Ovum Decision Matrix: Selecting a Global Telco Managed Security Services Provider

Size: px
Start display at page:

Download "Ovum Decision Matrix: Selecting a Global Telco Managed Security Services Provider"

Transcription

1 Ovum Decision Matrix: Selecting a Global Telco Managed Security Services Provider Moving from network-centric security to the broader IT security suite Reference Code: TE Publication Date: 17 Sep 2014 Author: Mike Sapien SUMMARY Catalyst Ovum view The major systems integrators (SIs), IT providers, and carriers have dramatically increased their investment and interest in managed security services, and security vendors are rapidly introducing new products to arm these providers. There is growing demand for such services from enterprise customers that are struggling with growing security threats and breaches, and overall risk. Ovum has reviewed six carriers' global managed security services portfolios with the aim of providing insight into managed security services trends, focusing on telco-led managed security service provider (MSSP) challenges and opportunities. Global carriers have been offering managed security services for many years; historically these services have been very network-centric. Carriers started with security services by way of the network (e.g., WAN and Internet service security), and then added more security services as they became significant Internet service providers (ISPs). Managed security services have expanded into many of the carriers' different service areas, including private network, Internet, mobile, and web services, and are now expanding into many of their new cloud-based and IT services. Carriers can now also leverage their cloud, internal IT, and network assets to expand their services and skills as global MSSPs. All the carriers Ovum analyzed for this report stated that they will continue to make investments, recruit outside talent, and rely on strategic partnerships to develop their managed security services portfolios and security expertise. Security now cuts across many different enterprise services, going well beyond the network and defendthe-edge (perimeter) approaches. Owning the network and having visibility of network traffic provides a distinct advantage for telco MSSPs. With the ongoing digitization of consumer and corporate life and Ovum. Unauthorized reproduction prohibited Page 1

2 Key findings functions, ever more people and devices will depend on connectivity, which will make network ownership and related traffic visibility an even more compelling advantage. Managed security services have become a major opportunity, with the prospect of double-digit growth in revenues. After all, security is a required element of every enterprise service. Ovum's global service contracts analysis shows that managed security services are approaching 10% of the total value of the large global deals signed recently. There is increasing demand for managed security services, and we expect further growth in demand from enterprise customers that are frustrated with the increasing cost and complexity of securing IT and networks. Enterprise customers need help with responding to new threats, managing multiple security solutions, and analyzing disparate security information that still keeps them open to breaches. Threat management, cybersecurity, and analytics are now being added into the solution mix so that enterprises can attain the appropriate security level, and MSSPs need to strengthen their capabilities in these areas. It is still early days, but enterprises are starting to supplement historical defensive security measures with new preventative, real-time, automated measures to defend against, predict, and remediate security incidents faster and with more accuracy. Carriers are already in the game, but will need to make the right investments, pick the right partners, speed internal development, and integrate new security services to stay relevant and become trusted advisors and successful MSSPs. Telcos are global ISPs and IP backbone providers. They already see and manage high volumes of security incidents, breaches, malware, and hackers. Managed security services is already a large services revenue stream for telco-led MSSPs. MSSPs addressing the enterprise market have high potential for growth. Security is and will remain one of the critical requirements for enterprise customers of all sizes, and must be an integral part of any managed network and IT service now. Managed security services are extending beyond perimeter solutions to include more complex core solutions that lend themselves to both network- and cloud-based platforms. New security solutions are emerging that will supplement but not necessarily replace perimeter solutions. The increasing complexity and breadth of security services beyond devices means that number of managed devices, total revenues, and total number of customers are no longer good metrics for judging MSSPs capabilities, qualifications, or skills. Owning the network is strategically important, but carriers need to parlay this ownership into security tactics, services, and management that demonstrate and validate its importance. Enterprise customers need to see that network ownership leads to security solutions that are more relevant than those of MSSPs that do not own the network. Security is going through a wave of change. Many legacy vendors are being challenged by new architectures and emerging players, and by the move to cloud-based offers, centralized solutions, and more proactive security techniques. Ovum. Unauthorized reproduction prohibited Page 2

3 Recommendations for telco-led MSSPs Consolidate and integrate managed security services efforts and resources to maximize investment, encourage collaboration across the different internal work groups, and create the most comprehensive offer. Leverage the security tactics, security knowledgebase, and expertise inherent in being a tier-1 ISP. Integrate mobile security as part of the larger managed security services portfolio. Promote existing large security contracts, including government security contracts that can be leveraged with commercial offerings. Make internal IT security investments part of commercial managed security services offers. Ensure you operate at the CIO or chief information security officer (CISO) level for any engagement on managed security services. Utilize your strategic security vendors for sales, promotions, and market development activities, as well as product development. Make managed security services a top priority for investment; focus on outside hiring and internal skills development in addition to strategic vendor partnerships and alliances. Recommendations for enterprise customers Ensure that you have your security service inventory, access, and requirements well documented prior to engaging with third parties or MSSPs. Verify your current spend and planned budget for security services today and for the next three years. Prioritize your current security service requirements, with a strong focus on the business impact and infrastructure that you believe is the most vulnerable. Assess your interest in and need for cybersecurity and threat management; these have become critical new areas for security within the enterprise. Identify security service gaps and corporate willingness to jointly source (internal staff with external MSSP resources) or collaborate on security infrastructure. VENDOR SOLUTION SELECTION Inclusion criteria Ovum chose the service providers profiled here because they are the leading global telco-led MSSPs. They have significant installed bases of MNC, large enterprise, or government customers, and offer managed security services with global coverage. The service providers chosen are: AT&T BT Orange Business Services (Orange) Ovum. Unauthorized reproduction prohibited Page 3

4 Exclusion criteria Telefonica T-Systems Verizon Enterprise Services (Verizon). Methodology Several telco service providers have strong managed security service offerings but not the total MSSP portfolio or global reach. For example, CenturyLink/Savvis has strong capabilities but does not have the global coverage or full MSSP portfolio. Others that have been excluded may still have a significant installed base of customers in a few regions, including strong capabilities in their home markets, but no significant global coverage. SIs and IT-based MSSPs were excluded from this report, but will feature in a future Ovum study. Portfolio assessment This assessment dimension covers the features and functionality that differentiate the leading solutions in the marketplace. The criteria for managed security services are: Breadth: the complete range of services in the managed security services portfolio that addresses global large enterprise needs. Integration: how well the various elements of the managed security services portfolio are aligned and integrated within the overall telco MSSP offer. Partners: the number of major partnerships with security vendors to support and expand the managed security services portfolio. Road map: the robustness of the managed security services portfolio road map and its alignment with each MSSP s current portfolio. Vision This dimension covers the capability of the solution across the following key areas: Strategy: the strength and completeness of the MSSP s strategy at a company level and its alignment across all global managed enterprise services. Road map: the alignment of the road map with the MSSP s stated vision and the related longterm investment in and commitment to new security services, alliances, and service innovation. Vendor involvement: the level of engagement with security vendors and consortia relationships that go beyond the resale of security products and services; this includes joint development, creating security standards, or security collaboration efforts (e.g., cybersecurity). Execution This dimension reviews the capability of the solution across the following key areas: Ovum. Unauthorized reproduction prohibited Page 4

5 Ovum ratings Customers: the existing total number of customers, the number of significant large enterprise customers, and the range of global enterprise customers beyond the telco MSSP s home territory. Revenues: an estimate of the total annual revenue amount and a breakdown of revenues from the five major global regions. Growth: the estimated current annual growth and shared growth objective for the carriers managed security services. Coverage: the ability to provide global managed security services with regional staff to support customer requirements (sales, professional services, and operations) in all major region of the world. Market leader: The service providers in this category are those that we believe are worthy of a place on most MSSP selection shortlists. They have established commanding market positions with products and solutions that are widely accepted as best-of-breed and that have been deployed globally. Market challenger: Service providers in this category have good market positions and are selling and marketing their solutions and services globally. They offer competitive managed security offers and have limited global coverage with strong pan-regional support. These providers should be considered in specific regions. Emerging provider: Service providers in this category typically aim to meet the requirements of particular types of customer or have strengths and coverage in some, but not all, major global regions. As tier-1 providers they should be considered as part of any selection. MARKET AND SOLUTION ANALYSIS The telco as MSSP The history of WAN For years, carriers have provided managed security services with a network-centric approach and with a protect the edge strategy. This approach, which incorporates firewalls and intrusion detection services (IPS), was very common among MSSPs the perimeter defense approach was historically successful in protecting the various sites and private networks within the enterprise. Security for Internet, web, and services was added to this perimeter approach, typically by including another security appliance for each new service. Carriers have a large base of security customers using a network-centric service model. Managing additional appliances was a natural extension to managing the WAN services of corporate private data networks. Telco MSSPs now need to move beyond the network-centric, perimeter approach and supplement their managed security services portfolio with security services that are centralized (within the enterprise core infrastructure). Centralized services can be provided using hosting and cloud platforms, which are now part of most carriers' infrastructure. Ovum. Unauthorized reproduction prohibited Page 5

