A New, Revenue-Generating Cloud Service for Telecoms:

Size: px
Start display at page:

Download "A New, Revenue-Generating Cloud Service for Telecoms:"

Transcription

1 A New, Revenue-Generating Cloud Service for Telecoms: A Proven, Application-and-Content-Aware Telecom Service for Malware Defense, Parental/Employer Web Control, and DDoS Protection By Dan Baker, Technology-Research (TRI) Sponsored by, Allot Communications 1

2 The Cyber-Security Protection of Enterprises and Consumers via an MSSP 1 Service Sad to say, but today s incredible demand for mobile broadband, on-line video, and other communication services doesn t get CSPs excited anymore. There s a very good reason: high demand and growth is a mixed blessing because traditional revenue streams are under siege and it s hard to make a profit. VoIP is causing regular voice revenue to vanish. Apple s imessage, WhatsApp and Facebook s messenger apps are cutting deep into SMS. And greater Over the Top (OTT) competition is squeezing margins as customers opt for free or low-priced OTT services as opposed to higher cost, but better quality telecom ones. But luckily, not all IT/communications developments are working against CSPs. For instance, the surging demand for cloud services should be a golden opportunity for telecoms to make money. Why? Because, when you cut through the hype, cloud is basically about transforming off-line hardware and software into on-line services in the telecom cloud. And that shift will create a whole new generation of telecom revenue streams. Now consolidating functions in the cloud is not just an efficiency play. In some cases, the real-time and anytime/anywhere capabilities of the telecom cloud can deliver a better solution than is even possible in the off-line world, for example: A network solution cannot be bypassed; Application updates are applied much faster in the network. There are almost no delays; A network application can be policy- or regulation-driven. A telecom service doesn t drain the smartphone battery; and, The service can generate revenue for the operator. So this paper will focus on one particularly promising telecom cloud service: cyber security. In cyber security, telecoms are ideally positioned to deliver a better solution. The opportunity here is for telecoms to step up and become MSSPs or Managed Security Service Providers. Now as you well know, cyber security is a huge, well-established market served by many big firms. In fact, according to Gartner, cyber security market is growing at 8.6% and will exceed $73 billion in However CSPs don t need to chase the broader security market, which includes everything from firewalls and intrusion detection to anti-virus and SIEM solutions. They have a compelling alternative: 1 Managed Security Services Provider 2

3 CSPs can focus on three specific services and provide real-time protection from the heart of the communications network: 1. Providing real-time URL filtering to enable: Parents to block access to inappropriate websites for children or to restrict access at certain times of the day (during class time vs. bus time); and Employers to block access to inappropriate or non-job-related websites for employees. 2. Stopping malware downloads to computers & smartphones; and, 3. Mitigating DDoS (Distributed Denial of Service) attacks to protect enterprises. This paper will walk you through these three services; explain how they work and why the telecom as MSSP service has some natural advantages over competitive approaches. In the DDoS protection area, we ve also included a case study from an Asia-Pacific Service Provider, that testifies to the power of the MSSP approach. We will also show why telecom MSSP services are gaining in popularity, earning revenue, and even getting an assist from regulators in certain countries. Parental and Employer Control of Web Access The first cyber security service that telecoms can deliver as an MSSP is parental control for kids and safe browsing for enterprises. Protecting children and teenagers in cyber space is a growing concern. Parents don t want their kids exposed to websites that have inappropriate content and many governments impose their own restrictions on age inappropriate websites (or categories of web sites). Yet the number of digital platforms that can access the Internet has expanded way beyond PCs today to smartphones, tablets, and gaming consoles. So kids have to be protected on all of the new mobile devices as well. ABI Research estimates the global parental control software market was worth $1,044 million in Now such software was adequate in the past because kids would access a family PC that parents had full control of. But today, each member of the family may have his own device to surf the internet, so control is far more difficult. Employers also need to control web access to guard against employees squandering their work hours by surfing the web. Forbes magazine conducted a 2013 survey and found that 64 percent of employees visit non-work related websites daily. Forbes found the majority of workers waste their time on Tumblr, followed by Facebook, Twitter, Instagram, and Snapchat. These distractions are causing a massive loss in employee productivity, so businesses are eager to gain some measure of control. 3

4 Malware Protection Malware downloaded from the Internet is yet another major security threat. Dell/SonicWALL s 2014 annual report on security documents 78 billion post-infection malware hits in 2013 and claims the Android platform is the mobile focus of cybercriminal attacks. Meanwhile, ABI Research estimates the 2013 Mobile Security Services market stood at $1.88 billion. Once again, telecoms are in a great position to serve with an MSSP service and continual updates to a malware threat database in the cloud. Here, solution vendor access third party databases from the large security vendors who provide information about malware that should be blocked. This effectively allows telecoms to clean the traffic to the endpoint. In fact, the best practice is to embed two or more malware databases in the solution to compare the information in one against the other. Communication Service Providers can clean their pipes of malware and protect their subscribers mobile devices. Architecture of a Malware and Parent/Employer Web Access Control MSSP Source: Allot Communications 4

