Bullseye. Evaluation Copy. Enterprise Data Protection
|
|
|
- Emmeline Fleming
- 10 years ago
- Views:
Transcription
1 Bullseye Enterprise Data Protection A Bullseye Report by Bloor Research Author : Nigel Stanley Publish date : April 2008
2 Having Enterprise Data Protection as an objective is a worthy goal for any organisation Nigel Stanley
3 Executive summary and conclusions Enterprise Data Protection is an umbrella term used to describe the coming together of data leak prevention technologies with encryption (often referred to as data loss prevention) technologies. The reason for the coming together of two different security technologies is the natural synergy they share. By stopping data leaks in the first instance an organisation will achieve a high level of protection but, accepting that no organisation can ever prevent all data from leaking, it makes sense to secure sensitive data further using encryption. This combined approach delivers a comprehensive, robust and practical response to the data loss problem. Cryptoforge Dekart Code Green Challenger Aladdin 3BView Intrusion Vericept Champion For the purposes of this Bullseye report an ideal but mythical Enterprise Data Protection product has been created by the Bullseye committee combining the best known features of data leak and data encryption products. This perfect product does not currently exist; instead it represents a vision of what could be developed in the future. A list of attributes has then been created from this perfect product that has enabled the Bullseye committee, formed in support of this project, to review current vendors and their products against such a perfect benchmark using an open methodology. The relative scores of the vendors and their products, measured against the perfect product have been turned into the Bullseye landscape diagram (Figure 1). Workshare TrendMicro/Provilla Microsoft GuardianEdge PGP Vontu Utimaco Adobe Promisec Tablus CheckPoint McAfee Lumension Cisco Security Voltage Security Fidelis Reconnex ProofPoint Credant Technologies Tumbleweed Communications Orchestria Entrust Cryptzone Verdasys BeCrypt Centennial Software GTB Tech. BigFix Blue Coat Safend DES Vormetric Mobile Armor Websense F-Secure Decru GFI Innovator Figure 1: The Enterprise Data Protection Landscape A Bloor Bullseye Report Bloor Research
4 Executive summary and conclusions To ensure this report is relevant and useful today Figures 2 and 3 produce a similar view but of the data encryption and data leak prevention vendors with products available now. These vendors and products were compared to each other rather than a perfect product to produce two easy to use landscape diagrams. In practice, the Enterprise Data Protection domain has been proven as a desirable objective for vendors as they seek partnerships and acquisitions to complement their own solutions in this area. New and emerging Digital Rights Management products continue to cross over into what was considered the data loss TrueCrypt WinMagic Dekart Challenger ianywhere PGP GuardianEdge Mobile Armor Champion Symantec Microsoft CheckPoint Credant Technologies Utimaco BeCrypt DES Centennial Software Figure 2: The Data Encryption Landscape IronPort Entrust Information Security Corp. McAfee Innovator prevention marketplace at the same time as data encryption vendors look at ways of complementing their products. End user organisations need to be reviewing their data loss and encryption strategies as a matter of urgency to prevent expensive and reputation-damaging incidents. This needs to be approached from a strategic viewpoint so that best use is made of budgets, personnel and systems. Having Enterprise Data Protection as an objective is a worthy goal for any organisation. Challenger Champion Innovator 3BView BigFix SafeNet Promisec Vormetric Workshare Vontu Verdasys GTB Tech Orchestria Tablus Vericept Fidelus Security Systems Microsoft Adobe McAfee Reconnex Safend ProofPoint Lumension Security PGP Utimaco Code Green Tumbleweed Communications Networks TrendMicro/Provilla Voltage Security Figure 3: The Data Leak Prevention Landscape Websense Bloor Research A Bloor Bullsye Report
5 The IT security domain IT security is a complex and time-consuming area that is constantly evolving as new threats emerge. IT security solutions fall into complimentary activity categories: Policy management Policies and procedures need to be created and then enforced across the business. These policies need to fit with corporate objectives and facilitate the success of the business and not be seen to be unreasonable or impractical. Users should be given the tools and flexibility to do their jobs but, in turn, must be educated in the risks associated with using IT in a connected world. Areas of policy management inevitably fall into domains other than IT security, as they require business-led input as well. Access control and identity management This important area enables the business to work with IT to determine who should access which systems or applications, the provisioning of accounts and a number of other functions concerned with the correct access to the correct systems at the right time. Good access control and identity management will enable the delivery of better foundational IT security. Unified threat management Security technologies need to be intelligently implemented so that the business achieves maximum security for a reasonable Cross Functional Domain Identity Management Maximum Level of Security Physical Security Access Control and Identity Management Password