6 Positioning and strategic fit for the telco as an MSSP Telcos' current position and fit Carriers have increased their security offerings as they have expanded from the private networks and basic layer-1 network services to higher-layer services (Internet and Ethernet) and advanced managed services (web hosting, , business applications). Carriers now have the opportunity to provide additional managed security services for private, hybrid, or public cloud services. Network services will continue to be part of the solution stack for different cloud deployment models, and security will be an integral part of connecting cloud services. Telcos are not known for IT services such as infrastructure management, business process outsourcing, or application development. However, given their strong experience in network security and as global IP providers and large ISP players, many enterprise customers will have some confidence in telco MSSP offers. Investment in staffing, strategic partnerships, internal development, and planning will be required to broaden the managed security services portfolio and increase customer confidence. If carriers can speed the development of security expertise and managed security services while centralizing and consolidating their security investments they have a strong chance of becoming trusted security advisors to the MNC and large-enterprise market. The opportunity comes with challenges Telcos do have some hurdles to overcome. Recent Ovum enterprise research suggests that carriers are not the first option for customers seeking security services or advanced threat protection. IT vendors, SIs, IT value-added resellers, and security tools vendors are the providers that enterprise customers usually mention with regard to managed security services. In addition, carriers' traditional customer contacts are not the CIOs or CISOs of large enterprises. Telcos have made some progress on the strength of providing security for global networks, complex managed hosting, and growing cloud services. Nevertheless, they have work to do in getting brand and industry recognition as qualified MSSPs and security experts. The move beyond network- and perimeter-based security Most telcos started their managed security services with protecting the network and defending the edge of the network. This was a great approach 10 years ago; early security services were heavily dependent on defending the edge and protecting access to the corporation's remote sites. Typical early managed security service offers were aligned with router vendors such as Cisco and Juniper for customers connected to the telco's own network. The solutions were subsequently enhanced with security appliances to handle new functions ( filtering, Internet access, web traffic), which increased the security at the perimeter and also increased carriers' share of wallet. Then vendors such as Riverbed Technologies were added to provide enhanced features, including WAN optimization with centralized management, and additional services beyond security. Now carriers need to move beyond the edge and appliance approaches to include broader managed security services for enterprise IT core resources, including data center and enterprise applications. Cloud security is another emerging opportunity as telcos become both cloud service providers and Ovum. Unauthorized reproduction prohibited Page 6

7 network brokers for cloud services. Mobile security is another growing opportunity, with the use of mobile operators' internal capabilities combined with cloud services. Distinct opportunities in the large enterprise and SME markets Large enterprises with global needs For this report, Ovum asked key carriers to provide details of their managed security services for MNCs and large enterprises with global requirements. Telco MSSPs are currently making major investments to address the needs of this segment. Growth in managed security services appears to be very high (double-digit). The SME security market is a unique and separate opportunity Although this report focuses on the large enterprise and MNC segment, many carriers and security vendors mentioned that they also intend to move down-market with some or all of their managed security service offers. With the increasing use of cloud both as a security platform and a delivery mechanism for security tools and services, carriers are looking to add security options within managed SME service bundles. Ovum believes that telcos can address the SME market with managed security services. They could easily offer SME bundles with optional security services on a trial basis, for example, to drive a high adoption rate with very cost-effective infrastructure. Managed security services and security resources from the large enterprise efforts can also enable sales down market. The SME and mid-market segments may eventually be a larger market opportunity for telco MSSPs than the Fortune 1000 enterprise market. Many SME solutions or security features within service bundles will likely be simplified or downgraded large-enterprise security solutions. Managed security services trends Enterprise customers are overwhelmed Enterprise customers are increasingly seeking external help in addressing their security requirements. Customers may differ in their specific needs, but they all confirm that security is rising in importance and that it is becoming harder to attain the necessary security staffing and skills for their businesses. They need threat management (including remediation) services, security operations center (SOC) support, and security intelligence (analytics) to develop proactive security tactics. Customers are also looking for guidance on new attacks and preventative measures. Demand for managed security services is growing, complexity is increasing, and enterprise customers are looking outside for professional, experienced assistance. This demand is not usually for total outsourcing or security information and event management (SIEM) platforms, but rather for a form of joint or co-sourcing to enhance what the customer is doing today. Ovum. Unauthorized reproduction prohibited Page 7

8 From reactive to proactive approaches Gone are the days of providing managed security services that were limited to reacting to security violations and breaches. And just establishing an SIEM platform for a customer is not enough to qualify as an MSSP. Customers are now demanding new security methods that go beyond just reactive remediation services based on security violations. Most are in a position to manage reactive security programs they are looking for managed services, expertise, and intelligence that starts to overlay or complement security programs with proactive and predictive actions, automatic policies, and recommended actions based on specific criteria, behaviors, or known patterns. Defending the edge plus core infrastructure techniques Perimeter security has historically been critical to corporate security and it remains so. However, security services need to be enhanced and supplemented with additional security methods, including tools within the corporate core IT and network infrastructure. It is not a case of one model replacing the other; rather, both models are required to attain the best security position. Moving to new technology: cloud, network, and IT infrastructure Two dimensions of cloud Ovum found that that cloud services were a major topic for discussion during the recent US RSA security conference, in MSSP interviews and at multiple security vendor briefings. And in most of these discussions, cloud services were discussed from two different perspectives. First, MSSPs and security vendors were developing new security offerings, enhancing existing security offers or migrating legacy security solutions to cloud-based platforms for delivery "as a service." The other aspect of cloud services was the addition of new security services to managed security services portfolios. These are intended to provide the required security for enterprise customers planning to use cloud services. As IT service consumption moves to the cloud and providers start to deploy new cloud services, it is a natural extension to add the security services that are required for the use of cloud services. The challenge becomes more complex as customers demand a mix of private, public, and hybrid implementations between different vendors of software, network, and cloud resources. Maintaining and improving security during corporate infrastructure transitions As enterprise customers transform their IT and network infrastructure, they need to address concerns around security. The transformations go beyond moving to cloud services, replacing network providers, or replacing IT hardware vendors. Whenever customers make plans to replace or refresh major components of their corporate infrastructure, maintaining and improving security is central to making the transition smoothly and successfully. Cybersecurity with analytics and intelligence Managed security services are now expanding to include cybersecurity services that cut across and impact the entire security service portfolio. Cybersecurity is developing into a new service module within managed security services and will quickly become a horizontal capability deployed across each MSSP s Ovum. Unauthorized reproduction prohibited Page 8

9 full service model. Such services will have to go beyond security breach verification and identification. MSSPs will be required to advise customers on security attacks and add some degree of analysis (to create predictive modeling) or policy (to prevent future attacks). Big Data is a subject in its own right, but the early indications are that cybersecurity investment and related service development will feed into security best practices, analytics across the managed security services portfolio, and intelligence. This will create security policies that quickly and automatically isolate and remediate security outbreaks. Strategic partnerships: new players, fewer partners, joint development Major MSSPs and security vendors are increasing their use of strategic partnerships, leading to longerterm commitments and investments in joint development. In some cases, MSSPs are reassessing their security vendor line up and starting to prioritize strategic relationships and reduce the number of standard vendor relationships. All MSSPs have some relationship with a major SIEM vendor, and usually some experience with a number of them in providing legacy security services. At the same time, new and different security vendors (e.g., FireEye, Bit9, CipherCloud) are emerging as next-generation security vendors, many leveraging cloud platforms or security analytics. For example, AT&T recently announced partnerships with IBM to enhance its threat-management portfolio; it separately announced a new service based on Blue Coat s cloud security offering. Such strategic partnerships, along with joint developments, internal developments, and the overall increasing use of security analytics should provide differentiation among the various MSSPs going after the large enterprise market. Threat management's three Rs readiness, response, remediation Remediation has been added to the two Rs, with a dash of analytics. Threat management has been part of many MSSP service portfolios, but the new part of the service is the addition of remediation, which is a critical part of a comprehensive threat management service in a managed security services portfolio. Remediation goes beyond just the identification and isolation of a security threat; it includes creating preventative measures and tactics to stop future similar threats. Many security vendors and MSSPs have added or plan to add major investments to provide remediation services as extensions of their existing threat management services. Again, cybersecurity is an integral part of the new threat management services, but analytics is the new ingredient. Cybersecurity efforts that provide security analytics are now part of the supply chain, providing the intelligence required for proper threat management and remediation. Ovum. Unauthorized reproduction prohibited Page 9

