Cybersecurity in an All-IP World Are You Prepared?

Similar documents
Managed Enterprise Internet and Security Services

A HELPING HAND TO PROTECT YOUR REPUTATION

MANAGED SERVICES PROVIDER. Dynamic Solutions. Superior Results.

Logging In: Auditing Cybersecurity in an Unsecure World

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

The STAGEnet Security Model

Internet of Everything. Cisco product managers Vytautas Zulonas Tomas Kirvelaitis

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Endpoint web control overview guide. Sophos Web Appliance Sophos Enterprise Console Sophos Endpoint Security and Control

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Internet of Everything. Cisco product managers Vytautas Zulonas Tomas Kirvelaitis

Security in an All-IP World:

Reaping the Full Benefits of a Hybrid Network

The Attacker s Target: The Small Business

Injazat s Managed Services Portfolio

Ram Dantu. VOIP: Are We Secured?

McAfee Security Architectures for the Public Sector

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

City of Columbia, MO Information Technologies

Cyberoam Perspective BFSI Security Guidelines. Overview

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

FDA STAFF MANUAL GUIDES, VOLUME I - ORGANIZATIONS AND FUNCTIONS FOOD AND DRUG ADMINISTRATION OFFICE OF OPERATIONS

OIT User Conference Security Team November 2014

Top 5 Security Trends and Strategies for 2011/2012 Peter Sandkuijl Europe SE manager network security psandkuijl@checkpoint.com

Check Point 3D Security

Security challenges in Southern Europe. Thanassis Papadopoulos Country Manager

PRESIDIO MANAGED SERVICES OVERVIEW JULY 2013

Cisco ASA 5500 Series IPS Solution

Organizational Issues of Implementing Intrusion Detection Systems (IDS) Shayne Pitcock, CISSP First Data Corporation

Sophos Certified Architect Course overview

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

NASCIO 2015 State IT Recognition Awards

Ingate Firewall/SIParator SIP Security for the Enterprise

Today's security needs in networking

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Simplify Your Network Security with All-In-One Unified Threat Management

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s

security changes with Orange focus on your business, we focus on your security

Discounted Pricing MANAGED SECURITY SERVICES

HOW WE DELIVER A SECURE & ROBUST HOSTED TELEPHONY SOLUTION

Compliance and Unified Communication

Data Centre. Business Intelligence. Enterprise Computing Solutions United Kingdom. Security Solutions. arrow.com

Top tips for improved network security

933 COMPUTER NETWORK/SERVER SECURITY POLICY

Contact Center on Demand

Customer Service Description Next Generation Network Firewall

Configuring IPsec VPN with a FortiGate and a Cisco ASA

Preparing VoIP and Unified Communications Systems for IPv6 Technical Summary September 2014

Managed Services The. The Road to Revenue. Pravin Mahajan Session Number Presentation_ID

Move over, TMG! Replacing TMG with Sophos UTM

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Cisco Unified MobilityManager Version 1.2

A Channel Company White Paper. Online Security. Beyond Malware and Antivirus. Brought to You By:

Implementing Cisco Intrusion Prevention System 7.0 (IPS)

Zoo Atlanta installs an IBM Proventia Network Multi-Function Security system to guard against Internet threats and spam.

BlackBerry Mobile Voice System

Cisco & Big Data Security

How To Manage Your Information Systems At Aerosoft.Com

WHITE PAPER: INFORMATION-CENTRIC SECURITY

1Fortinet. 2How Logtrust. Firewall technologies from Fortinet offer integrated, As your business grows and volumes of data increase,

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Information Technology General Controls And Best Practices

Network Enabled Cloud

PRESIDIO MANAGED SERVICES OVERVIEW

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

Verve Security Center

The Value of Automated Penetration Testing White Paper

Glasnost or Tyranny? You Can Have Secure and Open Networks!

Streamlining Web and Security

Com.X IP PBX The complete communications solution in a box

What are cloud services?

Client Security Risk Assessment Questionnaire

WatchGuard: Your Security Partner of Choice. Carlos Vieira

Introduction of Intrusion Detection Systems

SIEM is only as good as the data it consumes

Hackers are here. Where are you?

