter becmes less well defined ver time as nted earlier. Fr example, a traditinal security architecture had a clearly defined firewall that separated internal IT-managed resurces frm the utside wrld. Hwever, the increasing use f persnal devices that can cnnect as easily t a Starbucks Wi-Fi netwrk as they can t a crprate netwrk, Web 2.0 applicatins like Twitter, r emplyees using their persnal smartphnes t access crprate n weekends means that the netwrk perimeter is rapidly disappearing. This has made security a much mre difficult prpsitin fr IT decisin makers, largely because there are s many mre devices and data surces t prtect. Cnsequently, any rganizatin shuld cnsider deplying: -based defenses that include anti-virus, anti-malware, anti-spam and DLP capabilities. Web cntent mnitring capabilities that include basic URL filtering, granular remediatin capabilities that allw mre sphisticated threat management, and real-time security capabilities that will determine if requests frm users and applicatins cmply with security plicies. Integrated Web and security as a way t defend against mre sphisticated blended threats and reduce the cst f managing multiple systems. Endpint capabilities that include anti-virus capabilities n client machines, remvable media scanning capabilities, and prtectin fr emplyees persnal, hme-based platfrms. Clud-based threat intelligence, such as reputatin services, that can determine if cntent is likely t be acceptable r unacceptable befre it is delivered t the crprate netwrk. Real-time mnitring and reprting capabilities that will prvide visibility int emplyee activity in rder t reduce verall risk expsure. Feedback lp systems that will enable cmmunity-watch defenses and reprts n threats like spam and phishing attempts. CONSIDER VARIOUS DELIVERY MODELS There are a variety f ways in which messaging and Web security capabilities can be managed, including: Server-based systems On-premise slutins deplyed at the server level, where mst data typically resides, reslve many f the prblems assciated with client-side systems by allwing easier deplyment and management capabilities, as well as the ability t mre easily enfrce crprate plicies and changes thrugh a centralized management interface. Gateway-based systems Gateway security stps threats at the earliest pssible pint in the n-premise infrastructure and is a best practice fr rganizatins that manage n-premise defenses Osterman Research, Inc. 12
14 Client-side systems Client-based systems, such as URL filtering tls, anti-virus tls, spyware blckers and the like prvide useful capabilities and can be effective at preventing a variety f threats client-side anti-virus tls, fr example, are an imprtant best practice fr any rganizatin t prevent malware frm being intrduced via flash drives r ther lcal surces. It is imprtant t nte here that mst traditinal, cnsumer-riented anti-virus prducts are client-based tls. Client-side capabilities can be relatively inexpensive and are ften prvided as part f desktp prtectin suites that include anti-virus, anti-spam and ther capabilities. While client-side systems are effective in smaller rganizatins, they ften d nt scale well. They are time-cnsuming t install and update fr large numbers f users and can be quite expensive t deply in larger rganizatins. Centralized management and deplyment capabilities are essential t cst-effectively install, update and enfrce crprate plicies using client-based systems, particularly fr larger rganizatins. SaaS/clud-based services SaaS and hsted services are increasing in ppularity and ffer anther ptin fr rganizatins t implement a variety f threat-prtectin capabilities. The primary advantages f this mdel are that n investments in infrastructure are required, up-frnt csts are minimal, nging csts are predictable, and all management and upgrades f the system are prvided by the SaaS r clud service. A ptential disadvantage f SaaS r clud services, particularly fr Web traffic, is prxying all traffic t the hst and addressing latency issues. Their csts can be higher than fr npremise systems in sme situatins, althugh they will nt necessarily be mre expensive. Fr example, SaaS vendrs merely rent space n a server, prviding a very inexpensive methd fr accessing sftware and infrastructure technlgies. Althugh rganizatins may pay mre t a SaaS r hsted security vendr than they wuld fr an n-site slutin, the value f the hsted infrastructure and administratin prvided by the third party vendr can prvide a lwer ttal cst f wnership in many cases. Managed services Managed services are similar in cncept t hsted services, but a third party either with staff n-site r via a remte service manages the n-premise infrastructure, installs upgrades, updates signature files and the like. Csts can vary widely fr managed services depending n the size f the rganizatin, whether third-party management persnnel are lcated n-premise r in the third party s data center, and ther factrs. Virtual appliances Anther ptin, and ne that is finding significant uptake in security applicatins, is the virtual appliance mdel a pre-cnfigured cmbinatin f a dedicated perating system and security sftware that runs in a virtualized envirnment. Advantages f the virtual appliance apprach include the ease f deplying new capabilities, the ability t mve virtual appliances frm ne physical server t anther fr purpses f maintenance r failver prtectin, very high availability, reduced pwer cnsumptin and minimal IT staff time t manage Osterman Research, Inc. 13