Management Policy Management Password Policy Security Standards Anti-Malware/ Crime-ware Software budget. There are a set of threat management technologies such as anti-malware, intrusion prevention and firewalls, which are put in place by most organisations. Other technologies may only be implemented if the business considers themselves to be at particular risk, for example advanced attack detection tools. It is recognised that Enterprise Data Protection, as described in this paper, will become part of Unified Threat Management as it becomes more mainstream and available. New, emerging and refocused IT security New threats emerge on a regular basis and existing threats become the object of renewed attention, often fuelled by governance and regulatory concerns or a general maturing of products in the market place. In parallel, vendors produce innovative solutions to combat these new, emerging or refocused threats, which eventually become subsumed as part of foundational IT security systems. Enterprise Data Protection The coming together of data loss prevention and data encryption and the purpose of this Bullseye report. Unified Threat Management Firewalls Content Management and Filtering Enterprise Data Protection Advanced Attack Detection Intrusion Detection and Prevention Network Audit New and Emerging IT Security Technologies Data Encryption Data Loss Prevention Security Policy Policy Management IT Security Domain Increasing level of Data Protection Figure 4: The IT Security Domain A Bloor Bullseye Report Bloor Research
6 Introduction to Enterprise Data Protection In the past, IT security had been focused on securing organisational perimeters until it was realised that these were quickly breaking down due to the increasing demands of mobile workers, closer business relationships, outsourcing and other organisational challenges. This led to what is now known as IT security de-perimeterisation. At the same time, public awareness and the global regulatory environment have made the consequences of data breaches a significant business issue. Quickly, attention has moved to securing data itself by focusing on detecting and protecting data at risk. This data security is delivered via two technologies: Leak prevention solutions, which are used to detect if data is at risk of leaving an organisation s control, for example via or a USB drive. Loss protection using encryption to protect individual data whilst, for example, on laptops or in . Enterprise Data Protection is a new and evolving market place that represents the coming together of leak and loss prevention technologies. Components of Enterprise Data Protection Despite having in place good security policies and technologies, ultimately the data still remains at risk unless two actions are taken: Data is monitored by smart tools to prevent data leakage Data is protected with encryption to ensure any data actually lost would have minimal business impact By combining these two areas of IT security in combination with foundational security technologies a business can be assured that it is as secure as possible. Technologies that comprise the Enterprise Data Protection domain include: Data leak prevention»» Endpoint level data leak prevention»» Network level data leak prevention Data loss protection Data encryption Digital rights management encryption Data loss prevention Mobile encryption End point encryption Network server encryption Document security Server/mainframe encryption Bloor Research A Bloor Bullsye Report
7 Introduction to Enterprise Data Protection Enterprise Data Protection the perfect product benchmark Part of the Bullseye process is the creation of a mythical perfect product that will achieve a 100% Bullseye score. It is accepted that this perfect product may be some time away, but the description provides a benchmark against which current and existing products can be evaluated. Enterprise Data Protection description of the perfect product The product would be able detect and prevent data leaks across , print, CD/DVD, copy to USB, IM and FTP sources, print screen and any other new and emerging data leak vectors. If data does leak by mistake, it would be encrypted so that no clear text data ever leaves an organisation inappropriately. The product will support industry standards, as appropriate, and have published interfaces for third party integration. It will support proprietary as well as open source operating systems. Data leak prevention rules could easily be implemented by business users who can adapt the rules in line with business requirements and policies. As business policies evolve any changes can easily be reflected back into the data leak detection mechanism. Monitoring of attempted data leak violations will be undertaken by the business and will not need the input of IT specialists. The setup and configuration of the product would be straightforward for a reasonably experienced computer user and leak monitoring will be fully customisable, with log files auditable for any subsequent investigations. These log files will be able to provide evidentially robust reports for forensic investigations. Smart ways of preventing data leaks will include the use of heuristics and file fingerprinting to determine if data has been manipulated prior to possible removal as well as more conventional keyword/attribute based data analysis. It will not be possible to circumvent the data leak detection capability by adapting, changing, manipulating or otherwise corrupting the data. As well as leak prevention, data