Cybersecurity Enhancement Account. FY 2017 President s Budget

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

SECURITY PLATFORM FOR HEALTHCARE PROVIDERS

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe

IT is complicated. There are so many moving pieces and parts, and your business is dependent on all

U06 IT Infrastructure Policy

Managed Services. Business Intelligence Solutions

Security Event Monitoring (SEM) Working Group

Enterprise Cybersecurity: Building an Effective Defense

United States Trustee Program s Wireless LAN Security Checklist

Current IBAT Endorsed Services

What does it mean to be secure?

PCI Requirements Coverage Summary Table

Securing the Small Business Network. Keeping up with the changing threat landscape

Complex solutions aren t solutions. We make security for the real world for the pragmatic enterprise. Simple security is better security.

End-user Security Analytics Strengthens Protection with ArcSight

Cisco ISR Web Security with Cisco ScanSafe

Transcription:

Cybersecurity in an All-IP World Are You Prepared? Executive Summary Get started Produced by: In partnership with:

Introduction: The distinctions between today s data, voice, wireless and video networks will blur as government agencies move to an all-ip infrastructure. And as IP applications replace separate networks, the focus on cybersecurity becomes even greater. Delivering citizen services securely while also protecting data continues to be a priority for government. In a recent survey conducted by Public CIO, over 125 respondents shared how they protect their environments from cyber threats and the challenges they see in an all-ip world. Keep reading to learn more about how your cybersecurity strategies and attitudes compare with your peers. Respondents: This survey was completed by a random sampling of Public CIO s subscriber base including IT management and administrators. Respondents were solicited via email invitations directing them to the online questionnaire. All aspects of this survey, including questionnaire review, promotional outreach, response capture and report preparation, have been completed by Public CIO.

Respondents host and manage the following on their networks: 88% 4% Applications Other 83% 56% Outbound Internet Access VoIP 82% 58% Email Voice 82% Web Applications 79% Remote VPN Access 79% File Share

Fifty-two percent of respondents host or plan to host applications in the cloud. Other features hosted in the cloud include: 47% 41% 27% 27% 20% Web Applications Email File Share Other Outbound Internet Access 16% 13% Remote VPN Access Voice

96% Firewall A firewall is the most common type of security technology deployed by respondents. Other security technologies include: 101010101111010010 0110010100000101 010101010011101001 01001011110000101 00010101010001110 00110001110101001 010010100101001 00110001110101001 89% 85% 79% 75% 73% 72% Email Filtering Web Filtering Endpoint Security Encryption Application Firewall Intrusion Detection/ Intrusion Protection 63% 60% 29% 3% Data Loss Protection Mobile Event Device Correlation Management Other

When asked to describe their use of log data from deployed security devices, respondents answered 7% Collect discreetly from each device that they: 10% Consolidate and use for reporting 29% Have no strategy for log use 12% Consolidate and maintain for later analysis 20% Collect from each device and maintain for later analysis 22% Consolidate, correlate and use for real-time alerting

Forty-six percent of respondents have a Security Operations Center. 100 80 56% 60 of those with an SOC staff it 24/7/365. 40 20 0

Respondents spend the following percent on security in relation to 100 overall IT budgets: 60 40 % of Respondents 80 20 26 % of respondents 22 % of respondents 26 % of respondents 26 % of respondents 0 1-3% 3-5% More than 5% Not Applicable % of Overall IT Budget

Respondents employ the following numbers of 21-50 4% More than 50 4% cybersecurity experts at their agencies: 6-20 19% 1-5 46% Not Applicable 27%

When it comes to hiring and retaining cybersecurity personnel, respondents are: 44% Not Challenged 28% Somewhat Challenged 28% Very Challenged

Forty percent of respondents feel prepared and vigilant regarding their agency s cybersecurity strategies. 100 80 60 Zzz 40 20 40% Feel prepared and vigilant 31% Sleep peacefully at night 20% Know it s a matter of when not if 9% 0 Are concerned about making the headlines

2014 e.republic. All rights reserved. For more information, visit www.att.com/govsecurity.