Westcon Presentation on Security Innovation, Opportunity, and Compromise



Similar documents
Big Data, Big Risk, Big Rewards. Hussein Syed

IDC FutureScape: Worldwide Big Data & Analytics 2016 Predictions. IDC Web Conference November 2015

TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures

Top Five Security Must-Haves for Office 365. Frank Cabri, Vice President, Marketing Shan Zhou, Senior Director, Security Engineering

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University

Cyber Security. John Leek Chief Strategist

Security and Privacy

Rashmi Knowles Chief Security Architect EMEA

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

The Cloud App Visibility Blindspot

Google Identity Services for work

Alexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity

CYBER SECURITY INFORMATION SHARING & COLLABORATION

Jort Kollerie SonicWALL

State of Security Monitoring of Public Cloud

Analytics: The Future of Security

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective

Data Security on the Move. Mark Bloemsma, Sr. Sales Engineer Websense

BeyondInsight Version 5.6 New and Updated Features

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

The Evolution of the Enterprise And Enterprise Security

IBM Security Strategy

Italy. EY s Global Information Security Survey 2013

The Benefits of an Integrated Approach to Security in the Cloud

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

Marble & MobileIron Mobile App Risk Mitigation

Teradata and Protegrity High-Value Protection for High-Value Data

Enterprise Mobility: A Market Perspective!!

The Case For A Cloud Access Security Broker

E l i m i n a t i n g Au t hentication Silos and Passw or d F a t i g u e w i t h Federated Identity a n d Ac c e s s

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?

The Canadian Realities of Big Data and Business Analytics. Utsav Arora February 12, 2014

A COMPLETE APPROACH TO SECURITY

The ForeScout Difference

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

Software that provides secure access to technology, everywhere.

Worldwide Security and Vulnerability Management Forecast and 2013 Vendor Shares

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Cisco Advanced Malware Protection

IDC Predictions 2015 Digital Transformation in the Enterprise: Opportunity and Disruption. Steven Frantzen Senior Vice President, EMEA Region

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products

How To Protect Your Mobile Device From Attack

Media Shuttle s Defense-in- Depth Security Strategy

Enabling Manufacturing Transformation in a Connected World. John Shewchuk Technical Fellow DX

ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

The Oracle Mobile Security Suite: Secure Adoption of BYOD

The Internet of Things (IoT) Opportunities and Risks

PCI Compliance for Cloud Applications

RSA Identity and Access Management 2014

Strengthen security with intelligent identity and access management

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Security Risk Management Strategy in a Mobile and Consumerised World

POLICIES TO MITIGATE CYBER RISK

Security & privacy in the cloud; an easy road?

Securing the Internet of Things OEM capabilities assure trust, integrity, accountability, and privacy.

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Bring Your Own Device Mobile Security

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

SECURING SENSITIVE DATA WITHIN AMAZON WEB SERVICES EC2 AND EBS

#ITtrends #ITTRENDS SYMANTEC VISION

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

OVERVIEW. Enterprise Security Solutions

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

How To Buy Nitro Security

Research Agenda for IDC Government Insights, 2015 Subject to Change

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Security Challenges of Cloud Providers ( Wie baue ich sichere Luftschlösser in den Wolken )

Security Issues in Cloud Computing

Securing Smart City Platforms IoT, M2M, Cloud and Big Data

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

Asia Policy Partners LLC 2015

KASPERSKY FRAUD PREVENTION PLATFORM COVERING ONLINE AND MOBILE BANKING RISKS

Computer Forensics and Incident Response in the Cloud. Stephen Coty AlertLogic, AlertLogic_ACID

Transcription:

Westcon Presentation on Security Innovation, Opportunity, and Compromise Christian A. Christiansen Program Vice President IDC Security Products & Services

What s Happening with Threats? 1.5B 80% 33% $1.3M 2

Security Evolution Unites All Platforms 3rd Platform focus on User Experience (UX) vs. cost vs. shared risk across multiple platforms 2nd Platform focused on risk and cost across PCs and servers 1st Platform focused on risk-based access on centralized servers and terminals Source: IDC 3

Securing Four Pillars to Enable Innovation without Disruption Cloud Mobile Social Networks Big Data (Threat Intelligence) Early detection & mitigation of targeted, unknown attacks. Granular logging and policy enforcement of internal and external regulations. Predictive Privileged Access Management, Federated Identity, Multi-factor Authentication, Data Protection, & Vulnerability Assessment Strong Authentication, Data Protection, Web/Messaging SaaS, & SSO Data Loss prevention with data protection, global regulatory policy monitoring, & real-time policy enforcement & education Raw & analyzed threat feeds from multiple sources integrated with management consoles Proactive VPN, Single Sign- On, Encryption, & Strong Passwords Mobile Device Management Keyword-based monitoring & logging Network monitoring and SIEM Reactive Access control Device Password Acceptable Use Policy Signature-based detection 4