15 Hybrid fferings A newer apprach that is increasingly ffered by vendrs is t cmbine n-premise infrastructure with hsted r clud based services. Fr example, an security vendr may prvide a malware-filtering appliance n-site, but cuple this with a hsted filtering service that acts as a srt f pre-filter; r they may rely n a hsted anti-virus service and desktp anti-virus tls. The fundamental advantage f this apprach is that the n-premise infrastructure is prtected frm spikes and verall increases in the vlume f malicius traffic ver time, thereby preserving the n-premise investment and maintaining acceptable perfrmance f messaging. A hybrid apprach may als be deplyed fr Web security, where n-premise infrastructure is used t secure larger ffices and clud-based services are used t secure smaller sites where n-premise infrastructure is t expensive t supprt. Enterprises still prefer in-huse ver hsted slutins, althugh this is changing ver time. Hsted slutins tend t be mre accepted in small- t medium-sized business with less develped IT staff and fewer resurces. These rganizatins ften need external expertise and can benefit frm the CAPEX and OPEX savings f clud slutins. Similarly, appliances als tend t ffer the SMB the cnvenience f an integrated slutin. Larger rganizatins tend t have well-staffed IT departments, and s gain less frm the benefits f appliances, unless thse appliances are fr remte r branch lcatins where there may be a lack f lcal expertise. Plus, large rganizatins tend t have extra server hardware enabling them t realize the CAPEX cst savings affrded by service prviders. Evidence t this pint is the ppularity f in-huse managed server sftware. Given the size f their requirements, large rganizatins can als justify internal persnnel and s may nt be realize the OPEX savings f clud services. Having said that, while large rganizatins may nt have been the ideal play fr clud service prviders in the past, the market is definitely shifting. As IT cntinues t dwnsize and utsurce, clud prviders are gaining tractin in larger rganizatins precisely because f the savings they can ffer. This is particularly true when the buy discussin is cnducted at the CIO level. When evaluating security capabilities, it is imprtant t keep in mind three key questins: Will there be the resurces available t cntinually maintain the infrastructure, either thrugh IT staff cntinually updating capabilities r via an autmated update prcess? If nt, anti-malware and anti-spam capabilities can becme utdated and leave rganizatins mre vulnerable t infiltratin by unwanted and damaging cntent. Related t the questin abve, will the in-huse persnnel have the training and time available t manage the infrastructure? This is a particularly imprtant cnsideratin fr SMBs that may lack the persnnel, training r time t prperly manage the security infrastructure. Organizatins whse IT staff may cnsist f a few hurs per week frm 2011 Osterman Research, Inc. 14
16 the ffice manager can end up with security capabilities that are nt prperly cnfigured because they are simply are t cmplex nt t be managed by a full-time IT staff member. Organizatins need t cnsider the cst f managing multiple layers f defense and multiple delivery mdels. D IT resurces exist t manage everything? If nt, cnsider slutins that cnslidate security capabilities, as well as delivery mdels. Spnsr f This White Paper Websense Srrent Valley Rad San Dieg, CA USA Websense, Inc., a glbal leader in unified Web, data and cntent security slutins, delivers the best security fr mdern threats at the lwest ttal cst f wnership t tens f thusands f enterprise, midmarket and small rganizatins arund the wrld. Distributed thrugh a glbal netwrk f channel partners and delivered as sftware, appliance and sftware-as-a-service (SaaS), Websense cntent security slutins help rganizatins leverage new cmmunicatin, cllabratin and Web 2.0 business tls while prtecting frm advanced persistent threats, preventing the lss f cnfidential infrmatin and enfrcing Internet use and security plicies Osterman Research, Inc. 15
17 2011 Osterman Research, Inc. All rights reserved. N part f this dcument may be reprduced in any frm by any means, nr may it be distributed withut the permissin f Osterman Research, Inc., nr may it be resld r distributed by any entity ther than Osterman Research, Inc., withut prir written authrizatin f Osterman Research, Inc. Osterman Research, Inc. des nt prvide legal advice. Nthing in this dcument cnstitutes legal advice, nr shall this dcument r any sftware prduct r ther ffering referenced herein serve as a substitute fr the reader s cmpliance with any laws (including but nt limited t any act, statue, regulatin, rule, directive, administrative rder, executive rder, etc. (cllectively, Laws )) referenced in this dcument. If necessary, the reader shuld cnsult with cmpetent legal