5 Need for a Simpler and More Effective Method for Web Access Control When it comes to smartphones, the most common way to achieve URL filtering and access control is to download a parental/employer/malware control application to the iphone or Android-based phones. However, maintaining the web access control database in the telecom cloud makes much better sense these days because the handset-resident database is never 100% updated, as the number of new websites, malware, viruses, and phishing threats is constantly expanding hourly and daily. Plus, from an operator s point of view, it s hard to support different applications for ios, Windows and the many Android flavors. It s an invitation for provisioning issues and greater calls to the help desk and subscribers not being happy. Yet another key issue is battery life of the mobile phone. Malware and parental control applications have a tendency to drain the battery at a high rate. The answer is a Managed Security service. A telco or cable operator can provide this service today and it s already being offered for a monthly fee by many operators across Europe and America. And CSP are in a perfect position to manage such a service because they know the exact profile of the subscriber or employee. The administrator of the service accesses a web interface to set preferences and specify the content that children or employees are allowed to access. And in the case of the workplace, the employer s web access administrator could even designate certain times of the day when freer Internet surfing is allowed. Multilayer Analysis Intelligent traffic filtering and multiple detection techniques Source: Allot Communications 5

6 DDoS Protection Let s now turn to the mitigation of DDoS attacks, the second leg of an effective MSSP program. It s in this DDoS area where a telecom MSSP service can dramatically improve on traditional approaches to the problem. The reason is simple: the telecom MSSP is integral to the real-time DPI engine that monitors all IP traffic on the telecom network. Not only does this make threat detection faster, once an attack is discovered, the in-line DPI engine can immediately implement a network policy to neutralize the attack. Fast mitigation is simply not possible using traditional security solutions which sit off-line and merely notify the operator when a threat profile match is found in the incoming traffic. And the power of a telecom MSSP is even more compelling when you consider that an application aware system is behavioral it learns on the fly. So it doesn t rely on searching a huge database of known DDoS attack signatures. The telecom MSSP service, then, is flexible enough to detect zero day or never-beforeseen attacks. The DPI system basically traces normal behavior on the network and notices when there s a deviation. And that abnormal behavior could be many things: high traffic volume coming from or to a single IP; a single IP sending queries all over the network; etc. And once it understands where the bot ghosts (or zombies) are coming from, it declares an attack, then automatically blocks that attack on the same pipe that the traffic is going through. In fact, the attack can be stopped even if it s not exactly clear exactly what s there or what the signature of the attack may be. The traffic is simply blocked or throttled at the service gateway while the operator is notified and asked what additional actions it wishes to take. 6

7 The Problem Enterprises Need to Deal With Source: Allot Communications DDoS and Outgoing SPAM Protection Using a Telecom Cloud MSSP Service Source: Allot Communications 7

8 Case Study: DDoS Protection using Telecom as an MSSP Service An AsiaPac telecom has been using an MSSP solution to successfully detect and mitigate DDoS attacks since late This Telecom wholesaler serves carriers, ISPs, and virtual operators. Its case below shows the power of an MSSP service in DDoS protection. a. Costly DDoS Experience using Traditional Security Solutions Back in 2012 the Telecom got a rude awakening to the threat of DDoS. Its network infrastructure came under a severe DDoS attack for a few days; its traditional security appliances routers, firewalls, load balancers, and Intrusion Prevention Systems were quickly overwhelmed. For 2 to 3 days, major clients experienced constant service disruption, in turn, damaging the years of trust the Telecom had built up with its customers. Following this incident, the operator was committed to enhancing its security with a strong, carrier-grade DDoS detection capability. c. Selection Process for a Carrier-Grade DDoS Solution To select the best solution, they did a thorough proof of concept evaluation of several security vendors, each of whom claimed to have carrier-grade DDoS protection. The Telecom soon discovered that performance was lacking in two of the solutions it tested. One solution, deployed at several carriers and featuring a large backlink capacity, failed the carrier stress test when advanced features were enabled. Likewise, a second solution widely deployed at enterprises the U.S. could not scale to carriergrade performance. A third solution was found to be quite good at DDoS mitigation, but was deficient in two other areas. First, while the solution was effective at sampling traffic 10 Gigs or higher, at traffic volumes below 10 Gig, threats would fly over the solution without detection. The second issue was the long time lag between sampling and detection. Since sampling required 30 minutes to detect a threat, the solution could not stop an attack lasting, say, 20 minutes long. Two other general issues the Telecom faced with the commercial DDoS packages it evaluated were their high cost and the long 12 to 24 hours required to insert them into the network. 8