10 Ovum Decision Matrix: telco managed security services Figure 1: Ovum's view of telcos as global MSSPs Source: Ovum Table 1: Ovum Decision Matrix: telco managed security services Market leaders Market challengers Emerging provider AT&T BT Verizon Orange T-Systems Telefonica Source: Ovum Telco MSSP comparison Overview When assessing these telcos managed security services portfolios, Ovum took into consideration the global capability, current success (revenues and customers), vision, and strategies of each carrier as a global MSSP. AT&T, BT, and Verizon are clear market leaders as global MSSPs. T-Systems is a market challenger, with a smaller base of managed security services business and a strong focus on Europe as Ovum. Unauthorized reproduction prohibited Page 10

11 its primary region. Orange Business Services is also a market challenger, with a strong base of customers, an expanding product portfolio, and some limitations in its global coverage. Telefonica is an emerging provider, with some product gaps, geographic gaps in coverage, and a developing vision as a global MSSP. It is strong in Europe and Latin America, but lacks coverage and support in North America and Asia-Pacific. All six carriers have global capabilities and customers, but they vary in the overall maturity and breadth of their product portfolios, the size of their customer bases, the scale of their revenues, and the extent of their global capabilities. All have room for improvement; all of their future services and road map items are still works in progress, and many are based on recent announcements and partnerships that still need to bear fruit. Portfolio Figure 2 shows Ovum's view of the managed security service reference portfolio. It is based on our findings from discussions with security vendors, our ongoing research on MSSPs in general, and the research completed specifically for this report. The portfolio represents the broad set of services that MSSPs are attempting to offer to large enterprise customers. Ovum used this framework to gauge the breadth of the carriers' portfolios. Our assessment also included a review of the integration of each carrier s security service pillars, security vendor relationships, security industry involvement, and road map. None of the carriers had all elements of the portfolio, and some service elements were either road map items or in development. Figure 2: Ovum's managed security services reference portfolio Source: Ovum Ovum. Unauthorized reproduction prohibited Page 11

12 Figure 3: Portfolio assessment Source: Ovum Vision Ovum assessed each telco s strategy and vision for managed security services. We also researched overall trends and the direction taken by key security vendors to validate our view on the appropriate strategic direction and vision for MSSPs in today's market. We took into account the carriers involvement with security industry vendors and related forums. This analysis formed the basis of our assessment of each carrier's current strategy and future vision, including their road maps and work-in-progress items. Ovum. Unauthorized reproduction prohibited Page 12

13 Figure 4: Vision assessment Source: Ovum Execution Each carrier provided detail about its current managed security services, existing customers, current revenues (or estimated ranges), and expected growth. Some of this information was provided to Ovum under non-disclosure agreements and cannot be published, but we were able to assess their existing revenues, their estimated number of customers, the level of their business, and their scale as a global MSSP. We also considered global capability under this category. Ovum. Unauthorized reproduction prohibited Page 13

14 Figure 5: Execution assessment Source: Ovum A note on global capability Every carrier included in this report has some degree of global coverage in terms of managed security services for large enterprise customers. Just as the carriers have been able to provide WAN services to these customers globally, so they can include additional security services. But providing global managed security services support for MNC and large-enterprise customers includes offering pre-sale, sales, and technical support, as well as post-sale, account management, and ongoing maintenance support and doing so across all the major regions of the world. Offering comprehensive global support means having SOCs in major regions and making regional and professional services staff available for managed security services. Ovum used the survey responses and interviews with the carriers to determine the carriers levels of global capability and support. Shortlisting providers: a view from the enterprise Geographic/regional guidance All six carriers in this report provide some degree of global coverage, but all have particular strengths in their home regions and countries. AT&T and Verizon are strong in the US; BT and T-Systems are strong in Europe. Orange is strong in EMEA; Telefonica is strong in Europe and Latin America. Customers need to consider these regional strengths when assessing MSSP vendors. Procurement, responsibility, and scope guidance Managed security services are becoming more critical for all MNC and large enterprise customers. They need additional support due to the growing level of threat, the complexity of intrusions, and the increasing sophistication of breeches. CISOs will be required to balance their fixed budgets with this Ovum. Unauthorized reproduction prohibited Page 14

15 increased level of risk, while also balancing internal and third-party resources to ensure sufficient security measures and policies are in place. Security will always be critical customers must place a high priority on protecting their IT assets and also the corporate brand. MSSPs provide additional support, knowledge, resources, and skills, but the CISO is ultimately responsible. Ovum therefore does not believe that security can be completely outsourced. Customers will need to have the primary responsibility, but they can lean on security vendors such as MSSPs for complementary services and expertise. Each customer will need to determine the balance of internal and external resource that is appropriate for them. SERVICE PROVIDER ANALYSIS AT&T Figure 6: AT&T s global managed security services portfolio Source: AT&T Managed security services overview AT&T's managed services portfolio includes five main pillars, with consulting as an overlay to them all. Although much of its security services have historically been network-centric and premise-based, AT&T is expanding into cloud-based offers and adding more services to its security portfolio. Managed security services form a major element of AT&T's enterprise services portfolio. Its revenues, customer base, growth rate, investment, global expansion, and current customer demand are all sizable. Earlier in 2014 Ovum. Unauthorized reproduction prohibited Page 15

16 the carrier announced an alliance with IBM that will focus on joint development around threat management and analytics. Threat management AT&T s Security Event and Threat Analysis, Internet Protect, DDoS Defense, and Private Intranet Protect services are all part of the threat management service pillar of its managed security services portfolio. Today the carrier s threat management is very network-centric, but its road map suggests that this service will become a core, centralized offer. It will cover corporate data center infrastructure and IT elements within the enterprise. With its IBM alliance centered on threat management and analysis, AT&T's capabilities in this area should expand to include cybersecurity features and analytics that can feed into other parts of its managed security service portfolio. Mobile security AT&T's position in global mobile services and enterprise mobility programs means that mobile security is a natural extension to its managed security services. Device management with antivirus/malware protection, network security options, and SSL services are included in mobile security. AT&T's mobile device management programs have these mobile security elements as standard options for its customers and include support for cross-carrier environments beyond AT&T's own mobile network. AT&T is also integrating managed security into its Toggle enterprise mobility program. Network-based security Secure network gateways, network-based firewalls, secure gateways, and web security are all part of AT&T's network-based security services pillar. AT&T has provided these services for many years, and provides such support for many of its large enterprise customers. Customers have a confidence in AT&T's ability to offer and support these security services. Identity management AT&T offers its enterprise customers many identity management options, including multi-factor authentication and single-sign-on solutions. Premise-based security In addition to network-based security, AT&T has for many years offered premise-based firewall, intrusion detection system (IDS), and application security options to its customers as part of its managed security services portfolio. Consulting Along with general security assessments, AT&T offers support for governance, risk, compliance, and payment card industry (PCI) assessments, as well as cloud and mobility security consulting. Ovum. Unauthorized reproduction prohibited Page 16