cunsel regarding any Laws referenced herein. Osterman Research, Inc. makes n representatin r warranty regarding the cmpleteness r accuracy f the infrmatin cntained in this dcument. THIS DOCUMENT IS PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND. ALL EXPRESS OR IMPLIED REPRESENTATIONS, CONDITIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE DETERMINED TO BE ILLEGAL. i Symantec.clud MessageLabs January 2011 Intelligence Reprt ii iii iv v Websense 2010 Threat Reprt vi Messaging and Web Security Market Trends, , Osterman Research, Inc. vii Messaging, Web and IM Security Market Trends, , Osterman Research, Inc. viii ix Symantec.clud MessageLabs January 2011 Intelligence Reprt x RSSfeed_IWK_News xi Websense 2010 Threat Reprt xii xiii Mbile Messaging Market Trends, , Osterman Research, Inc. xiv xv Websense 2010 Threat Reprt xvi xvii xviii xix Websense 2010 Threat Reprt xx U.S. Digital Year in Review 2010, cmscre xxi U.S. Digital Year in Review 2010, cmscre xxii U.S. Digital Year in Review 2010, cmscre xxiii Micrsft Security Intelligence Reprt, Vlume 9, January thrugh June 2010 xxiv xxv Kbface: Inside a Crimeware Netwrk, Nvember 12, 2010 xxvi Websense 2010 Threat Reprt xxvii Messaging and Web Security Market Trends, , Osterman Research, Inc. xxviii xxix Five Cuntries: Cst f a Data Breach, Pnemn Institute LLC xxx Surce: Webrt Sftware, Inc. xxxi Illegal internet dwnlads at wrk skyrcket, IT Pr, January 13, 2010 xxxii xxxiii Hw t Stay n the NLRB's "Friends" List, Bullivant Huser Bailey PC 2011 Osterman Research, Inc. 16
The Cost Benefits of the Cloud are More About Real Estate Than IT
y The Cst Benefits f the Clud are Mre Abut Real Estate Than IT #$#%&'()*( An Osterman Research Executive Brief Published December 2010 "#$#%&'()*( Osterman Research, Inc. P.O. Bx 1058 Black Diamnd, Washingtn
More informationACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.
Web Develpment Offshre Develpment Outsurcing SEO ACTIVITY MONITOR This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it
More informationUniversity of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments
University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department
More informationACTIVITY MONITOR Real Time Monitor Employee Activity Monitor
ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library
More informationWHITE PAPER SPON. Protecting Mobile Devices from Malware Attack. Published March 2015. An Osterman Research White Paper. sponsored by.
WHITE PAPER N Prtecting Mbile Devices frm An Osterman Research White Paper Published March 2015 spnsred by SPON spnsred by Osterman Research, Inc. P.O. Bx 1058 Black Diamnd, Washingtn 98010-1058 USA Tel:
More informationData Protection Act Data security breach management
Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing
More informationWhite Paper for Mobile Workforce Management and Monitoring Copyright 2014 by Patrol-IT Inc. www.patrol-it.com
White Paper fr Mbile Wrkfrce Management and Mnitring Cpyright 2014 by Patrl-IT Inc. www.patrl-it.cm White Paper fr Mbile Wrkfrce Management and Mnitring Cpyright 2014 by Patrl-IT Inc. www.patrl-it.cm 2
More informationImproved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1
Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues
More informationKey Steps for Organizations in Responding to Privacy Breaches
Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins
More informationInformation Services Hosting Arrangements
Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based
More informationFile Sharing And Swimming Sprawl
WHITE PAPER N The Need fr Enterprise-Grade Synchrnizatin An Osterman Research White Paper Published August 2012 spnsred by spnsred by SPONSORED BY SPON spnsred by Osterman Research, Inc. P.O. Bx 1058 Black
More informationWhite Paper. SharePoint and the Consumerization of IT: Considerations for BYOD Success. Authors: Aseem Pandit and Prateek Bhargava
White Paper SharePint and the Cnsumerizatin f IT: Cnsideratins fr BYOD Success Authrs: Aseem Pandit and Prateek Bhargava The Evlutin f IT Cnsumerizatin & BYOD BYOD refers t the plicy f permitting emplyees
More informationThe ADVANTAGE of Cloud Based Computing:
The ADVANTAGE f Clud Based Cmputing: A Web Based Slutin fr: Business wners and managers that perate equipment rental, sales and/r service based rganizatins. R M I Crpratin Business Reprt RMI Crpratin has
More informationWHITE PAPER SPON. The Need for Enterprise-Grade File Sharing and Synchronization. Published August 2012 SPONSORED BY. An Osterman Research White Paper
WHITE PAPER N The Need fr Enterprise-Grade Synchrnizatin An Osterman Research White Paper Published August 2012 spnsred by spnsred by SPONSORED BY SPON spnsred by Osterman Research, Inc. P.O. Bx 1058 Black
More informationLicensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite
Vlume Licensing brief Licensing the Cre Client Access License (CAL) Suite and Enterprise CAL Suite Table f Cntents This brief applies t all Micrsft Vlume Licensing prgrams. Summary... 1 What s New in This
More informationVCU Payment Card Policy
VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this
More informationFirst Global Data Corp.