9 d. Strengths of the Telecom MSSP Solution Selected For its MSSP service the Telecom ended up selecting Allot s MSSP solution, ServiceProtector, and that solution has been in full production for two years now. Here is a rundown of what the operator considers the solution s key strengths: 1. Mitigating Small DDoS Attacks The solution is effective at detecting small DDoS attacks whereas competing solutions tested were not. Others were only suitable for large DDoS attacks. The Allot solution does both. 2. Ultra-Fast Detection/Mitigation On average, the operator found DDoS attack packets are surgically mitigated in one to 1.5 minutes while allowing clean traffic to flow. This high speed of mitigation is made possible by the real-time nature of the solution. No other solution they tested could mitigate faster than 5 or 10 minutes since it takes time to sample data from the servers and routers. But with Allot ServiceProtector, in-the-network-anomaly detection and real-time signature creation and policy execution are self-contained in one system, enabling very high speed attack mitigation. 3. Highly Flexible Signature Capability Studying the pattern of the DDoS attacks the system defeated in the past two years, the operator noticed the clever tactics attackers employ. For instance, in some cases, the attackers launch an attack, then stop and disappear. Then 2 minutes later they come to try something else. Then they go away and come back a third time. The design of the MSSP service is especially useful in containing such sophisticated and unpredictable attacks. Signatures are essentially created on the fly from the first attack attempt to the last. Each time a new attack is launched, a new signature is created, so no matter what the attacker does, their tactics are frustrated. 4. Notification of DDoS Attack & Mitigation -- The discovery of a DDoS attack sets off a methodical process of mitigation and notification. First, an is received saying there's a DDoS on the network. Within 27 seconds another arrives saying: the DDoS is active and a traffic signature has been created for it. Then, usually in less than 1.5 minutes, reports the attack has been mitigated and the size of the attack. 5. Discovery of Bots on Customer Networks While the MSSP service was deployed to protect against external attacks, the operator was pleasantly surprised that it also discovered tens of thousands of bots that were affecting customers and launching attacks on other networks. 9

10 The operator sent the list of affected endpoints to its service provider customers so they could identify which endpoints in their networks were launching bot spamming and DDoS attacks. Of course, these service providers considered this information to be highly valuable and the operator is now considering offering such bot discovery as a chargeable service. 6. Protection of Customer Usage Overcharges Overcharging for DDoS traffic can deliver an unpleasant billing surprise for customers. But the MSSP service has proven effective in preventing this. By deploying the solution at the egress point of the network, the DDoS is mitigated before it actually affects the customers. For example, at one broadband provider, the operator was able to stop 98 Gigabytes of malicious traffic from appearing on their network and being billed to customers. 7. Single Vendor Simplicity Because the operator was already using Allot s DPI appliance in its network, the actual insertion of the MSSP service was a simple matter activating the service and testing it out. Today the solution lives in a single, unified platform from a single vendor. 10

11 MSSP as Revenue-Generator and Brand-Enhancer Telecoms are really in a great spot for offering an MSSP service as a paid service for three important reasons: 1. Several operators around the world have already taken the leap and are offering MSSP as a paid service to their consumer and business customers. In Italy, for example, an operator is charging one Euro per month for parental control and malware protection, and a high percent of subscribers have signed up for the service because it s a great value for peace of mind. 2. The public is demanding the service, particularly industrialized countries where subscribers realize that parental controls and malware protection are musthave services. The public has also become aware that handset-level protection is just not as effective in the smartphone era. 3. A network-wide security service is a competitive differentiator. It increases the value of the carrier s brand because they have cleaner pipes. Many operators are advertising the service. They also hope to be seen as socially responsible companies who care about protecting children, keeping the internet safe, and protecting business websites. To generate revenue, operators are using various marketing strategies: Offering security as a low cost per subscriber to encourage mass market adoption. Offering a security package add-on to all existing pricing packages. Delivering security as part of a premium service Upselling the security add-on when subscriber either calls the service center or is connecting to new data service. Regulators are pushing for MSSP Services While MSSP services are already generating revenue at several operators worldwide, in some nations, the regulators have actually mandated the service. In the UK, for example, the British Parliament recently enacted a law requiring ISPs and carrier to offer a parental control service. Turkey, as well, legally requires telecoms to offer such a system to clean the traffic and have each subscriber buying a phone decide what category of parental control he or she wants. Clearly the best strategy is for operators to get proactive. Better to offer the service to protect children now and start collecting revenue for it. Otherwise there s a good chance lawmakers will legislate over their heads and force operators to offer the MSSP service anyway for free: this is precisely what happened in the U.K. 11