5

Future of Security Driven by Massive Change? Installed Base (M) 300 Worldwide Internet of Things Installed Base, 250 2012 2020 (Billions) 200 150 100 Internet of Things connected Internet of Things 50 0 2012 2013 2014 2015 2016 2017 2018 2019 2020 120 100 80 60 40 20 0 Worldwide Wearable Shipments (Millions) 2013 2014 2018 Complex Accessories Smart Accessories Smart Wearables Worldwide Smartphone Installed Base (Millions) 5000 4000 3000 2000 1000 0 2013 2014 2015 2016 2017 2018 Other Windows Phone ios BlackBerry Android 6

Worldwide Identity & Access Management Driven by Cloud and Mobile User Experience Source: IDC, Worldwide Identity and Access Management Forecast, 2015 2019, #259561

Worldwide Security as a Service Growing Rapidly & Overshadowing On-Premise Source: IDC, Worldwide Cloud Hosted Enterprise Security Services (Security as a Service) Forecast, 2015 2019, #257959

Worldwide DDoS Prevention Products and Services Opportunity Source: IDC, Worldwide DDoS Prevention Products and Services Forecast, 2015 2019, #259157

3 rd Platform Dynamics: Security is Always an Elastic Compromise User Experience (UX) Risk Cost 10

Cloud Security Gets Massive as Nested Clouds Spawn New Attack Surfaces 3 rd Platform Dynamics: Cost Savings Outweighing Risk Cost Risk Cloud UX Issues & Innovations Issues Low costs override risk, except for mission-critical SaaS & IaaS applications driven by time-to-market Shadow IT creates compliance risks & opportunities Innovations SaaS-based Web Security Gateways managed customers proliferating SaaS applications (e.g., Adallom, Elastica, BitGlass, CipherCloud, Netskope, SkyHigh) Cloud Service Providers (e.g., AWS and Microsoft Azure) selling security applications that minimize implementation 11

Mobile Security: Not Just Devices, but also Cloud, Social, and Analytics 3 rd Platform Dynamics: User Experience (UX) Trumps Cost, but Risk is a Sharply Rising Concern Cost Risk Cloud UX Issues & Innovations Issues More than MDM Web applications privacy Malware & payment fraud IoT Attack surface Social policy violation Innovations Analytics-driven protection SaaS-based Web security gateways Policy managed Sync&Share Quickly growing enterprise applications support 12

Analytics for Assessing Threat Intelligence and Securing Big Data 3 rd Platform Dynamics: Risk of Customer Data Exposure Is Balanced Against Cost Cost Risk Analytics UX Issues & Innovations Issues Social networks major source of reconnaissance for phishing No separation between personal and corporate social SEC & FTC taking action against disclosures Innovations Independent data collection and analysis Protection of Big Data Assets with Encryption, Tokenization, Access Rights, and Monitoring) 13

A single department or a business unit ORGANIZATIONAL IMPACT Multiple departments or business units Companywide IDC FutureScape: Where Will Customers Spend? Drivers for 2016 Security Spending 4 Data Breach Impact Corporate Responsibility 10 Supply Chain Risks 2 1. Biometric Authentication 2. Supply Chain Risks 3. Application Security 4. Specialized Threat Detection 7 9 Security Analytics SaaS Security Adoption as a Service EU Data Protection Regulations 6 Tracers & Tethers 8 Self-defending Applications 3 5. Insuring Against Risk 6. Security Analytics Services 7. Data Protection 8. Modern Security Architecture Biometric Authenticated Transactions 5 9. SaaS Security Services 10. Accountability Practices 1 Cyber Insurance Maturity Source: IDC FutureScape: Worldwide IT Security Products and Security Services 2015 Predictions Moving Toward Security Integration, #253026 0-12 12-24 24+ TIME (MONTHS) TO MAINSTREAM

Essential Guidance for Customers Anticipate that threats include increasing security & privacy regulations Investigate Cloud Security Gateways to Manage and Improve SaaS with SaaS Prepare for threat ecosystems that are more sophisticated, professional, well-funded, and collaborative than enterprises and governments 15

Conclusion : Hot Customer Topics that Drive Security Purchases Talent Quest: High Demand for Next Generation Business/IT Skills & Scarce Supply Drive Services Cloud, Mobile, & SaaS: Digital Identity Driven By Improving User Experience to Bring Shadow IT Back Into Compliance Service Shift: Managed Security Services Driven By Old Mismanaged Infrastructure & Increasing Failure to Handle More Frequent Attacks, Don t Trust the Trusted: Internal Security Driven Behavioral Analysis of Trusted Insiders IDC Visit us at IDC.com and follow us on Twitter: @IDC 16

Christian Christiansen IDC Program Vice President 508-935-4148, 617-416-6308 cchristiansen@idc.com @cchristiansen 17