will be automatically encrypted at all stages, so that any data that should leave the business is in an encrypted form. Users will not be expected to manually encrypt data as all decisions concerning when and how to protect data by encryption will be undertaken for them by the product. At no time will data in the clear be visible to any unauthorised persons inside or outside the organisation. It will not be possible for recipients of encrypted data to unencrypt the data and forward it on as plain text. There will be support for a range of encryption standards including X.509 and Open PGP with the ability to integrate into other standard encryption technologies. The robustness of the encryption algorithms used must grow in line with new and emerging threats. Products used to backup data, including disk drives and tape backup systems, will have integrated encryption and data leak prevention capabilities. Effective and efficient encryption key management will come as standard and support facilities such as key issue, distribution and escrow. Key management will be straightforward and any complexities hidden from users and administrators. Full disk encryption will come as standard, as will encryption of data across folders, , removable media, mainframe systems and network file servers. There will be tight integration with systems and implementation of the product will support both end-to-end and gateway-based encryption models, based on requirements of the business. Support for encryption on mobile/handheld devices is a standard feature as is the ability to remediate files across the deployed solution. Dynamic, real time encryption of data will be a fast process that will not be obvious to any user and will not have any detrimental affect on any system performance. File and data discovery is supported at the end point, network and gateway level and all data in transit will be dynamically monitored to ensure that it is protected as appropriate. If there is no direct support for data leak prevention or data loss protection then the product must easily integrate into a partner s solution such that a seamless single product is produced, with all of the attributes of the perfect product. The product will scale both up and down to support the requirements of medium and A Bloor Bullseye Report Bloor Research
8 Introduction to Enterprise Data Protection enterprise deployments and there will be no performance degradation visible to users where this solution has been implemented. This will be evidenced in case studies. Full support will be implemented for remote or disconnected users, such that any data used off line is as protected as it would be when connected to the monitored network. This will extend to the use of handheld devices, smart phones and any other device capable of carrying sensitive data. End user training will not be necessary as any data protection/leak prevention will be automatic. IT department training will be minimal and business user training will also be minimal. Product pricing will be in the average range for such a product, as measured by its nearest competing solutions. Technical support will be made available at standard industry pricing and the quality of service will remain good to excellent as measured by regular customer feedback Bloor Research A Bloor Bullsye Report
9 Introduction to Enterprise Data Protection Criteria for vendor inclusion Like many markets, IT security contains hundreds of products many of which have overlapping or multiple features in one solution. A market review was undertaken and vendors were selected who actively marketed their solutions as data encryption, data leak or other associated technologies. Once an initial set of vendors was selected the list was reviewed to ensure that the following conditions applied: Product was targeted across most if not all market sectors Product was available on the general market Product had been available for more than 1 year Vendors that listed a feature relevant to the Enterprise Data Protection domain but could not significantly evidence this were excluded. The following were also excluded: Software source code security and auditing tools Pure digital rights management (DRM) vendors Document management tools Application-specific security tools Appliances or software designed to secure one particular element of a solution, for example a relational database During the research it was evident that there were some vendors that still had a firm North American approach to their sales, and had very little or any presence in EMEA or other international markets. This did not result in them being excluded from the report, but their scores were similarly reduced in areas of geographical coverage. In some instances this did make data collection more difficult. In some instances the inclusion of a vendor was a difficult decision as their solution may have been on the margins of the accepted criteria. As this is the first report into the Enterprise Data Protection domain it was decided to include more vendors initially on the basis that subsequent reports may see them excluded. If a vendor was included in these circumstances it is accepted that they would score in the lower range against the ideal product benchmark. One technology area that did require special attention was that of digital rights management (DRM). Whilst taking a slightly different approach to solving the data leak problem, DRM is still a valid strategy and, on that basis, some major vendors in the DRM market were rated in this report. This was conditional on them actively marketing and selling their DRM product as a way of managing data leaks otherwise a complete new vendor sector would have required analysis. Some vendors were excluded even though they appeared to have an interesting solution. These were mainly very small companies with little or no direct market presence and with no auditable third party product endorsement. A Bloor Bullseye Report Bloor Research