17 Go-to-market approach and positioning AT&T s position as a global security provider is based on its network-enabled services, secure mobile business services, cloud-based services, and threat management offering. It is a US-centric security player with a strong focus on serving those of its domestic MNC customers that require global reach. It competes with the large MSSPs, including both IT and telecoms vendors. AT&T s position as one of the largest global ISPs, broadband providers, and IP network operators gives it credibility in delivering managed security services. It gains first-hand insight and visibility into the many security attacks, malware attacks, and breaches that occur within its customer base over these networks. Strategic security assets staff, partnerships, alliances, and acquisitions AT&T s partnerships with IBM and Blue Coat are recent examples of its investment in its managed security services portfolio. The carrier will support joint development that will enhance this portfolio, and it is also adding to its internal skills and resources. RSA, IBM, Arbor Networks, Cisco, Juniper, and Riverbed are among the strategic vendors of AT&T's managed security services portfolio. Akamai (with Kona Security Services) is another strategic vendor that provides support for AT&T's DDoS and web security service offers. Road map AT&T recently announced the Blue Coat security service offering in the US; it plans to expand this cloudbased security service globally in the latter part of Another major road map item for AT&T will be extended threat management, with its recently announced alliance with IBM. These initiatives are examples of the type of major investments that AT&T is making to provide more robust security offerings and global availability. The carrier is also making the transition to cloud-based security services, and will leverage its internal cloud infrastructure to support these new offerings. Ovum assessment AT&T is a major global player in security services and is making significant investments to broaden its managed security services portfolio. It already has a number of contracts in place with large MNC customers in this area. Global reach is one key goal, with global service expansion on the cards. With the exception of Latin America, it already covers the major regions, but the focus of its security support is on US customers. Ovum expects the carrier to continue investing in its security services, with major expansion in the EMEA and Asia-Pacific regions. It may also expand into Latin America in the near future. AT&T's partnership strategy for security services aligns with its overall strategy to expand its enterprise portfolio. It plans to partner with fewer, larger strategic vendors rather than have many smaller vendors with smaller scale impact. It does not directly define cybersecurity as part of its security service portfolio, but this service will become part of the output from its investment in threat management, especially with the recently announced IBM alliance. AT&T offers managed DDoS and web security services and will continue to extend further into the IT application stack and IT infrastructure, but it will likely acquire these capabilities from its strategic partnerships with SIs and IT security vendors. Ovum. Unauthorized reproduction prohibited Page 17

18 BT Figure 7: BT s managed security services global portfolio Assure Source: BT Managed security services overview BT Assure BT has been investing in managed security services for many years now. It recently rebranded many of its managed services, including its managed security services portfolio; BT Assure is now the brand for its managed security services portfolio, as depicted in Figure 7. The telco has reorganized its security resources into one central group and is now led by its former CSO. BT has also aligned its security assets and with its regional teams. Although BT's security resources are concentrated in Europe, it has extensive resources in Asia-Pacific and the Americas. BT Assure Intelligence Threat monitoring, vulnerability scanning, and analytics are the key elements of the Assure Intelligence services. They provide customers with a comprehensive view of and defense against malicious attacks and security violations. BT Assure Intelligence includes the management of the customer's SIEM onpremise or within BT's security centers or SOCs. BT Assure Continuity Assure Continuity provides high availability of the customer's networked IT infrastructure and business continuity management framework. It is focused on network connectivity within the customer's IT infrastructure, and includes DoS services. Ovum. Unauthorized reproduction prohibited Page 18

19 BT Assure Identity Authentication, identity verification, encrypted , digital signatures, and public key infrastructure are the key parts of Assure Identity services. BT provides identity and online fraud services to many of its MNC customers globally. It has key accounts in the UK, Australia, and Latin America. URU (you are you) is also part of this service pillar and is offered to reduce fraud. BT Assure Managed Most of the traditional network-centric security offers managed firewall, managed web, IPS, message ( ) scanning are included in Assure Managed. It also has cloud versions of some of these services, plus DDoS services. BT Assure Secure Remote Access BT offers solutions for remote and mobile access. It supports IPsec and SSL VPNs with multi-factor authentication to provide secure access to corporate resources for any device, any time customer requirements. BT Assure Cyber Assure Cyber is an overlay service that includes a security assessment and a fully managed security service that incorporates the oversight and management of customers' entire security programs and policies. Cybersecurity services and professional security consulting are part of this premium service. BT Advise Assure Professional services, security consulting, and assessment are all part of BT's Advise Assure program. This is not meant to be stand-alone offer so much as a professional service aligned with BT s security service portfolio for its MNC customer base. Go-to-market approach and positioning BT focuses on MNCs and larger enterprise customers with global requirements in all the major regions of the world. Its offer is meant for sophisticated enterprise customers that are looking for help getting ahead of the threat curve and managing their growing security threats and issues. BT's goal is to provide an end-to-end service through its consulting capabilities, which are all tied to its WAN and LAN solutions. The integration of security solutions is also part of BT's value proposition. BT has a number of large government contracts (not just in the UK) and large MNC customers, and it can take on most MSSP competitors even going beyond just the telco-led ones. BT has a strong set of security assets, including skilled staff, global SOCs, and a large MNC customer base. It also has strong vendor relationships. These qualities position BT as one of the major global MSSPs. Strategic security assets partnerships, alliances and acquisitions BT made one of the first strategic security vendor acquisitions by a telco when it purchased Counterpane in 2006; it now has partnerships with more than 60 security vendors. Many of these vendors are deployed within BT's own infrastructure, which emphasizes how the carrier is leveraging its internal IT Ovum. Unauthorized reproduction prohibited Page 19

20 and network experience for its commercial security offer. BT utilizes the traditional vendors (Cisco, Juniper, and Checkpoint), but is also active with new, niche security vendors such as FireEye, Lumeta, and Skybox. BT has its own SIEM platform, Socrates, but also supports other SIEM platforms based on customer demand. The carrier has demonstrated interest and made investments in many emerging security technologies and vendors, a trend that Ovum expects to continue. Road map BT s new managed security services include web security, mobile device management, cybersecurity and threat management offerings, along with the related professional services. The carrier is adding more cloud-based, hosted, and assessment options to its overall product line for most of its security portfolio pillars. Assure evaluator is an example of BT s enhanced security assessment offer, whereby it provides security readiness and a 24-month plan. The telco is also developing analytics enhancements to help correlate and analyze disparate security events and provide proactive security recommendations and policies. It is engaged in the prioritization and consolidation of its security partnerships line up, which should result in fewer, stronger relationships that provide increasing integration, lower costs, and faster time to market for many of its security offers. Ovum assessment BT has a pedigree as one of the major MSSPs for MNC customers and has invested in expanding its security services to include IT infrastructure. It also has the most complete global reach, with strategic security staffing and infrastructure in all the major regions of the world. Its MNC and large enterprise security customer base is global, with customers in key verticals such as public sector, healthcare, and financial services. BT's recent investment in expanding its threat monitoring services in Brazil is yet another example of the priority it gives security portfolio build-out and global presence. Ovum. Unauthorized reproduction prohibited Page 20

21 Orange Figure 8: Orange s managed security services portfolio Source: Orange Managed security services overview Orange delivers its managed security services portfolio in three major components: managed security solutions, consulting, and cyberdefense. These are the major ingredients for its offer to the MNC and large enterprise market globally. These service components are delivered in a combination of three different delivery models custom solutions, managed services, and cloud based. Managed security solutions Management and governance, trusted work environment, and trusted infrastructure are the three pillars of Orange's managed security solutions. Management and governance consists of CyberSOC, cyber risk and compliance intelligence, and security event intelligence; trusted work environment includes security integrated services, flexible and mobile SSL, mobile security, and flexible identity in providing security for access, terminal/devices, and identity management; and trusted infrastructure includes DDoS and unified defense (e.g., firewall, web filtering). These services form the core of Orange's managed security services portfolio. Ovum. Unauthorized reproduction prohibited Page 21