12 P/N D Summary To conclude, then, we ve seen that a telecom MSSP can be an effective cyber security solution in three key areas: anti-malware, parental/employer web access control, and DDoS defense. To summarize our conclusions: For malware and parental/employer web access control, the telecom cloud is more efficient than trying to manage and update mobile handset and desktop applications across many operating systems. From an operator s point of view, an MSSP service is far simpler and more scalable because the solution is self-contained in the network. In fact, the same DPI system that monitors the network at the service gateway can provide the MSSP service without the need for any additional probes or hardware. And finally, the solution is gaining traction at telecoms around the world who recognizing it as a money-making service that is both socially responsible and a competitive differentiator. About Allot Communications Allot Communications Ltd. is a leading global provider of intelligent broadband solutions that put mobile, fixed and enterprise networks at the center of the digital lifestyle and workstyle. Allot s DPI-based solutions identify and leverage the business intelligence in data networks, empowering operators to analyze, protect, improve and enrich the digital lifestyle services they deliver. Allot s unique blend of innovative technology, proven know-how and collaborative approach to industry standards and partnerships enables network operators worldwide to elevate their role in the digital lifestyle ecosystem and to open the door to a wealth of new business opportunities. About Technology Research Institute Dan Baker is Research Director of Technology Research Institute (TRI), an analyst firm that has been following telecom software markets since Baker is editor of TRI s online magazine, Black Swan Telecom Journal. He also writes the Dan Baker Blog for Billing and OSS World and industry reports for Vanilla Plus. For 20 years TRI has authored dozens of syndicated reports, its latest, a 574-page study entitled, The Telecom Analytics & Big Data Solutions Market Technology Research Institute (TRI). This white paper was prepared on behalf of Allot Communications. The views and statements expressed in this document are those of Technology Research Institute and they should not be inferred to reflect the position of Allot Communications. The document can be distributed only in its integral form and acknowledging the source. No section of this material may be copied, photocopied, or duplicated in any form by any means, or redistributed without express written permission from TRI. While the document is based upon information that we consider accurate and reliable, TRI makes no warranty, express or implied as to the accuracy of the information in this document. TRI assumes no liability for any damage or loss arising from reliance on this information. Trademarks mentioned in this document are property of their respective owners. Diagrams created by Allot communications. Cover Page photo by istock.com 12

Secure Pipes with Network Security Technology Showcase

Secure Pipes with Network Security Technology Showcase Technology Showcase Contents Executive Summary... 1 Introduction to Secure Pipes... 2 Network Security... 3 Clean and Secure Pipes From Within the CSP Network... 3 Behavioral Threat Detection... 4 DDoS

More information

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media Enabling Business Beyond the Corporate Network Secure solutions for mobility, cloud and social media 3 Trends Transforming Networks and Security Are you dealing with these challenges? Enterprise networks

More information

Security MWC 2014. 2013 Nokia Solutions and Networks. All rights reserved.

Security MWC 2014. 2013 Nokia Solutions and Networks. All rights reserved. Security MWC 2014 2013 Nokia Solutions and Networks. All rights reserved. Security Ecosystem overview Partners Network security demo + End-user security demo + + + + NSN end-to-end security solutions for

More information

Advantages of Managed Security Services

Advantages of Managed Security Services Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network

More information

4 Steps to Effective Mobile Application Security

4 Steps to Effective Mobile Application Security Mobile Application Security Whitepaper 4 Steps to Effective Mobile Application Security Table of Contents Executive Summary 3 Mobile Security Risks in Enterprise Environments 4 The Shortcomings of Traditional

More information

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,

More information

Executive Brief on Enterprise Next-Generation Firewalls

Executive Brief on Enterprise Next-Generation Firewalls Executive Brief on Enterprise Next-Generation Firewalls How security technology can reduce costs, improve compliance and increase employee productivity Enterprise Next-Generation Firewalls protect businesses

More information

How To Protect Your Network From Threats From Your Network (For A Mobile) And From Your Customers (For An Enterprise)

How To Protect Your Network From Threats From Your Network (For A Mobile) And From Your Customers (For An Enterprise) Plugging the Holes in Mobile Security: The Rising Threat Jennifer M. Pigg, VP of Research, Yankee Group Nick Wade, Group Product Manager, Symantec June 2011 Copyright 2011. Yankee Group Research, Inc.

More information

Allot Security Solution Suite

Allot Security Solution Suite Allot Security Solution Suite 09/2014 2014 Allot Communications Ltd. All rights reserved. Specifications are subject to change without notice. Allot Communications, Sigma and NetEnforcer and the Allot

More information

WEBSENSE TRITON SOLUTIONS

WEBSENSE TRITON SOLUTIONS WEBSENSE TRITON SOLUTIONS INNOVATIVE SECURITY FOR WEB, EMAIL, DATA AND MOBILE TRITON STOPS MORE THREATS. WE CAN PROVE IT. PROTECTION AS ADVANCED AND DYNAMIC AS THE THREATS THEMSELVES The security threats

More information

Extreme Networks Security Analytics G2 Vulnerability Manager

Extreme Networks Security Analytics G2 Vulnerability Manager DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering

More information

Symantec RuleSpace Data Sheet

Symantec RuleSpace Data Sheet OEM URL Categorization Database and Real-time Web Categorization Technology Data Sheet: Security Intelligence OVERVIEW A major challenge today is ensuring a safe web environment for users and companies

More information

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

Why a Network-based Security Solution is Better than Using Point Solutions Architectures Why a Network-based Security Solution is Better than Using Point Solutions Architectures In This Paper Many threats today rely on newly discovered vulnerabilities or exploits CPE-based solutions alone

More information

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit. Juniper Networks Next Generation Security for a Cybercrime World Lior Cohen Principal Solutions Architect Scott Lucas Director of Product Marketing, Branch Solutions Service Layer Technologies Business