10 The Bullseye open research framework The Bullseye open research framework is an independent multi-dimensional model for the comparative analysis of IT products. It provides end users with greater depth, more dimensions, and is readily configurable to reflect user priorities but still visually simple to assimilate and use. Bullseye measures both the technology and business to provide a set of weighted attribute scores that enables buyers to make the best decision. There are 3 elements to the production of a Bullseye: the core methodology, the domain schema, and the evaluation process. The Bullseye method uses seven primary criteria for evaluating vendor/product solutions, each of which is made up from various lower level generic and specific attributes, to which weightings are applied to calculate the total for that criteria. These are: Stability and risk Performance Architecture Fit for purpose Ease of use Support and coverage Value The domain schemas are created and approved by an independent committee of end users, analysts, vendors, consultants and trade associations based on 5 primary steps: Define the domain: what is the area (referred to as the sandbox) you are assessing and what other domains does it interact with. Define the optimal product: what would/ could you build if there was no limit on money, time or expertise. Define the specific attributes that will be used to assess the technologies and their relationships to the generic attributes. Define the scoring criteria: how does each attribute get scored on a scale of 0 5. Define the weightings for each attribute (specific, generic and master). There are 2 specific graphical views of the high level data of which the first is used within our Bullseye reports and the second within our individual product/company reviews. These are: 1. The landscape Bullseye, which provides a high level view of all the appropriate players in a domain. You can define the domain you wish to view dynamically. This is split into 3 sectors:»» Champions: generally large stable organisations with a strong overall solution and vision.»» Innovators: smaller companies or new products from larger companies that are very strong at the technology level.»» Challengers: valid solutions that should be considered based on more personal criteria, like existing legacy investments or integration requirements. The primary Bullseye graphic presents the products or companies in 2 dimensions. Nearest the centre (bull) has the highest rating and the positions around the circle show a holistic view of the type of solution for a generic buyer. 2. The solution view gives a picture of the overall solution based in its commercial, technical and function fit. The end result is like a shooting target where the smaller the shaded area of coverage the better the solution. Further information regarding the Bullseye framework and the schema for the Enterprise Data Protection domain can be found at www. bullseyefoundation.org Bloor Research A Bloor Bullsye Report
11 Market Overview The volatile nature of the Enterprise Data Protection market was ably demonstrated by the number of partnerships and acquisitions announced over the course of this research program. Many of these partnerships appear to be more like courtships as vendors explore the technical and cultural matches of other suppliers. In November 2007, Symantec purchased the data leak prevention company Vontu and McAfee purchased SafeBoot giving both of these well respected security vendors a foothold in the Enterprise Data Protection market. IBM announced partnerships in November 2007 with a number of security vendors including Fidelis Security Systems and Verdasys on the data leak prevention side and PGP for data encryption. Yet another announcement in November 2007 saw Utimaco, a data security company, announce a partnership with Safend, a data leak prevention supplier. Lumension Security, previously known as Patchlink, purchased Securewave in July In February 2008, PGP announced a partnership with Lumension to provide the ex-securewave Sanctuary product as part of PGP Endpoint, an Enterprise Data Protection offering. Workshare is another company that actively works with partners such as Utimaco, PGP and Voltage to provide a broader offering. In some quarters, data leak prevention is still seen as a shelfware solution with little track record of success. This view is increasingly challenged as larger vendors such as IBM consolidate data leak prevention technologies into their mainstream offerings. Many smaller vendors are generating new and innovative ways of detecting signs of an impending data loss incident using complex algorithms and detection mechanisms. In addition, all vendors have to play catch up with the myriad of new end user devices, all of which can download significant amounts of corporate data. Demand for Enterprise Data Protection has grown in the end user community, fuelled by many very public losses of confidential data. The reputational damage following on from such losses can be extremely costly, along with the expense of repairing customer and partner