First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First
More informationIntegrate Marketing Automation, Lead Management and CRM
Clsing the Lp: Integrate Marketing Autmatin, Lead Management and CRM Circular thinking fr marketers 1 (866) 372-9431 www.clickpintsftware.cm Clsing the Lp: Integrate Marketing Autmatin, Lead Management
More informationCustomers FAQs for Webroot SecureAnywhere Identity Shield
Custmers FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere sftware?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is Webrt
More informationData Protection Policy & Procedure
Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015
More informationResearch Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013
Research Reprt Abstract: Advanced Malware Detectin and Prtectin Trends By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm, Senir Prject Manager September 2013 2013 by The Enterprise Strategy Grup,
More informationIntroduction to Mindjet MindManager Server
Intrductin t Mindjet MindManager Server Mindjet Crpratin Tll Free: 877-Mindjet 1160 Battery Street East San Francisc CA 94111 USA Phne: 415-229-4200 Fax: 415-229-4201 mindjet.cm 2013 Mindjet. All Rights
More informationWHITE PAPER SPON. The Critical Need for Enterprise-Grade File Sync and Share Solutions. Published August 2015. An Osterman Research White Paper
WHITE PAPER Grade File Sync and Share An Osterman Research White Paper Published August 2015 spnsred by spnsred by SPON spnsred by Osterman Research, Inc. P.O. Bx 1058 Black Diamnd, Washingtn 98010-1058
More informationWHITE PAPER SPON. The Need for Enterprise-Grade File Sync and Share. Published February 2015 SPONSORED BY. An Osterman Research White Paper
WHITE PAPER N The Need fr Enterprise-Grade An Osterman Research White Paper Published February 2015 SPONSORED BY spnsred by SPON spnsred by Osterman Research, Inc. P.O. Bx 1058 Black Diamnd, Washingtn
More informationWHITE PAPER SPON. Important Issues to Consider Before Migrating to a New Version of Exchange. Published August 2011 SPONSORED BY
WHITE PAPER N Imprtant Issues t Cnsider Befre Migrating t a New Versin f Exchange An Osterman Research White Paper Published August 2011 SPONSORED BY SPON spnsred by spnsred by Osterman Research, Inc.
More informationIn addition to assisting with the disaster planning process, it is hoped this document will also::
First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business
More informationWHITE PAPER SPON. The Need for Enterprise-Grade File Sharing and Synchronization. Published July 2012 SPONSORED BY. An Osterman Research White Paper
WHITE PAPER N The Need fr Enterprise-Grade Synchrnizatin An Osterman Research White Paper Published July 2012 spnsred by spnsred by SPONSORED BY spnsred by SPON spnsred by spnsred by Osterman Research,
More informationCorporate Account Takeover & Information Security Awareness
Crprate Accunt Takever & Infrmatin Security Awareness What is Crprate Accunt Takever? A fast grwing electrnic crime where thieves typically use sme frm f malware t btain lgin credentials t Crprate Online
More informationJunos Pulse Instructions for Windows and Mac OS X
Juns Pulse Instructins fr Windws and Mac OS X When yu pen the Juns client fr the first time yu get the fllwing screen. This screen shws yu have n cnnectins. Create a new cnnectin by clicking n the + icn.
More informationThe Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future
The Imprtance Advanced Data Cllectin System Maintenance Berry Drijsen Glbal Service Business Manager WHITE PAPER knwledge t shape yur future The Imprtance Advanced Data Cllectin System Maintenance Cntents
More informationUC4 AUTOMATED VIRTUALIZATION Intelligent Service Automation for Physical and Virtual Environments
Fr mre infrmatin abut UC4 prducts please visit www.uc4.cm. UC4 AUTOMATED VIRTUALIZATION Intelligent Service Autmatin fr Physical and Virtual Envirnments Intrductin This whitepaper describes hw the UC4
More informationDisk Redundancy (RAID)
A Primer fr Business Dvana s Primers fr Business series are a set f shrt papers r guides intended fr business decisin makers, wh feel they are being bmbarded with terms and want t understand a cmplex tpic.