22 Consulting, including implementation Orange's consulting services are the professional services overlay to its managed security services portfolio. They include comprehensive assessments, PCI DSS support, audits, pentesting, engineering, and recommendations for enterprise security infrastructure, programs, and policies. Orange has a range of consulting to address the full security lifecycle. Cyberdefense Orange leverages its CyberSOCs, security personnel, managed solutions platforms, and its recent acquisition of Atheos to offer an additional layer of service, providing a plan for cybersecurity strategy that monitors, responds to, and remediates security events. The correlation and patterns of security activity, along with the correlation and analytics, allow Orange to provide this additional premium security service to its customers. Orange offers cybersecurity assessment and recommendation as part of its security consulting services. This is a new area for the carrier, and Ovum expects more announcements and enhancements in this domain. Go-to-market approach and positioning Orange offers its managed security services individually, but positions itself as full service MSSP and provides global, unified security management. It can take over the management of devices and network and IT infrastructure for its MNC and large enterprise customers. The telco has a strong global support structure for security services, with a particular concentration in EMEA, and also has security resources in the Americas and Asia-Pacific. Orange caters to MNC and government accounts that are based in France and other parts of Europe and that have global requirements. Strategic security assets partnerships, alliances, and acquisitions Orange has partnerships with more than 50 vendors, including many of the network, Internet, and webcentric vendors used by most telco-led MSSPs. The carrier also has strong relationships with security vendors such as HP, Qualys, Zscaler, Blue Coat, SafeNet, and Varonis and is working with many of these vendors in transitioning to more cloud- and network-based security solutions. It has obtained various security certifications, is working on collaborative cybersecurity efforts, and is participating in security industry forums. Orange s recent acquisition of Atheos will add to its security expertise, experience, and knowledge. Road map Orange is investing in network- and cloud-based security solutions, making improvements to its DDoS and identity management services, and enhancing its cloud security support. It is also investing in cybersecurity services; Ovum expects more announcements about the carrier s cyberdefense offer and the progress it is making with integrating its new acquisition, Atheos. Orange remains active with the security vendor community, so we expect to see further enhancements in its analytics and threat management. Ovum. Unauthorized reproduction prohibited Page 22

23 Ovum assessment Telefonica Orange is a strong player in managed security services in EMEA, with the common telco alignment with its network roots and services. It offers these services as a complement to its other network, IT, and managed services. The telco is leveraging its internal IT security resources and experience to create its security offers and increase customer credibility. It predominately works with its existing MNC and large enterprise customers that need help with security. Customer adoption shows that Orange has become a trusted advisor based on its customer base and security assets. Orange can also assist its larger enterprise customers in the Americas and Asia-Pacific. Figure 9: Telefonica s managed security services portfolio overview Source: Telefonica Managed security services overview Telefonica has been providing managed security services to its large enterprise customers for many years. With its global services push, the carrier has been investing in providing global security resources and technology to MNC and large enterprise customers. Network-based services The major elements of Telefonica s network-based services pillar are its clean pipes, web security, filtering, and anti-ddos services. Clean-pipes services include many security features that are aligned with the carrier s network and Internet services. Ovum. Unauthorized reproduction prohibited Page 23

24 Managed services Mobile device management, WAN device management, and security monitoring are the major elements of Telefonica s managed services pillar. Mobility and device management at the perimeter are included in its managed services for both fixed and mobile networks. Cybersecurity Threat and vulnerability detection are the key elements of Telefonica's cybersecurity offer. This appears to be one of the newer elements of the carrier s managed security services portfolio, and is also one of its areas of current and planned investment. Global services, security-as-a-service, and 24/7 service management The horizontal service overlays to the three major pillars of Telefonica's managed security portfolio are expanding security services from local coverage to global coverage, moving managed security services to cloud-based platforms, and providing complete 24/7 security service management. Telefonica's web security and filtering services are examples of where its security service is offered in a security-asa-service model. The carrier has security consulting services available across its managed security services portfolio. Go-to-market approach and positioning Telefonica focuses its managed security services customer acquisition on Europe and Latin America, and has security assets and capabilities in North America. The carrier can provide global services, but its strongest offering for MNC and large enterprise customers is in these three regions. It promotes its internal development and external vendor products to offer reactive, proactive, and preventative managed security service management approach. Strategic security assets partnerships, alliances, and acquisitions Telefonica works with many network security vendors, including Cisco, Juniper, and Arbor, as well as many IT security vendors, including AlienVault, Fortinet, HP, McAfee, RSA, and Symantec. FireEye, Rapid7, and Palo Alto Networks are also part of the telco s multi-vendor security mix, and it is using AirWatch for mobile device management. Telefonica also has security platforms developed by its own staff that are part of its proprietary mix of managed security services. The carrier has made some investments in security technology start-ups such as ElevenPaths (a fully-owned subsidiary set up as a 100% product company) and Blueliv (a cybersecurity technology company), has launched Sinfonier (a collaborative security knowledge and intelligence community for developers and researchers), works with various security consortiums and standards (ISO), and has its own proprietary developments (e.g., Saqqara, its security monitoring automation solution). Cybersecurity and threat management are Telefonica s key investment areas. Road map The major road map items for Telefonica are making additional SOC investments in its major regions (Latin America and Europe), expanding its geographic coverage (to include managed security services in Ovum. Unauthorized reproduction prohibited Page 24

25 the UK, for example), and continuing to invest in threat management and cybersecurity. Ovum expects to see more investment in analytics and advanced persistent threat and behavioral modeling within the carrier s cybersecurity offer. Ovum assessment T-Systems Telefonica's recent managed security service launches, its planned and announced geographic expansion, and its investments in managed security services are boosting its position as a global MSSP. The carrier s MNC and large enterprise potential lies mainly in Europe and Latin America; North America is one secondary region where it has increased its managed security resources. It has potential for market expansion, especially among US-based customers with growing Latin America or European presences. Ovum expects to see further investment from Telefonica; this, followed by customer adoption and service expansion, will position it as one of the major telco-led MSSPs within two years. Telefonica has global capabilities and a broad base of customers; these can provide the basis for competing to win global customers. It is most likely to succeed when MNC requirements lie in Europe, Latin America, and North America it has some work to do on building a comprehensive MSSP service portfolio. Ovum expects Telefonica to refine its managed security services portfolio as that portfolio matures and it develops its cybersecurity capabilities further, and we believe that the telco should highlight and provide more detail on its security consulting capabilities. Figure 10: T-Systems managed security services portfolio Source: T-Systems Ovum. Unauthorized reproduction prohibited Page 25

26 Managed security services overview T-Systems offers its managed security services with four different pillars and two service overlays: advanced cyberdefense services and security consulting. The major pillars are enterprise security management, identity and access management, ICT infrastructure security, and clean pipe services. The carrier s managed security services come under ICT infrastructure security services, as does mobile security, although it is not shown in Figure 10. T-Systems' mobile security portfolio addresses the mobile interactions within the enterprise and can be added in a modular way to the managed security services portfolio. Enterprise security management T-Systems offers comprehensive security management of ICT infrastructure; this includes governance, risk, and compliance systems. Design and integration of security processes, architectures, and implementation for ICT systems are part of this service pillar, as are audit and penetration services, security products, and system evaluations. Identity and access management Management of digital identities, trust center solutions, and smart cards are all included in T-Systems identity and access management service pillar. Authentication services, PKI-based solutions, and cloudbased identity management services fit into this service group. ICT infrastructure security Dedicated security solutions (firewalls, VPN, IDS/IDP, antivirus, and filtering solutions) are part of this service pillar. This includes content, web, , and network security services. Advanced cyberdefense services Advanced cybersecurity management services that provide detection, response, and recommendations for security threats and incidents are part of this existing managed security services overlay. The newly announced RSA and T-Systems alliance mentions enhancements for advanced cyberdefense SOC support, security tools, and enhanced malware support. Managed SIEM services have been running for several years and are an integrated element of this service. Security consulting T-Systems provides complete consulting services as an overlay to its managed security services portfolio. It offers consulting for the many different elements of its service portfolio and is working on customized support and sharing vendor expertise. Mobile security portfolio T-Systems offers mobile security, but classes it separately from its managed security services portfolio. Its security offers are divided into five categories: Dynamic Net-centric Sourcing (Cloud), Collaboration, Mobile Enterprise, Security and Governance, and Sustainability and Corporate Responsibility. Mobile security services are positioned as safeguarding mobile interactions across the enterprise and include Ovum. Unauthorized reproduction prohibited Page 26