relationships. End users are starting to realise that not only should data be prevented from leaving an organisation in the first place the same data must be encrypted. This way, any data that does go missing will be protected. Practical issues surrounding the management of data encryption keys still arise despite the relative maturity of the encryption market. For vendors to be successful in building an Enterprise Data Protection solution consideration needs to be given to making key management far easier. The legal aspects of data loss incidents are also acting as a catalyst to product adoption. Specific loss disclosure laws are yet to be enacted in all international markets but USbased legislation is having a ripple affect as other markets realise that local laws may soon be introduced. Digital rights management (DRM) vendors continue to offer a slightly different approach to data loss prevention. With the growth in digital download technologies, DRM is becoming increasingly important and the lines between it and more conventional data leak prevention technologies are starting to disappear. A Bloor Bullseye Report Bloor Research
12 Market Overview Actions today It is fully accepted that this Bullseye report represents a forward looking view of products and technologies, and no one vendor is able to produce the perfect product today. On that basis, organisations still need to be protecting themselves and ensuring that data does not leak from their systems and if it does it remains securely encrypted. Whilst waiting for the perfect product, vendor solutions available today should be assessed and partnerships created with the best vendor able to supply an Enterprise Data Protection product set in a realistic time frame that suits your particular organisation. That way, existing products could be implemented knowing that when they are updated in the medium term that you will be moving closer to the goal of Enterprise Data Protection. Acknowledgments Bloor Research would like to thank the committee members that have supported this Bullseye. Further information For additional information relating to this subject visit Bloor Research A Bloor Bullsye Report
13 Bloor Research overview About the author Bloor Research is one of Europe s leading IT research, analysis and consultancy organisations. We explain how to bring greater Agility to corporate IT systems through the effective governance, management and leverage of Information. We have built a reputation for telling the right story with independent, intelligent, well-articulated communications content and publications on all aspects of the ICT industry. We believe the objective of telling the right story is to: Describe the technology in context to its business value and the other systems and processes it interacts with. Understand how new and innovative technologies fit in with existing ICT investments. Look at the whole market and explain all the solutions available and how they can be more effectively evaluated. Filter noise and make it easier to find the additional information or news that supports both investment and implementation. Ensure all our content is available through the most appropriate channel. Founded in 1989, we have spent over two decades distributing research and analysis to IT user and vendor organisations throughout the world via online subscriptions, tailored research services, events and consultancy projects. We are committed to turning our knowledge into business value for you. Nigel Stanley Practice Leader Security Nigel Stanley is a specialist in business technology and IT security and now heads up Bloor s IT Security practice. IT security comprehensively covers the whole remit of protecting and defending business or organisational systems and data from unwelcome attacks or intrusions. This large area includes protection from the outer edges of the security domain such as handheld devices through to the network perimeter, inside threats and local defences. It looks at the ever-growing threats, many of them new and innovative. It includes use of firewalls, data loss prevention, data encryption, anti-malware, database protection, identity management, intrusion detection/prevention, content management/filtering and security policies and standards. For a number of years Nigel was technical director of a leading UK Microsoft partner where he led a team of consultants and engineers providing secure business IT solutions. This included data warehouses, client server applications and intelligent web based solutions. Many of these solutions required additional security due to their sensitive nature. From 1995 until 2003 Nigel was a Microsoft regional director, an advisory role to Microsoft Corporation in Redmond, which was in recognition of his expertise in Microsoft technologies and software development tools. Nigel had previously worked for Microsoft as a systems engineer and product manager specialising in databases and developer technologies. He was active throughout Europe as a leading expert on database design and implementation. He has written three books on database and development technologies including Microsoft.NET. He is working on a number of business-led IT assignments and is an executive board member of a number of privately held companies including Incoming Thought Limited, a partner company to Bloor Research that specialises in security consultancy and education. Nigel is a member of the Institution of Engineering and Technology, the British Computer Society and the Institute of Directors.