More informationLicensing Windows Server 2012 R2 for use with virtualization technologies
Vlume Licensing brief Licensing Windws Server 2012 R2 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 R2 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents
More informationMaaS360 Cloud Extender
MaaS360 Clud Extender Installatin Guide Cpyright 2012 Fiberlink Cmmunicatins Crpratin. All rights reserved. Infrmatin in this dcument is subject t change withut ntice. The sftware described in this dcument
More informationFAQs for Webroot SecureAnywhere Identity Shield
FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere Identity Shield?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is the Webrt
More informationGUIDANCE FOR BUSINESS ASSOCIATES
GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.
More informationHIPAA HITECH ACT Compliance, Review and Training Services
Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical
More informationLicensing Windows Server 2012 for use with virtualization technologies
Vlume Licensing brief Licensing Windws Server 2012 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents This
More informationexpertise hp services valupack consulting description security review service for Linux
expertise hp services valupack cnsulting descriptin security review service fr Linux Cpyright services prvided, infrmatin is prtected under cpyright by Hewlett-Packard Cmpany Unpublished Wrk -- ALL RIGHTS
More informationWHITE PAPER SPON. The Critical Need for Enterprise-Grade File Sync and Share Solutions. Published August 2015. An Osterman Research White Paper
WHITE PAPER Grade File Sync and Share An Osterman Research White Paper Published August 2015 spnsred by spnsred by SPON spnsred by Osterman Research, Inc. P.O. Bx 1058 Black Diamnd, Washingtn 98010-1058
More informationCompleting the CMDB Circle: Asset Management with Barcode Scanning
Cmpleting the CMDB Circle: Asset Management with Barcde Scanning WHITE PAPER The Value f Barcding Tday, barcdes are n just abut everything manufactured and are used fr asset tracking and identificatin
More informationIn-House Counsel Day Priorities for 2012. Cloud Computing the benefits, potential risks and security for the future
In-Huse Cunsel Day Pririties fr 2012 Clud Cmputing the benefits, ptential risks and security fr the future Presented by David Richardsn Thursday 1 March 2012 WIN: What in-huse lawyers need Knwledge, supprt
More informationThe Law Office of the Future: Remote Access and Virtual Law Firms Jeffrey S. Krause, Esq.
The Law Office f the Future: Remte Access and Virtual Law Firms Jeffrey S. Krause, Esq. Presentatin Outline Intrductin Wrking Remte vs. Virtual Office Wrking Remte Temprary way t wrk Access yur ffice cmputer
More informationNetwork Security Trends in the Era of Cloud and Mobile Computing
Research Reprt Abstract: Netwrk Security Trends in the Era f Clud and Mbile Cmputing By Jn Oltsik, Senir Principal Analyst and Bill Lundell, Senir Research Analyst With Jennifer Gahm, Senir Prject Manager
More informationResearch Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012
Research Reprt Abstract: Security Management and Operatins: Changes n the Hrizn By Jn Oltsik, Senir Principal Analyst With Kristine Ka and Jennifer Gahm July 2012 2012, The Enterprise Strategy Grup, Inc.
More informationPersonal Data Security Breach Management Policy
Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner
More informationPrivacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.
Privacy Plicy The Central Equity Grup understands hw highly peple value the prtectin f their privacy. Fr that reasn, the Central Equity Grup takes particular care in dealing with any persnal and sensitive
More informationInstallation Guide Marshal Reporting Console
Installatin Guide Installatin Guide Marshal Reprting Cnsle Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 2 Sftware Prerequisites 3 Installatin Prcedures 3 Appendix: Enabling
More informationCOPIES-F.Y.I., INC. Policies and Procedures Data Security Policy
COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus
More informationImplementing an electronic document and records management system using SharePoint 7
Reprt title Agenda item Implementing an electrnic dcument and recrds management system using SharePint 7 Meeting Finance, Prcurement & Prperty Cmmittee 16 June 2008 Date Reprt by Dcument Number Head f
More informationIN-HOUSE OR OUTSOURCED BILLING
IN-HOUSE OR OUTSOURCED BILLING Medical billing is ne f the mst cmplicated aspects f running a medical practice. With thusands f pssible cdes fr diagnses and prcedures, and multiple payers, the ability
More informationPlus500CY Ltd. Statement on Privacy and Cookie Policy
Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and
More informationTrustED Briefing Series:
TrustED Briefing Series: Since 2001, TrustCC has prvided IT audits and security assessments t hundreds f financial institutins thrugh ut the United States. Our TrustED Briefing Series are white papers
More informationWHITE PAPER. How Encrypting Content in Transit and at Rest Reduces Liabilities and Costs for any Organization SPON. Published August 2011 SPONSORED BY
WHITE PAPER Hw Encrypting Cntent in Transit and at Rest Reduces Liabilities and Csts fr any Organizatin An Osterman Research White Paper Published August 2011 SPONSORED BY!! SPON spnsred by spnsred Osterman
More informationMobile Workforce. Improving Productivity, Improving Profitability
Mbile Wrkfrce Imprving Prductivity, Imprving Prfitability White Paper The Business Challenge Between increasing peratinal cst, staff turnver, budget cnstraints and pressure t deliver prducts and services
More informationWHITE PAPER SPON. Best Practices for File Sharing. Published September 2014 SPONSORED BY. An Osterman Research White Paper. sponsored by.