27 options for traditional mobile device management. One interesting aspect of T-Systems mobile security offer is how it is built around different threat scenarios, with contrasting approaches for when the attacker is and is not in possession of the device. In addition, the carrier has a mobile encryption program. Go-to-market approach and positioning T-Systems positions itself as the 360-degree MSSP and the only MSSP that can provide the full balance of IT and network security. It highlights its Deutsche Telekom (DT) heritage and claims to provide a unique combination of IT security and telecoms security as core competencies. It also highlights its end-to-end capabilities and cyber defense offering. In this context the provider builds on four fundamental principles to structure its cyber security development: transparency, simplicity, expertise and co-operation. The carrier s efforts in managed security services have a primary regional focus on the EU, with global expansion driven by its European (primarily German) MNC customers. Strategic security assets partnerships, alliances, and acquisitions T-Systems has a strong set of security vendor partners, including HP, RSA, McAfee, Juniper, Checkpoint, and newer vendors such as FireEye. The carrier recently announced a cyber security partnership with global insurance company Allianz. It is also investing in certain vendors (e.g., CipherCloud) and is cooperating with a number of security start-ups. Like the other MSSPs in this report, T-Systems emphasizes its carrier heritage as part of its experience in security, based on its roles as ISP, global IP backbone provider, and manager of DT's internal infrastructure. Road map The major elements of T-Systems' road map for its managed security services are cybersecurity, expanded DDoS protection, and identity management. With its RSA alliance T-Systems will offer analysis of individual cyber risks for companies, advising them on cybersecurity strategies and architectures and delivering advanced cybersecurity services. Next-generation security operation centers will combine the latest technology with the expertise of cyberdefense specialists fromt-systemsand RSA and other vendors such as FireEye (for advanced malware detection, for example). The carrier has also announced a new relationship with CipherCloud for cloud security, including an encryption solution for enterprise customers using Salesforce.com services. It is working with global insurance company Allianz to develop integrated solutions for damage prevention, network security, and risk management. T- Systems will also continue to hire more security professionals; its managed security services and these new alliances require additional staffing. Clean pipes services are a set of bundled security services (e.g., , web, firewall) for the various segments of the enterprise market, with a strong focus on German enterprise customers. T-Systems will leverage its cloud-based and network services to provide standard bundles with integrated security services to its largest enterprise and SME customers. This is a planned offering that will be based on T- Systems managed security investments. Ovum. Unauthorized reproduction prohibited Page 27

28 Ovum assessment Verizon T-Systems has one of the most IT-centric managed security services portfolios of all the MSSPs in this report. Its legacy as the IT provider born out of the DT family means it has additional IT expertise that has an impact on its position as an MSSP. Although the carrier does have global capabilities, the EU is the primary focus of its managed security services. T-Systems will have strong appeal among EU-based MNC and large enterprise customers. It recently announced new alliances with security vendors, and it continues to invest in new security technology that will give it a strong position as it increases its capabilities and expands in Europe. Mobile security is treated as a separate but integrated service based on T-Systems five product categories. Ovum would expect this to result in growth in T-Systems European managed security business and for an increasing percentage of its large global deals to include managed security services. Figure 11: Verizon s managed security services portfolio overview Source: Verizon Managed security services overview Verizon's managed security services started with a significant staff and geographic boost based on its acquisition of Cybertrust in The carrier has developed its managed security portfolio over several years and recently reorganized it, with a new focus on cybersecurity. Asset and exposure management Vulnerability management, application security and exposure management, data security for mobile, and M2M professional services are all included in this service pillar, which is part of Verizon s professional services. Ovum. Unauthorized reproduction prohibited Page 28

29 Security monitoring and analytics Verizon offers different service models that provide security monitoring and analytics with standard SIEM platforms (RSA and HP ArcSight). Advanced threat intelligence and monitoring is another premium option that provides support beyond standard managed security monitoring services. Managed SIEM is another option for enterprise customers that want Verizon to manage their SIEM on a dedicated basis. The carrier recently announced support for RSA Security Analytics based on RSA's NetWitness platform. Incident response and forensics In this service pillar Verizon uses investigative incident responses and research to provide analysis and response measures for security practices. Security enforcement and protection DDoS, IPS, and firewall are the major elements of Verizon's security enforcement and protection services, with premise-based and cloud-based service varieties. Managed enterprise gateway services and professional services are also included in this service pillar. Identity and access management Universal identity services, managed certificate services, and professional services related to identity management are included in this service pillar. Risk and compliance management Verizon's Security Management Program includes assessments, audits, tactical recommendations, and guidelines. Risk and compliance professional services and PCI certification are additional elements of this service pillar. Professional security consulting services Verizon's global consulting and integration services organization covers services across its managed security portfolio, including mobile security. Security consultants are disbursed globally but predominately located in Europe, North America, and Asia-Pacific. Mobile security Verizon offers mobile security as part of its enterprise mobility program, which is separate from its formal managed security services portfolio. The carrier s enterprise-mobility-as-a-service includes secure remote access, PC security, and updates for corporate devices. Its managed mobility service supports managing, deploying, and supporting global mobile enterprise assets and workforces, including security features. Go-to-market approach and positioning Verizon's efforts in managed security services are a key part of its global go-to-market strategy for its MNC and large enterprise customers. Verizon's annual Data Breach Investigations Report (DBIR) is also one of the key activities that opens doors and creates credibility for the telco s managed security Ovum. Unauthorized reproduction prohibited Page 29

30 services. The DBIR stimulates discussion, and sometimes demand from enterprise customers and also, from a PR perspective, helps Verizon to position itself at the center of the security industry, alongside many international security players. The carrier positions its network and its Cybertrust acquisition as the key anchors of its credibility as a trusted advisor on managed security services. Verizon focuses on the US market, plus major MNCs and large corporate enterprises in Europe, Asia- Pacific, and Latin America. Its security coverage in Latin America has been strengthened by its acquisition of Terremark, which also had managed security services in the region. Strategic security assets partnerships, alliances, and acquisitions Verizon's past acquisitions include Cybertrust, Terremark, and UUNet; incorporating these organizations has created a strong base of security expertise and staff. CyberTrust had global capabilities and a methodology that provided a strong base for security services, and included ICSA Labs, another security asset. Verizon Cyber Intelligence Center (VCIC), established in April 2014, is a new business unit that consolidates and centralizes the telco s cybersecurity resources. VCIC will leverage these assets for internal and external managed security efforts and will include participation with third parties to provide an improved service for its customers. Verizon now also supports advanced persistent threat technologies such as FireEye and Palo Alto WildFire in order to address the needs of the public and private sectors. Road map Verizon will continue to partner with third parties and invest internally to increase its security incident database. It will continue to boost its cybersecurity focus through its newly consolidated group. The carrier plans to invest in analytics to provide correlation of security information for improved identification, response, and remediation across its various managed security services clients and platforms. Verizon has plans for enhancing its network DDoS service with a managed on-premise version to complement its network-based service. There are also plans for a new security portal interface for customers and for further expansion in Asia-Pacific. Ovum assessment APPENDIX Verizon is one of the stronger telco-led MSSPs, with a solid track record based on its telecoms heritage and Cybertrust acquisition. Its global reach is very strong, covering North America, Europe, Asia-Pacific, and Latin America. The carrier s professional services and SOC coverage is one of its strengths. Verizon has also worked extensively and deeply with security industry vendors and third parties since its Cybertrust acquisition, and is engaged with many of the new start-ups that are providing security services and cybersecurity intelligence. Methodology This report is based on interviews with, briefings from, and surveys of the managed services divisions of AT&T, BT, Orange, Telefonica, T-Systems, and Verizon. All the carriers provided responses to Ovum's Ovum. Unauthorized reproduction prohibited Page 30

31 survey on managed security services portfolios, including their recent announcements and future road maps, with some information provided under NDA. The author also drew on other Ovum enterprise research and surveys, and collaborated with Ovum's IT Services and Security teams for review and additional insight and analysis. Further reading Author The Competitive Landscape for DDoS Protection, IT (June 2014) 2014 Trends to Watch: Security, IT (September 2013) Gemalto to facilitate telcos identity management services offerings, IT (June 2014) Mike Sapien, Principal Analyst, Enterprise Ovum Consulting We hope that this analysis will help you make informed and imaginative business decisions. If you have further requirements, Ovum s consulting team may be able to help you. For more information about Ovum s consulting capabilities, please contact us directly at [email protected]. Copyright notice and disclaimer The contents of this product are protected by international copyright laws, database rights and other intellectual property rights. The owner of these rights is Informa Telecoms and Media Limited, our affiliates or other third party licensors. All product and company names and logos contained within or appearing on this product are the trademarks, service marks or trading names of their respective owners, including Informa Telecoms and Media Limited. This product may not be copied, reproduced, distributed or transmitted in any form or by any means without the prior permission of Informa Telecoms and Media Limited. Whilst reasonable efforts have been made to ensure that the information and content of this product was correct as at the date of first publication, neither Informa Telecoms and Media Limited nor any person engaged or employed by Informa Telecoms and Media Limited accepts any liability for any errors, omissions or other inaccuracies. Readers should independently verify any facts and figures as no liability can be accepted in this regard - readers assume full responsibility and risk accordingly for their use of such information and content. Any views and/or opinions expressed in this product by individual authors or contributors are their personal views and/or opinions and do not necessarily reflect the views and/or opinions of Informa Telecoms and Media Limited. Ovum. Unauthorized reproduction prohibited Page 31