14 Copyright & disclaimer This document is copyright 2009 Bloor Research. No part of this publication may be reproduced by any method whatsoever without the prior consent of Bloor Research. Due to the nature of this material, numerous hardware and software products have been mentioned by name. In the majority, if not all, of the cases, these product names are claimed as trademarks by the companies that manufacture the products. It is not Bloor Research s intent to claim these names or trademarks as our own. Likewise, company logos, graphics or screen shots have been reproduced with the consent of the owner and are subject to that owner s copyright. Whilst every care has been taken in the preparation of this document to ensure that the information is correct, the publishers cannot accept responsibility for any errors or omissions.
15 2nd Floor, St John Street LONDON, EC1V 4PY, United Kingdom Tel: +44 (0) Fax: +44 (0) Web:
White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for
White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web
White Paper. Architecting the security of the next-generation data center. why security needs to be a key component early in the design phase
White Paper Architecting the security of the next-generation data center A White Paper by Bloor Research Author : Fran Howarth Publish date : August 2011 teams involved in modernization projects need to
Endpoint & Media Encryption
Endpoint & Media Encryption Bill Kyrouz, Senior Applications Manager Bingham McCutchen LLP ILTA Boston City Rep (CR) Tim Golden, Principal Architect Enterprise Architecture & IT Governance McGuireWoods
CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS
CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS MARCH 2011 Acknowledgements This Viewpoint is based upon the Recommended Practice: Configuring and Managing Remote Access
Why SAAS makes sense: The benefits of Cloud Computing for Email Archiving
Why SAAS makes sense: The benefits of Cloud Computing for Email Archiving Confidentiality This document contains confidential material that is proprietary to Gradian Systems Ltd. The material, ideas, and
OVERVIEW. Enterprise Security Solutions
Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s
Email Security Solutions
TECHNOLOGY REPORT Email Security Solutions 1 TECHNOLOGY REPORT SUPPLEMENT EMAIL SECURITY TECHNOLOGY REPORT IF YOUR EMAIL IS SO CRITICAL, CAN YOU BE SURE IT S REALLY REALLY PRIVATE? FIND THE FULL RESULTS
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
IBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Protecting your business value from
Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex
Sytorus Information Security Assessment Overview
Sytorus Information Assessment Overview Contents Contents 2 Section 1: Our Understanding of the challenge 3 1 The Challenge 4 Section 2: IT-CMF 5 2 The IT-CMF 6 Section 3: Information Management (ISM)
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
IBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and
White Paper. Getting ahead in the cloud. the need for better identity and access controls
White Paper Getting ahead in the cloud A White Paper by Bloor Research Author : Fran Howarth Publish date : March 2013 Users are demanding access to applications and services from wherever they are, whenever
McAfee Security Architectures for the Public Sector
White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed
Symantec Messaging Gateway powered by Brightmail
The first name in messaging security powered by Brightmail Overview, delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus protection, advanced
Secured email Enterprise eprivacy Suite
EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT Secured email Enterprise eprivacy Suite JANUARY 2007 www.westcoastlabs.org 2 EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT CONTENTS Secured email Enterprise eprivacy
DOBUS And SBL Cloud Services Brochure
01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure [email protected] DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted
2012 North American Managed Security Service Providers Growth Leadership Award
2011 South African Data Centre Green Excellence Award in Technology Innovation Cybernest 2012 2012 North American Managed Security Service Providers Growth Leadership Award 2011 Frost & Sullivan 1 We Accelerate
Central and Eastern European Data Theft Survey 2012
FORENSIC Central and Eastern European Data Theft Survey 2012 kpmg.com/cee KPMG in Central and Eastern Europe Ever had the feeling that your competitors seem to be in the know about your strategic plans
Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.