WHITE PAPER N Best Practices fr File Sharing An Osterman Research White Paper Published September 2014 spnsred by SPONSORED BY π spnsred by SPON spnsred by Osterman Research, Inc. P.O. Bx 1058 Black Diamnd,
More informationService Desk Self Service Overview
Tday s Date: 08/28/2008 Effective Date: 09/01/2008 Systems Invlved: Audience: Tpics in this Jb Aid: Backgrund: Service Desk Service Desk Self Service Overview All Service Desk Self Service Overview Service
More informationCloud Services Frequently Asked Questions FAQ
Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like
More informationBYOD and Cloud Computing
BYOD and Clud Cmputing AIIM First Canadian Chapter May 22, 2014 Susan Nickle, Lndn Health Sciences Centre Chuck Rthman, Wrtzmans Sheila Taylr, Erg Infrmatin Management Cnsulting Clud cmputing Agenda What
More informationTransform your phones into a costcutting, worry-reducing, sales-driving machine.
Transfrm yur phnes int a cstcutting, wrry-reducing, sales-driving machine. LABUSA s Hsted PBX prvides an enterprise-grade VIP phne system. Delivered frm the clud, it keeps pace with yur grwth and prpels
More informationUsing PayPal Website Payments Pro UK with ProductCart
Using PayPal Website Payments Pr UK with PrductCart Overview... 2 Abut PayPal Website Payments Pr & Express Checkut... 2 What is Website Payments Pr?... 2 Website Payments Pr and Website Payments Standard...
More informationIT Help Desk Service Level Expectations Revised: 01/09/2012
IT Help Desk Service Level Expectatins Revised: 01/09/2012 Overview The IT Help Desk team cnsists f six (6) full time emplyees and fifteen (15) part time student emplyees. This team prvides supprt fr 25,000+
More informationGartner Magic Quadrant Salesforce Automation 2009
Gartner Magic Quadrant Salesfrce Autmatin 2009 Sage CRM Slutins Opinin Brief Released July 24, 2009 Q. What is the Gartner Magic Quadrant (GMQ) fr SFA? A. The Gartner Magic Quadrant fr SFA is an analyst
More informationBasic concept of Cloud computing
Basic cncept f Clud cmputing Abstract:- Mnica R Kabra (Vivekanand Arts Sardar Dalipsingh Cmmerce and science cllege Aurangabad) Clud cmputing is becming a pwerful netwrk architecture t perfrm large-scale
More informationOften people have questions about new or enhanced services. This is a list of commonly asked questions and answers regarding our new WebMail format.
Municipal Service Cmmissin Gerald P. Cle Frederick C. DeLisle Thmas M. Kaul Gregry L. Riggle Stanley A. Rutkwski Electric, Steam, Water Cable Televisin and High Speed Internet Service since 1889 Melanie
More informationA. Early Case Assessment
Electrnic Discvery Reference Mdel Standards fr the identificatin f electrnically stred infrmatin in discvery http://www.edrm.net/resurces/standards/identificatin A. Early Case Assessment Once a triggering
More informationTable of Contents. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.
Table f Cntents Tp Pricing and Licensing Questins... 2 Why shuld custmers be excited abut Micrsft SQL Server 2012?... 2 What are the mst significant changes t the pricing and licensing fr SQL Server?...
More informationSystems Support - Extended
1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets
More informationHow To Write A Byod
Limitatins f the Walled Garden This is the secnd part in a series designed t help rganizatins develp their BYOD (bring-yur-wn-device) strategies fr persnally-wned smartphnes and tablets in the enterprise.