More information

Introducing IBM s Advanced Threat Protection Platform

Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM

More information

Reduce Your Network's Attack Surface

Reduce Your Network's Attack Surface WHITE PAPER Reduce Your Network's Attack Surface Ixia's ThreatARMOR Frees Up Security Resources and Personnel The Threat Landscape When you re dealing with network security, one of the primary measurements

More information

CLOUD NETWORK DEFENSE

CLOUD NETWORK DEFENSE DATASHEET securing the cloud connected world CLOUD NETWORK DEFENSE POWERED BY WEDGEOS Overview - Cloud is the new Edge Mobility, cloud, consumerization of IT and Internet of things have completely redefined

More information

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection Technology Blueprint Secure Your Virtual Desktop Infrastructure Optimize your virtual desktop infrastructure for performance and protection LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL

More information

SPEAR PHISHING AN ENTRY POINT FOR APTS

SPEAR PHISHING AN ENTRY POINT FOR APTS SPEAR PHISHING AN ENTRY POINT FOR APTS threattracksecurity.com 2015 ThreatTrack, Inc. All rights reserved worldwide. INTRODUCTION A number of industry and vendor studies support the fact that spear phishing

More information

Cisco Security Intelligence Operations

Cisco Security Intelligence Operations Operations Operations of 1 Operations Operations of Today s organizations require security solutions that accurately detect threats, provide holistic protection, and continually adapt to a rapidly evolving,

More information

Securing Cloud-Based Email

Securing Cloud-Based Email White Paper Securing Cloud-Based Email A Guide for Government Agencies White Paper Contents Executive Summary 3 Introduction 3 The Risks Posed to Agencies Running Email in the Cloud 4 How FireEye Secures

More information

The Attacker s Target: The Small Business

The Attacker s Target: The Small Business Check Point Whitepaper The Attacker s Target: The Small Business Even Small Businesses Need Enterprise-class Security to protect their Network July 2013 Contents Introduction 3 Enterprise-grade Protection

More information

IBM Security QRadar Vulnerability Manager

IBM Security QRadar Vulnerability Manager IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk

More information

Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS

Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS Traditionally, IT risk management has balanced security investment and the impact of the threat, allowing each business

More information

Top 10 Reasons Enterprises are Moving Security to the Cloud

Top 10 Reasons Enterprises are Moving Security to the Cloud ZSCALER EBOOK Top 10 Reasons Enterprises are Moving Security to the Cloud A better approach to security Albert Einstein defined insanity as doing the same thing over and over again and expecting different

More information

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper SHARE THIS WHITEPAPER On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper Table of Contents Overview... 3 Current Attacks Landscape: DDoS is Becoming Mainstream... 3 Attackers Launch

More information

Advantages of Managed Security Services

Advantages of Managed Security Services Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Learn More: Call us at 877.634.2728 www.megapath.com Executive Summary Protecting Your Network and

More information

Managing Web Security in an Increasingly Challenging Threat Landscape

Managing Web Security in an Increasingly Challenging Threat Landscape Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.

More information

White Paper. The business case for VAVOOMB

White Paper. The business case for VAVOOMB White Paper The business case for VAVOOMB SUMMARY For Mobile Operators everywhere traditional revenue streams of VAS and Voice are increasingly under attack from the OTT Voice and IP messaging services

More information

The business case for managed next generation firewalls. Six reasons why IT decision makers should sit up and take notice

The business case for managed next generation firewalls. Six reasons why IT decision makers should sit up and take notice The business case for managed next generation firewalls Six reasons why IT decision makers should sit up and take notice THREATWATCH Cyber threats cost the UK economy 27 billion pounds a year 92 percent

More information

Top 10 Tips to Keep Your Small Business Safe

Top 10 Tips to Keep Your Small Business Safe Securing Your Web World Top 10 Tips to Keep Your Small Business Safe Protecting your business against the latest Web threats has become an incredibly complicated task. The consequences of external attacks,

More information

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape WHITE PAPER: SYMANTEC GLOBAL INTELLIGENCE NETWORK 2.0.... ARCHITECTURE.................................... Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Who

More information

10 easy steps to secure your retail network

10 easy steps to secure your retail network 10 easy steps to secure your retail network Simple step-by-step IT solutions for small business in retail to leverage advanced protection technology in ways that are affordable, fast and easy October 2015

More information

How to Choose the Right Security Information and Event Management (SIEM) Solution

How to Choose the Right Security Information and Event Management (SIEM) Solution How to Choose the Right Security Information and Event Management (SIEM) Solution John Burnham Director, Strategic Communications and Analyst Relations IBM Security Chris Meenan Director, Security Intelligence

More information

Unified Threat Management, Managed Security, and the Cloud Services Model

Unified Threat Management, Managed Security, and the Cloud Services Model Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical

More information

KASPERSKY PRIVATE SECURITY NETWORK: REAL-TIME THREAT INTELLIGENCE INSIDE THE CORPORATE INFRASTRUCTURE

KASPERSKY PRIVATE SECURITY NETWORK: REAL-TIME THREAT INTELLIGENCE INSIDE THE CORPORATE INFRASTRUCTURE KASPERSKY PRIVATE SECURITY NETWORK: REAL-TIME THREAT INTELLIGENCE INSIDE THE CORPORATE INFRASTRUCTURE Global threat intelligence for local implementation www.kaspersky.com 2 A CLOUD-BASED THREAT LABORATORY

More information

Business Case for S/Gi Network Simplification

Business Case for S/Gi Network Simplification Business Case for S/Gi Network Simplification Executive Summary Mobile broadband traffic growth is driving large cost increases but revenue is failing to keep pace. Service providers, consequently, are

More information

security changes with Orange focus on your business, we focus on your security

security changes with Orange focus on your business, we focus on your security security changes with Orange focus on your business, we focus on your security the only constant in security is change New uses and new technologies, proliferation of platforms and new workspaces in a

More information

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4

More information

Technology Brief Demystifying Cloud Security

Technology Brief Demystifying Cloud Security Demystifying Cloud Security xo.com Demystifying Cloud Security Contents Introduction 3 Definition of the cloud 3 Cloud security taxonomy 4 Cloud Infrastructure Security 5 Tenant- based Security 5 Security

More information

Beyond the Hype: Advanced Persistent Threats

Beyond the Hype: Advanced Persistent Threats Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,

More information

Netsweeper Whitepaper

Netsweeper Whitepaper Netsweeper Inc. Corporate Headquarters 104 Dawson Road Suite 100 Guelph, ON, Canada N1H 1A7 CANADA T: +1 (519) 826-5222 F: +1 (519) 826-5228 Netsweeper Whitepaper The Evolution of Web Security June 2010

More information

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division

More information

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber

More information

What Do You Mean My Cloud Data Isn t Secure?

What Do You Mean My Cloud Data Isn t Secure? Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there

More information

Advantages of Managed Security Services. Cloud services via MPLS networks for high security at low cost

Advantages of Managed Security Services. Cloud services via MPLS networks for high security at low cost Cloud services via MPLS networks for high security at low cost 2 Cloud services via MPLS networks for high security at low cost Executive Summary Protecting your Network and Information Assets Today s

More information

Overcoming Five Critical Cybersecurity Gaps

Overcoming Five Critical Cybersecurity Gaps Overcoming Five Critical Cybersecurity Gaps How Active Threat Protection Addresses the Problems that Security Technology Doesn t Solve An esentire White Paper Copyright 2015 esentire, Inc. All rights reserved.

More information

Addressing Big Data Security Challenges: The Right Tools for Smart Protection

Addressing Big Data Security Challenges: The Right Tools for Smart Protection Addressing Big Data Security Challenges: The Right Tools for Smart Protection Trend Micro, Incorporated A Trend Micro White Paper September 2012 EXECUTIVE SUMMARY Managing big data and navigating today

More information

How To Buy Nitro Security

How To Buy Nitro Security McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security

More information

SECURALIVE WEB SECURITY GATEWAY

SECURALIVE WEB SECURITY GATEWAY SECURALIVE WEB SECURITY GATEWAY allows you to filter users DNS queries using filtering categories and black and white lists of forbidden hosts. On access to a particular site being denied through DNS filtering,

More information

Next-Generation Mobile Apps 7 Critical Success Factors

Next-Generation Mobile Apps 7 Critical Success Factors Mobile marketing is still the new kid on the block. Some marketers have tried a variety of mobile tactics and found Next-Generation Mobile Apps 7 Critical Success Factors Introduction There are literally

More information

A Guide to MAM and Planning for BYOD Security in the Enterprise

A Guide to MAM and Planning for BYOD Security in the Enterprise A Guide to MAM and Planning for BYOD Bring your own device (BYOD) can pose a couple different challenges, not only the issue of dealing with security threats, but also how to handle mobile applications.

More information

Five Key Challenges Facing Campus Network Administrators Today

Five Key Challenges Facing Campus Network Administrators Today White Paper Five Key Challenges Facing Campus Network Administrators Today Real-world solutions for improving the security and productivity of students, educators and administrators 2011 NetFort. All rights

More information

Email Threat Trend Report Second Quarter 2007

Email Threat Trend Report Second Quarter 2007 Email Threat Trend Report Second Quarter 2007, Ltd. 2550 SW Grapevine Parkway, Suite 150 Grapevine, Texas 76051 Phone: (817) 601-3222 Fax: (817) 601-3223 http://www.altn.com/ 2007 Contents Emerging Email

More information

Your complete guide to Cloud Computing

Your complete guide to Cloud Computing Your complete guide to Cloud Computing 1 Doc V1.0 Dec 2013 Table of Contents Hosted Desk- 3 The Cloud and Cloud Computing... 4 The benefits of Cloud Solutions 6 The Cloud is Growing - Rapidly 7 Resolving