With Cloud Defender, Alert Logic combines products to deliver outcome-based security

With Cloud Defender, Alert Logic combines products to deliver outcome-based security With Cloud Defender, Alert Logic combines products to deliver outcome-based security Analyst: Javvad Malik 13 Nov, 2014 Security has typically been a technology-driven area. If a company puts up a website,

More information

2012 North American Managed Security Service Providers Growth Leadership Award

2012 North American Managed Security Service Providers Growth Leadership Award 2011 South African Data Centre Green Excellence Award in Technology Innovation Cybernest 2012 2012 North American Managed Security Service Providers Growth Leadership Award 2011 Frost & Sullivan 1 We Accelerate

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

Ipanema Technologies: A True Synergy Between WAN Optimization and Application Performance Management

Ipanema Technologies: A True Synergy Between WAN Optimization and Application Performance Management Ipanema Technologies: A True Synergy Between WAN Optimization and Application Performance Management Introduction When WAN optimization technologies were first introduced to the market, solution providers

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

Italy. EY s Global Information Security Survey 2013

Italy. EY s Global Information Security Survey 2013 Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information

More information

Q1 Labs Corporate Overview

Q1 Labs Corporate Overview Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,

More information

Security. Security consulting and Integration: Definition and Deliverables. Introduction

Security. Security consulting and Integration: Definition and Deliverables. Introduction Security Security Introduction Businesses today need to defend themselves against an evolving set of threats, from malicious software to other vulnerabilities introduced by newly converged voice and data

More information

Requirements When Considering a Next- Generation Firewall

Requirements When Considering a Next- Generation Firewall White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration

More information

1 of 8 3/18/2013 4:59 PM

1 of 8 3/18/2013 4:59 PM 1 of 8 3/18/2013 4:59 PM Advanced Latest Update: August 05, 2010 By Khalid Kark with Stephanie Balaouras, Nick Hayes 1950 downloads 1 comments Rating: quick scan full report resources WHY READ THIS REPORT

More information

W H I T E P A P E R A T r u s t e d S e c u r i t y P a r t n e r : A M u s t - H a v e i n T o d a y ' s T h r e a t L a n d s c a p e

W H I T E P A P E R A T r u s t e d S e c u r i t y P a r t n e r : A M u s t - H a v e i n T o d a y ' s T h r e a t L a n d s c a p e Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R A T r u s t e d S e c u r i t y P a r t n e r : A M u s t - H a v e i n T o d

More information

BEST PRACTICES RESEARCH

BEST PRACTICES RESEARCH 2013 Frost & Sullivan 1 We Accelerate Growth Market Leadership Award Vulnerability Management Global, 2013 Frost & Sullivan s Global Research Platform Frost & Sullivan is in its 50th year of business with

More information

INSERT COMPANY LOGO HERE

INSERT COMPANY LOGO HERE 20132014 INSERT COMPANY LOGO HERE 2014 Global 2013 North Distributed American Denial-of-Service SSL Certificate Mitigation Product Market Leadership Leadership Award Award Frost & Sullivan 2014 1 We Accelerate

More information

Braindumps.700-295.50.QA

Braindumps.700-295.50.QA Braindumps.700-295.50.QA Number: 700-295 Passing Score: 800 Time Limit: 120 min File Version: 6.0 http://www.gratisexam.com/ Comprehensive, easy and to the point study material made it possible for me

More information

What is Security Intelligence?

What is Security Intelligence? 2 What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the

More information

Injazat s Managed Services Portfolio

Injazat s Managed Services Portfolio Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.

More information

Phone: +44 20 8123 2220 Fax: +44 207 900 3970 [email protected] https://marketpublishers.com

Phone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and Security

More information

Cisco RSA Announcement Update

Cisco RSA Announcement Update Cisco RSA Announcement Update May 7, 2009 Presented by: WWT and Cisco Agenda Cisco RSA Conference Announcements Collaborate with Confidence Overview Cisco s Security Technology Differentiation Review of

More information

2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY

2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY 2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY 1 EXECUTIVE SUMMARY INTRODUCING THE 2015 GLOBAL THREAT INTELLIGENCE REPORT Over the last several years, there has been significant security industry

More information

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion

More information

Securing Virtual Applications and Servers

Securing Virtual Applications and Servers White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating

More information

SWOT Assessment: FireMon Security Manager Suite v7.0

SWOT Assessment: FireMon Security Manager Suite v7.0 SWOT Assessment: FireMon Security Manager Suite v7.0 Analyzing the strengths, weaknesses, opportunities, and threats Reference Code: IT017-004174 Publication Date: 12 Aug 2013 Author: Andrew Kellett SUMMARY

More information

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape WHITE PAPER: SYMANTEC GLOBAL INTELLIGENCE NETWORK 2.0.... ARCHITECTURE.................................... Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Who

More information

The Benefits of an Integrated Approach to Security in the Cloud

The Benefits of an Integrated Approach to Security in the Cloud The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The

More information

How to Define SIEM Strategy, Management and Success in the Enterprise

How to Define SIEM Strategy, Management and Success in the Enterprise How to Define SIEM Strategy, Management and Success in the Enterprise Security information and event management (SIEM) projects continue to challenge enterprises. The editors at SearchSecurity.com have

More information

McAfee Security Architectures for the Public Sector

McAfee Security Architectures for the Public Sector White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

Virtustream acquires ViewTrust to build out its risk management capabilities

Virtustream acquires ViewTrust to build out its risk management capabilities Virtustream acquires ViewTrust to build out its risk management capabilities Analyst: Agatha Poon 12 Feb, 2014 Enterprise cloud provider Virtustream has acquired security and compliance specialist ViewTrust

More information

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average

More information

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security

More information

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber

More information

Managed service provider Bell Techlogix shines its BEAM to differentiate

Managed service provider Bell Techlogix shines its BEAM to differentiate Analyst: Katy Ring 1 Nov, 2013 Managed service provider Bell Techlogix shines its BEAM to differentiate Bell Techlogix is a midsized US managed service provider (MSP) that is ahead of the curve in getting

More information

IDC MarketScape: Worldwide Telecom Service Provider 2013 Vendor Assessment

IDC MarketScape: Worldwide Telecom Service Provider 2013 Vendor Assessment IDC MARKETSCAPE IDC MarketScape: Worldwide Telecom Service Provider 2013 Vendor Assessment Courtney Munroe Melanie Posey THIS IDC MARKETSCAPE EXCERPT FEATURES: BT GLOBAL SERVICES IDC MARKETSCAPE FIGURE

More information

Managed Security Services for Data

Managed Security Services for Data A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified

More information

Operations Excellence in Professional Services Firms

Operations Excellence in Professional Services Firms Operations Excellence in Professional Services Firms Published by KENNEDY KENNEDY Consulting Research Consulting Research & Advisory & Advisory Sponsored by Table of Contents Introduction... 3 Market Challenges

More information

Tata Communications Security Outsourcing. A Must-have for Entry into the Global Economy. www.tatacommunications.com. www.tatacommunications.

Tata Communications Security Outsourcing. A Must-have for Entry into the Global Economy. www.tatacommunications.com. www.tatacommunications. Tata Communications Security Outsourcing A Must-have for Entry into the Global Economy www.tatacommunications.com www.tatacommunications.com 2 Tata Communications Security Outsourcing A Must-have for Entry

More information

Symantec Consulting Services

Symantec Consulting Services GET MORE FROM YOUR SECURITY SOLUTIONS Symantec Consulting 2015 Symantec Corporation. All rights reserved. Access outstanding talent and expertise with Symantec Consulting Symantec s Security Consultants

More information

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader IGG-04092003-04 M. Nicolett Article 9 April 2003 CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader Vendors in the Gartner IT Security Management Magic Quadrant for 1H03 are driven

More information

The Evolution of Application Monitoring

The Evolution of Application Monitoring The Evolution of Application Monitoring Narayan Makaram, CISSP, Director, Solutions Marketing, HP Enterprise Security Business Unit, May 18 th, 2012 Rise of the cyber threat Enterprises and Governments

More information

Der Weg, wie die Verantwortung getragen werden kann!