More informationThe Impact of Messaging and Web Threats
! An Osterman Research White Paper Published April 2008 SPONSORED BY!! Osterman Research, Inc. P.O. Bx 1058 Black Diamnd, Washingtn 98010-1058 Phne: +1 253 630 5839 Fax: +1 866 842 3274 inf@stermanresearch.cm
More informationTreasury Gateway Getting Started Guide
Treasury Gateway Getting Started Guide Treasury Gateway is a premier single sign-n and security prtal which allws yu access t multiple services simultaneusly thrugh the same sessin, prvides cnvenient access
More informationWHITE PAPER. Vendor Managed Inventory (VMI) is Not Just for A Items
WHITE PAPER Vendr Managed Inventry (VMI) is Nt Just fr A Items Why it s Critical fr Plumbing Manufacturers t als Manage Whlesalers B & C Items Executive Summary Prven Results fr VMI-managed SKUs*: Stck-uts
More informationChristchurch Polytechnic Institute of Technology Access Control Security Standard
CPIT Crprate Services Divisin: ICT Christchurch Plytechnic Institute f Technlgy Access Cntrl Security Standard Crprate Plicies & Prcedures Sectin 1: General Administratin Dcument CPP121a Principles Infrmatin
More informationQBT - Making business travel simple
QBT - Making business travel simple In business travel, cmplexity csts. S, we ffer less f it. We adpt the latest technlgy and make it simple, transparent and highly persnal. S yu get mre f what yu need
More informationWHITE PAPER SPON. Evaluating Managed File Transfer in the Cloud: What You Need to Know. Published October 2012 SPONSORED BY
WHITE PAPER N Transfer in the Clud: What Yu Need t Knw An Osterman Research White Paper Published Octber 2012 SPONSORED BY SPON spnsred by spnsred by! Osterman Research, Inc. P.O. Bx 1058 Black Diamnd,
More informationWHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy
WHAT YOU NEED TO KNOW ABOUT Prtecting yur Privacy YOUR PRIVACY IS OUR PRIORITY Credit unins have a histry f respecting the privacy f ur members and custmers. Yur Bard f Directrs has adpted the Credit Unin
More informationPRIVACY POLICY Last revised: April 2015
PRIVACY POLICY Last revised: April 2015 ACD, LLC, and its affiliates (cllectively, we, us, ur ) understand that privacy is imprtant t ur cnsumers and want yu t make knwledgeable decisins abut the infrmatin
More informationHow Does Cloud Computing Work?
Hw Des Clud Cmputing Wrk? Carl Mazzanti, CEO, emazzanti Technlgies IT Supprt and Clud Cmputing Services fr Small Business Hbken, NJ and NYC, 201-360- 4400 Owner [Pick the date] Hw des Clud Cmputing Wrk?
More informationWHITE PAPER SPON. Archiving 2.0: What Can You Do Next? Published February 2015 SPONSORED BY. An Osterman Research White Paper.
WHITE PAPER N Archiving 2.0: What Can Yu D An Osterman Research White Paper Published February 2015 SPONSORED BY SPON spnsred by spnsred by Osterman Research, Inc. P.O. Bx 1058 Black Diamnd, Washingtn
More informationWEB APPLICATION SECURITY TESTING
WEB APPLICATION SECURITY TESTING Cpyright 2012 ps_testware 1/7 Intrductin Nwadays every rganizatin faces the threat f attacks n web applicatins. Research shws that mre than half f all data breaches are
More informationResearch Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012
Research Reprt Abstract: The Emerging Intersectin Between Big Data and Security Analytics By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm Nvember 2012 2012 by The Enterprise Strategy Grup, Inc.
More informationIntegrating With incontact dbprovider & Screen Pops
Integrating With incntact dbprvider & Screen Pps incntact has tw primary pints f integratin. The first pint is between the incntact IVR (script) platfrm and the custmer s crprate database. The secnd pint
More informationSolution Brief. Aerohive and Impulse. Powerful Network Security for Education and Enterprise
Slutin Brief Aerhive and Impulse Pwerful Netwrk Security fr Educatin and Enterprise Aerhive and Impulse Intrductin In tday s highly cnnected rganizatins, end users expect secure Wi-Fi access acrss the
More informationAML Internet Manor Court, Manor Farm House, London Road, Derby, Derbyshire, DE72 2GR. Tel: 01332 650 009 Fax: 01332 650 850 Email:
AML Internet Manr Curt, Manr Farm Huse, Lndn Rad, Derby, Derbyshire, DE72 2GR. Tel: 01332 650 009 Fax: 01332 650 850 Email: Backup@AmlInternet.c.uk Cntents Page Situatin Analysis 3 AML Internet - The Slutin
More informationFundingEdge. Guide to Business Cash Advance & Bank Statement Loan Programs
Guide t Business Cash Advance & Bank Statement Lan Prgrams Cash Advances: $2,500 - $1,000,000 Business Bank Statement Lans: $5,000 - $500,000 Canada Cash Advances: $5,000 - $500,000 (must have 9 mnths
More informationServ-U Distributed Architecture Guide
Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v14.0.1.0 Page 1 f 16 Intrductin Serv-U
More informationService Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S
Service Level Agreement (SLA) Hsted Prducts Netp Business Slutins A/S Cntents 1 Service Level Agreement... 3 2 Supprt Services... 3 3 Incident Management... 3 3.1 Requesting service r submitting incidents...