More information

Secure Your Mobile Workplace

Secure Your Mobile Workplace Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in

More information

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave

More information

Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team

Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team The Internet is in the midst of a global network pandemic. Millions of computers

More information

8 Ways to Better Monitor Network Security Threats in the Age of BYOD January 2014

8 Ways to Better Monitor Network Security Threats in the Age of BYOD January 2014 8 Ways to Better Monitor Network Security Threats in the Age of BYOD January 2014 8 Ways to Better Monitor Network Security Threats in the Age of BYOD 2 Unless you operate out of a cave, chances are your

More information

Top 10: Firewall Shopping Checklist NEXT. Best viewed with Adobe Reader

Top 10: Firewall Shopping Checklist NEXT. Best viewed with Adobe Reader Top 10: Firewall Shopping Checklist Best viewed with Adobe Reader 1 Fast and Furious Performance 1 Fast and Furious Performance As with sports cars, performance is a top buying criteria for firewalls.

More information

Intelligent Policy Enforcement Solutions for Broadband Service Providers

Intelligent Policy Enforcement Solutions for Broadband Service Providers Intelligent Policy Enforcement Solutions for Broadband Service Providers To do more with your broadband network you need to see more. Imagine being able to view network activity down to the granular level,

More information

The SIEM Evaluator s Guide

The SIEM Evaluator s Guide Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,

More information

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device Ten Tips for Managing Risks on Convergent Networks The Risk Management Group April 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,

More information

End-user Security Analytics Strengthens Protection with ArcSight

End-user Security Analytics Strengthens Protection with ArcSight Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security

More information

The Mobile Data Management Platform. Reach Relevant Audiences Across Devices and Channels with High Impact Ad Targeting

The Mobile Data Management Platform. Reach Relevant Audiences Across Devices and Channels with High Impact Ad Targeting The Mobile Data Management Platform Reach Relevant Audiences Across Devices and Channels with High Impact Ad Targeting 1 Introduction As users spend more time engaging with media on mobile devices, brands

More information

Building a Business Case:

Building a Business Case: Building a Business Case: Cloud-Based Security for Small and Medium-Size Businesses table of contents + Key Business Drivers... 3... 4... 6 A TechTarget White Paper brought to you by Investing in IT security

More information

Symantec Protection Suite Add-On for Hosted Email and Web Security

Symantec Protection Suite Add-On for Hosted Email and Web Security Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication

More information

Research Report Charging and Billing for the Digital Economy

Research Report Charging and Billing for the Digital Economy Research Report Charging and Billing for the Digital Economy Copyright Openet Telecom, 2013 Index Introduction 3 1. The Future for Traditional Billing and Charging 4 2. Innovating and Accelerating Time

More information

Firewall and UTM Solutions Guide

Firewall and UTM Solutions Guide Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: info@lsasystems.com Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers

More information

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst ESG Lab Review RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst Abstract: This ESG Lab review documents

More information

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services MSSP you us are a Managed Security Service Provider looking to offer Advanced Malware Protection Services Lastline is the only company with 10+ years of academic research focused on detecting advanced

More information

GOING BEYOND BLOCKING AN ATTACK

GOING BEYOND BLOCKING AN ATTACK Websense Executive Summary GOING BEYOND BLOCKING AN ATTACK WEBSENSE TRITON VERSION 7.7 Introduction We recently announced several new advanced malware and data theft protection capabilities in version

More information

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web

More information

SAAS VS. ON-PREMISE SECURITY. Why Software-as-a-Service Is a Better Choice for Email and Web Threat Management

SAAS VS. ON-PREMISE SECURITY. Why Software-as-a-Service Is a Better Choice for Email and Web Threat Management SAAS VS. ON-PREMISE SECURITY Why Software-as-a-Service Is a Better Choice for Email and Web Threat Management How SaaS Solves the Problems of On-Premise Security Businesses traditionally invest in security

More information

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise

More information

CASE STUDY. AUSTRIAN AIRLINES Modernizes Network Security for First Class Performance

CASE STUDY. AUSTRIAN AIRLINES Modernizes Network Security for First Class Performance CASE STUDY AUSTRIAN AIRLINES PAGE 1 PA-5020 (2) Austrian Airlines is Austria s largest carrier and operates a global network of routes to around 130 destinations. The company s hub at Vienna International

More information

Colt Smart Office. Flexible network services for the smaller business. / Next

Colt Smart Office. Flexible network services for the smaller business. / Next Colt Smart Office Flexible network services for the smaller business / Next Big business performance Small business flexibility Today, the Internet has become core to the success of virtually every modern

More information

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge One of the most prominent and advanced threats to government networks is advanced delivery

More information

Mucho Big Data y La Seguridad para cuándo?

Mucho Big Data y La Seguridad para cuándo? Mucho Big Data y La Seguridad para cuándo? Juan Carlos Vázquez Sales Systems Engineer, LTAM mayo 9, 2013 Agenda Business Drivers Big Security Data GTI Integration SIEM Architecture & Offering Why McAfee

More information

Radware s Behavioral Server Cracking Protection

Radware s Behavioral Server Cracking Protection Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information

More information

If you can't beat them - secure them

If you can't beat them - secure them If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access

More information

Free Forefront Protection? An investigation into hidden costs.