Security solutions To support your IT objectives Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services. Highlights Balance effective security with
Symantec Messaging Gateway 10.6
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
How much do you pay for your PKI solution?
Information Paper Understand the total cost of your PKI How much do you pay for your PKI? A closer look into the real costs associated with building and running your own Public Key Infrastructure and 3SKey.
Symantec Messaging Gateway 10.5
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com E X C E R P T W o r l d w i d e W e b S e c u r i t y 2 0 1 1-2 0 1 5 F o r e c a s t a n d 2 0 1
Security Industry Market Share Analysis
Security Industry Market Share Analysis September 2011 Introduction The Research OPSWAT releases quarterly market share reports for several sectors of the security industry. This quarter s report includes
PCI Solution for Retail: Addressing Compliance and Security Best Practices
PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment
Titus and Cisco IronPort Integration Guide Improving Outbound and Inbound Email Security. Titus White Paper
Titus and Cisco IronPort Integration Guide Improving Outbound and Inbound Email Security Titus White Paper Information in this document is subject to change without notice. Complying with all applicable
INTRODUCING isheriff CLOUD SECURITY
INTRODUCING isheriff CLOUD SECURITY isheriff s cloud-based, multi-layered, threat protection service is the simplest and most cost effective way to protect your organization s data and devices from cyber-threats.
Mapping the Technical Dependencies of Information Assets
Mapping the Technical Dependencies of Information Assets This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital
Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program
Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Managing internet security
Managing internet security GOOD PRACTICE GUIDE Contents About internet security 2 What are the key components of an internet system? 3 Assessing internet security 4 Internet security check list 5 Further
Information & Asset Protection with SIEM and DLP
Information & Asset Protection with SIEM and DLP Keeping the Good Stuff in and the Bad Stuff Out Professional Services: Doug Crich Practice Leader Infrastructure Protection Solutions What s driving the
We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review
We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review The security threat landscape is constantly changing and it is important to periodically review a business
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
INFORMATION PROTECTED
INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never
How To Audit Health And Care Professions Council Security Arrangements
Audit Committee 28 Internal audit report ICT Security Executive summary and recommendations Introduction Mazars has undertaken a review of ICT Security controls, in accordance with the internal audit plan
Windows Hard Disk Encryption
Windows Hard Disk Encryption Usage Analysis September 2010 Windows Hard Disk Encryption Usage Analysis Introduction This is the first OPSWAT usage report for hard disk encryption products. Because Microsoft
Corporate Overview NEC Australia
Corporate Overview NEC Australia NEC Australia au.nec.com Company facts Strong history in Australia - Forty six years local expertise combined with global reach as part of NEC Corporation, a global leader
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
Total Protection for Compliance: Unified IT Policy Auditing
Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.
SafeNet DataSecure vs. Native Oracle Encryption
SafeNet vs. Native Encryption Executive Summary Given the vital records databases hold, these systems often represent one of the most critical areas of exposure for an enterprise. Consequently, as enterprises
EHS Management Software Making the right choice for your business
EHS Management Software Making the right choice for your business Practical steps for choosing the right software solution to manage your EHS performance & compliance 2 Practical steps for choosing the
Caretower s SIEM Managed Security Services
Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During
Tumbleweed MailGate Secure Messenger
EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT Tumbleweed MailGate Secure Messenger JANUARY 2007 www.westcoastlabs.org 2 EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT CONTENTS MailGate Secure Messenger Tumbleweed
IBM Cloud Managed Infrastructure Services for New Zealand Government
IBM Cloud Managed Infrastructure Services for New Zealand Government An agile cloud infrastructure designed to provide quick access to a security- rich, enterprise- class virtual server environment. 2
The Modern Service Desk: How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver Business Confidence
How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver White Paper: BEST PRACTICES The Modern Service Desk: Contents Introduction............................................................................................
Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS
Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS Traditionally, IT risk management has balanced security investment and the impact of the threat, allowing each business
InDetail. SolarWinds Log & Event Manager. a full-functioned, yet affordable, SIEM
InDetail SolarWinds Log & Event Manager An InDetail Paper by Bloor Research Author : Fran Howarth Publish date : January 2014 SolarWinds LEM provides all of the essential features required of a SIEM, but
Performanta Pty Ltd. Company Profile. May 2012. Trust. Practical. Performanta.
May 2012 Trust. Practical. Performanta. Company Overview Performanta Pty Ltd is an information security organisation that has a practical approach, competitively priced services, strong client commitment,
SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud
SafeNet Data Encryption and Control Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud Ensure Data Protection with Data Encryption and Control Across
SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud
SafeNet Data Encryption and Control Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud Ensure Data Protection with Data Encryption and Control Across
A practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection
White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division
itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.
Web Filtering Email Filtering Mail Archiving Cloud Backup Disaster Recovery Virtual Machines Private Cloud itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your
The reality of cloud. Go beyond the hype and make a better choice. t 0845 5055 365 e [email protected]. www.365itms.co.uk
The reality of cloud Go beyond the hype and make a better choice www. The meaning of cloud 1. Cloud means different things to different people, something that s reflected in the many definitions of what
White paper December 2008. Addressing single sign-on inside, outside, and between organizations
White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
How To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
Websense Data Security Gateway and Citrix NetScaler SDX Platform Overview
Websense Data Security Gateway and Citrix NetScaler SDX Platform Overview 2 The next generation of SDX platform provides the foundation for further integration. Today, Citrix NetScaler SDX appliances enable
Safeguarding the cloud with IBM Dynamic Cloud Security
Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares
EXCERPT Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares IN THIS EXCERPT Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015
WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?
WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber
overview Enterprise Security Solutions
Enterprise Security Solutions overview For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an ever-evolving IT threat landscape. It s how we got to be the world
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
With Great Power comes Great Responsibility: Managing Privileged Users
With Great Power comes Great Responsibility: Managing Privileged Users Darren Harmer Senior Systems Engineer Agenda What is a Privileged User Privileged User Why is it important? Security Intelligence
White Paper: Consensus Audit Guidelines and Symantec RAS
Addressing the Consensus Audit Guidelines (CAG) with the Symantec Risk Automation Suite (RAS) White Paper: Consensus Audit Guidelines and Symantec RAS Addressing the Consensus Audit Guidelines (CAG) with
Building on a Foundation for Growth: Integrating DLP with Message Security Infrastructure
Building on a Foundation for Growth: Integrating DLP with Message Security Infrastructure An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for RSA, The Security Division of EMC April 2010
SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD
SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD www.wipro.com Table of Contents Executive Summary 03 Introduction 03 Challanges 04 Solution 05 Three Layered Approach to secure BYOD 06 Conclusion
How To Protect Your Data From Harm With Safenet
SafeNet Information Security Government Solutions Disk & File Encryption Database & Application Encryption Network & WAN Encryption Identity & Access Management Application & Transaction Security Information
IT Security. Muscat 15+ ABOUT US IN A GLANCE
www.insight.co.om insightoman insightoman insightoman insight-information-technology www.insight.co.om insightoman insightoman insightoman insight-information-technology ABOUT US LOCATION Visit us at
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION
THE NEXT (FRONT) TIER IN SECURITY When conventional security falls short, breach detection systems and other tier 2 technologies can bolster your network s defenses. By John Pirc THREAT HAS moved beyond