More informationAuditNet Survey of Bring your own Device (BYOD) - Control, Risk and Audit
AuditNet Survey f Bring yur wn Device (BYOD) - Cntrl, Risk and Audit The pace f technlgy mves much faster than managers and auditrs can understand and react, with updated plicies, prcedures and cntrls.
More informationWHITE PAPER PON SPON. Key Issues to Consider in Mobile Device Management. Published May 2011 SPONSORED BY. An Osterman Research White Paper
WHITE PAPER PON Key Issues t Cnsider in Mbile Device Management An Osterman Research White Paper Published May 2011 SPONSORED BY SPON spnsred by spnsred by Osterman Research, Inc. P.O. Bx 1058 Black Diamnd,
More informationEconomic Value Validation Summary MAY 2012. 2012. Enterprise Strategy Group, Inc. All Rights Reserved.
Ecnmic Value Validatin Summary Bx Online File Sharing & C llabr atin f r Enterprise IT MAY 2012 2012. Enterprise Strategy Grup, Inc. All Rights Reserved. EVV REPORT: Bx Online File Sharing & Cllabratin
More informationSBClient and Microsoft Windows Terminal Server (Including Citrix Server)
SBClient and Micrsft Windws Terminal Server (Including Citrix Server) Cntents 1. Intrductin 2. SBClient Cmpatibility Infrmatin 3. SBClient Terminal Server Installatin Instructins 4. Reslving Perfrmance
More informationCLOUD COMPUTING: SECURITY THREATS AND MECHANISM
CLOUD COMPUTING: SECURITY THREATS AND MECHANISM Vaishali Jshi 1, Lakshmi 2, Vivek Gupta 3 1,2,3 Department f Cmputer Science Engineering, Acrplis Technical Campus, Indre ABSTRACT Clud cmputing is a mdel
More informationPassword Reset for Remote Users
1 Passwrd Reset fr Remte Users Curin prvides a cmpnent fr the PasswrdCurier Passwrd Prvisining System that manages the lcal passwrd cache in cnjunctin with self-service passwrd reset activities. The slutin
More informationInternet and Social Media Solicitations: Wise Giving Tips
Internet and Scial Media Slicitatins: Wise Giving Tips Charities use a wide variety f methds t slicit charitable dnatins. New and pwerful technlgies utilize nt just the internet and email, but als scial
More informationOsterman Research User Guides
Osterman Research User Guides Hw t Evaluate and Chse a Messaging Archival Slutin 2006 Editin Osterman Research, Cntural and RITE Chice have published a user guide that will help rganizatins f all sizes
More informationPCI - Why You Need to be Compliant When Accepting Credit Card Payments. Agenda. Breaches in the Headlines. Breach Events & Commonalities
PCI - Why Yu Need t be Cmpliant When Accepting Credit Card Payments Tuesday, March 27, 2012 Agenda Breach Events & Cmmnalities Evlutin f PCI PCI Requirements Risks f Nn-cmpliance Industry Initiatives t
More informationCloud Services MDM. Windows 8 User Guide
Clud Services MDM Windws 8 User Guide 10/24/2014 CONTENTS Overview... 2 Supprted Devices... 2 System Capabilities... 2 Enrllment and Activatin... 3 Prcess Overview... 3 Verify Prerequisites... 3 Dwnlad
More informationWelcome to Remote Access Services (RAS)
Welcme t Remte Access Services (RAS) Our gal is t prvide yu with seamless access t the TD netwrk, including the TD intranet site, yur applicatins and files, and ther imprtant wrk resurces -- whether yu
More informationMobilizing Healthcare Staff with Cloud Services
Mbilizing Healthcare Staff with Clud Services Published May 2012 Mbile Technlgies are changing hw healthcare staff delivers care. With new pwerful integrated slutins available fr the healthcare staff,
More information