Free Forefront Protection? An investigation into hidden costs. Free Forefront Protection? An investigation into hidden costs. Richard Stiennon Chief Research Analyst IT-Harvest 2011 IT-Harvest 1 Free Forefront Protection? An investigation into hidden costs. Key Findings

More information

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES WEB PROTECTION Features SECURITY OF INFORMATION TECHNOLOGIES The web today has become an indispensable tool for running a business, and is as such a favorite attack vector for hackers. Injecting malicious

More information

White Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses

White Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses White Paper How to Effectively Provide Safe and Productive Web Environment for Today's Businesses Table of Content The Importance of Safe and Productive Web Environment... 1 The dangers of unrestricted

More information

Choose Your Own - Fighting the Battle Against Zero Day Virus Threats

Choose Your Own - Fighting the Battle Against Zero Day Virus Threats Choose Your Weapon: Fighting the Battle against Zero-Day Virus Threats 1 of 2 November, 2004 Choose Your Weapon: Fighting the Battle against Zero-Day Virus Threats Choose Your Weapon: Fighting the Battle

More information

TIME TO RETHINK NETWORK SECURITY

TIME TO RETHINK NETWORK SECURITY TIME TO RETHINK NETWORK SECURITY There are three major trends currently unfolding that promise increased efficiency and effectiveness in how we do business. These are cloud computing, big data analysis

More information

DDoS Attack and Its Defense

DDoS Attack and Its Defense DDoS Attack and Its Defense 1 DDoS attacks are weapons of mass disruption. The DDoS attack has long been a big main threat to security of the Internet. It is not expensive and easy to be used for achieving

More information

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential Best Practices for Smartphone Apps A smartphone is basically a computer that you can carry in the palm of your hand. Like computers, smartphones have operating systems that are often called platforms.

More information

SECURE YOUR BUSINESS WHEREVER IT TAKES YOU. Protection Service for Business

SECURE YOUR BUSINESS WHEREVER IT TAKES YOU. Protection Service for Business SECURE YOUR BUSINESS WHEREVER IT TAKES YOU Protection Service for Business IT S A MOBILE WORLD Wifi Today, we use more devices over more connections than ever before. Choosing when, where and how to work

More information

AVeS Cloud Security powered by SYMANTEC TM

AVeS Cloud Security powered by SYMANTEC TM Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting

More information

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

WHITE PAPER SPLUNK SOFTWARE AS A SIEM SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)

More information

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series Whitepaper Advanced Threat Detection: Necessary but Not Sufficient 2 Executive Summary Promotion

More information

Putting Operators at the Centre of

Putting Operators at the Centre of Putting Operators at the Centre of Enterprise Mobile Security Introduction Small and Medium Enterprises make up the majority of firms and employees in all major economies, yet are largely unidentified

More information

Build at Your Own Risk: Why Managed Services for Multiscreen Video Make Sense

Build at Your Own Risk: Why Managed Services for Multiscreen Video Make Sense Build at Your Own Risk: Why Managed Services for Multiscreen Video Make Sense The trend of consumers watching TV and videos on their mobile devices is gaining momentum. Research firm IDC predicts that

More information

Secure Web Gateways Buyer s Guide >

Secure Web Gateways Buyer s Guide > White Paper Secure Web Gateways Buyer s Guide > (Abbreviated Version) The web is the number one source for malware distribution. With more than 2 million 1 new pages added every day and 10,000 new malicious

More information

Best value security report

Best value security report Best value security report Getting the balance right between cost and quality Do more with less IT security for Local Government and the Emergency Services Thank you for downloading the best value security

More information

Delivering Managed Services Using Next Generation Branch Architectures

Delivering Managed Services Using Next Generation Branch Architectures Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN

More information

The Advantages of Security as a Service versus On-Premise Security

The Advantages of Security as a Service versus On-Premise Security The Advantages of Security as a Service versus On-Premise Security ABSTRACT: This document explores the growing trend of hosted/managed security as a service and why the cloud is quickly becoming the preferred

More information

Tata Communications Security Outsourcing. A Must-have for Entry into the Global Economy. www.tatacommunications.com. www.tatacommunications.

Tata Communications Security Outsourcing. A Must-have for Entry into the Global Economy. www.tatacommunications.com. www.tatacommunications. Tata Communications Security Outsourcing A Must-have for Entry into the Global Economy www.tatacommunications.com www.tatacommunications.com 2 Tata Communications Security Outsourcing A Must-have for Entry

More information

alcatel-lucent Smart Plan solution Professional and Consulting Services

alcatel-lucent Smart Plan solution Professional and Consulting Services alcatel-lucent Smart Plan solution Professional and Consulting Services Alcatel-Lucent Professional and Consulting Services use a unique use case-driven approach that helps maximize your investment in

More information