Der Weg, wie die Verantwortung getragen werden kann! Managed Security Services Der Weg, wie die Verantwortung getragen werden kann! Christoph Altherr System Engineer Security 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Agenda Enterprise

More information

How To Buy Nitro Security

How To Buy Nitro Security McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security

More information

Managed Security Services

Managed Security Services NEAT EVALUATION FOR UNISYS: Managed Security Services Market Segment: Overall This document presents Unisys with the NelsonHall NEAT vendor evaluation for Managed Security Services (MSS) for the Overall

More information

Proven LANDesk Solutions

Proven LANDesk Solutions LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations

More information

Advantages of Managed Security Services

Advantages of Managed Security Services Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network

More information

Unified Threat Management, Managed Security, and the Cloud Services Model

Unified Threat Management, Managed Security, and the Cloud Services Model Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical

More information

Cyber Security Market by Solution - Global Forecast to 2020

Cyber Security Market by Solution - Global Forecast to 2020 Brochure More information from http://www.researchandmarkets.com/reports/3287011/ Cyber Security Market by Solution - Global Forecast to 2020 Description: 'Cyber Security Market by Solution (IAM, Encryption,

More information

How To Protect Your Network From Attack From A Network Security Threat

How To Protect Your Network From Attack From A Network Security Threat Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your

More information

Managed Services. Business Intelligence Solutions

Managed Services. Business Intelligence Solutions Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services

More information

Security Services. 30 years of experience in IT business

Security Services. 30 years of experience in IT business Security Services 30 years of experience in IT business Table of Contents 1 Security Audit services!...!3 1.1 Audit of processes!...!3 1.1.1 Information security audit...3 1.1.2 Internal audit support...3

More information

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat

More information

Nokia Siemens Networks Network management to service management - A paradigm shift for Communications Service Providers

Nokia Siemens Networks Network management to service management - A paradigm shift for Communications Service Providers White paper Nokia Siemens Networks Network management to service management - A paradigm shift for Communications Service Providers Service management solutions enable service providers to manage service

More information

How To Manage Security On A Networked Computer System

How To Manage Security On A Networked Computer System Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

2016 Firewall Management Trends Report

2016 Firewall Management Trends Report 2016 Firewall Management Trends Report A survey of trends in firewall use and satisfaction with firewall management JANUARY 2016 Copyright 2016 Skybox Security, Inc. All rights reserved. Skybox is a trademark

More information

Managed Security Service Providers vs. SIEM Product Solutions

Managed Security Service Providers vs. SIEM Product Solutions White Paper The Business Case for Managed Security Services Managed Security Service Providers vs. SIEM Product Solutions www.solutionary.com (866) 333-2133 The Business Case for Managed Security Services

More information

Changing the Enterprise Security Landscape

Changing the Enterprise Security Landscape Changing the Enterprise Security Landscape Petr Hněvkovský Presales Consultant, ArcSight EMEA HP Enterprise Security Products 2012 Hewlett-Packard Development Company, L.P. The information contained herein

More information

Deploying Firewalls Throughout Your Organization

Deploying Firewalls Throughout Your Organization Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense

More information

Cisco Remote Management Services for Financial Services

Cisco Remote Management Services for Financial Services Cisco Remote Management Services for Financial Services The global financial services industry continues to evolve to adjust to a shifting market landscape and increased customer expectations. With demand

More information

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION Table of Contents Executive Summary...3 Vulnerability Scanners Alone Are Not Enough...3 Real-Time Change Configuration Notification is the

More information

Combating a new generation of cybercriminal with in-depth security monitoring

Combating a new generation of cybercriminal with in-depth security monitoring Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.

More information

MANAGED SECURITY SERVICES (MSS)

MANAGED SECURITY SERVICES (MSS) MANAGED SECURITY SERVICES (MSS) The Cyber Security Initiative. Cybercrime is becoming an important factor for CIOs and IT professionals, but also for CFOs, compliance officers and business owners. The

More information

REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION

REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION The modern data centre has ever-increasing demands for throughput and performance, and the security infrastructure required to protect and segment the network

More information

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation

More information

BT Assure Rethink the Risk

BT Assure Rethink the Risk BT Assure Rethink the Risk Analyst and Consultant Update May 2012 BT Assure. Security that matters Today's agenda Introductions Neil Sutton Vice President, Global Portfolio 3 Minutes BT Assure Overview

More information

Cybersecurity in the States 2012: Priorities, Issues and Trends

Cybersecurity in the States 2012: Priorities, Issues and Trends Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State

More information

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security 1 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

More information

The 2H05 Magic Quadrant for managed

The 2H05 Magic Quadrant for managed Magic Quadrant for MSSPs, North America, 2H05 Gartner RAS Core Research Note G00137165, Kelly M. Kavanagh, John Pescatore, 30 December 2005, R1601 01052007. The 2H05 Magic Quadrant for managed security

More information

Tufin Orchestration Suite

Tufin Orchestration Suite Tufin Orchestration Suite Security Policy Orchestration across Physical Networks & Hybrid Cloud Environments The Network Security Challenge In today s world, enterprises face considerably more network

More information

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS

Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS Traditionally, IT risk management has balanced security investment and the impact of the threat, allowing each business

More information

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4

More information

Unified Security, ATP and more

Unified Security, ATP and more SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users

More information

IBM Security QRadar Vulnerability Manager

IBM Security QRadar Vulnerability Manager IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk

More information

How To Bring In Palo Alonnetworks

How To Bring In Palo Alonnetworks Viewing Palo Alto Networks as a Strategic Network Security Platform IANS WORKING KNOWLEDGE SERIES CASE STUDY 2010 About Capital Region Health Care (CRHC) and Concord Hospital CRHC includes Concord Hospital,

More information

IDC ITMarketScape: Worldwide Telecom Service Provider 2015 Vendor Assessment

IDC ITMarketScape: Worldwide Telecom Service Provider 2015 Vendor Assessment Capabilities Excerpt IDC ITMarketScape: Worldwide Telecom Service Provider 2015 Vendor Assessment Courtney Munroe THIS MARKETSCAPE EXCERPT FEATURES: NTT COMMUNICATIONS IDC ITMARKETSCAPE FIGURE FIGURE 1

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other

More information

NASCIO 2015 State IT Recognition Awards

NASCIO 2015 State IT Recognition Awards NASCIO 2015 State IT Recognition Awards Title: State of Georgia Private Security Cloud Implementation Category: Cybersecurity Contact: Mr. Calvin Rhodes CIO, State of Georgia Executive Director, GTA [email protected]

More information

HP Fortify Software Security Center

HP Fortify Software Security Center HP Fortify Software Security Center Proactively Eliminate Risk in Software Trust Your Software 92% of exploitable vulnerabilities are in software National Institute for Standards and Technology (NIST)

More information

Selecting a Managed Security Services Provider: The 10 most important criteria to consider

Selecting a Managed Security Services Provider: The 10 most important criteria to consider IBM Global Technology Services Thought Leadership White Paper May 2011 Selecting a Managed Security Services Provider: The 10 most important criteria to consider 2 Selecting a Managed Security Services

More information

Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments

Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments What You Will Learn In many enterprises, physical security departments are making a notable

More information

Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst

Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: What do large enterprises need in order to address increasingly

More information

CHAPTER 3 : INCIDENT RESPONSE THREAT INTELLIGENCE GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

CHAPTER 3 : INCIDENT RESPONSE THREAT INTELLIGENCE GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC : INCIDENT RESPONSE THREAT INTELLIGENCE 1 THREAT INTELLIGENCE How it applies to our clients, and discuss some of the key components and benefits of a comprehensive threat intelligence strategy. Threat

More information

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking

More information

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments. Security solutions White paper Acquire a global view of your organization s security state: the importance of security assessments. April 2007 2 Contents 2 Overview 3 Why conduct security assessments?

More information