The Value of Managed Security Services > White Paper

Similar documents
The Value of Managed Application Services > White Paper

Secure Web Gateways Buyer s Guide >

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

How To Protect Your Network From Attack From A Network Security Threat

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

Blue Coat WebFilter >

Application Visibility and Monitoring >

Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security > White Paper

Threat Containment for Facebook

Comprehensive real-time protection against Advanced Threats and data theft

Advantages of Managed Security Services

Network Management Services: A Cost-Effective Approach to Complexity

Introducing IBM s Advanced Threat Protection Platform

INTRODUCING isheriff CLOUD SECURITY

E-Guide. Sponsored By:

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Is Your Network Ready for VoIP? > White Paper

Voice, Video and Data Convergence > A best-practice approach for transitioning your network infrastructure. White Paper

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

Uncover security risks on your enterprise network

Intelligent, Scalable Web Security

ENABLING FAST RESPONSES THREAT MONITORING

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Cisco Cloud Web Security

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Content Security: Protect Your Network with Five Must-Haves

MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST

WEBSENSE TRITON SOLUTIONS

Symantec Protection Suite Add-On for Hosted and Web Security

Check Point submitted the SWG Secure Web Gateway for

WAN Optimization for Microsoft SharePoint BPOS >

How To Secure Your Store Data With Fortinet

Change is Good. By K. Yates. Figure 1: Why converged communications matters. IT/Telecom used to generate Enterprise top line growth

Simply Sophisticated. Information Security and Compliance

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

Data Center security trends

Application Performance Management

Improving Business Service Uptime. Proactive network performance management solutions ensure optimal business service for the Dynamic Enterprise

Managing Web Security in an Increasingly Challenging Threat Landscape

Cisco Security Optimization Service

INFORMATION PROTECTED

WHITE PAPER. The Linksys Connected Office portfolio includes:

Achieve Deeper Network Security and Application Control

Advantages of Managed Security Services

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Vulnerability Management

VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK

THE CXO S GUIDE TO MANAGING EXPANSION... WHILE CONTROLLING COSTS & COMPLIANCE CONSIDERATIONS

Types of cyber-attacks. And how to prevent them

Check Point 3D Security

Top 10 Reasons Enterprises are Moving Security to the Cloud

TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS

Symantec Messaging Gateway powered by Brightmail

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.

Balancing Social Networking with Network Security Objectives >

Converged Private Networks. Supporting voice and business-critical applications across multiple sites

White Paper FASTFILE / Page 1

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

Putting Web Threat Protection and Content Filtering in the Cloud

TRITON APX. Websense TRITON APX

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

Focus on your business, not your infrastructure. A buyer s guide to managed infrastructure services.

Lab Testing Summary Report

IBM Security X-Force Threat Intelligence

Cisco Remote Management Services for Financial Services

CA Enterprise Mobility Management MSO

Addressing Big Data Security Challenges: The Right Tools for Smart Protection

NASCIO 2015 State IT Recognition Awards

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

IBM Security Intelligence Strategy

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

Security. Security consulting and Integration: Definition and Deliverables. Introduction

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

Advantages of Managed Security Services. Cloud services via MPLS networks for high security at low cost

Securing business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security

WHITE PAPER OCTOBER Unified Monitoring. A Business Perspective

Naujos kartos ugniasienės Next Generation Firewalls (NGFW) Mindaugas Kubilius, Fortinet sprendimų inžinierius

WEBSENSE SECURITY SOLUTIONS OVERVIEW

+ web + DLP. Secure 1, 2, or all 3 with one powerful solution. The best security you can get for one or for all.

Transcription:

> White Paper

Executive Summary In today s networked world, being able to connect the right resources to the right opportunities or problems at the right time can give businesses the edge and agility they need to innovate, enter markets, seize share, and grow revenue. But as the business expands across the wide area network (WAN) to meet the needs of today s global economy, it can introduce risks to the organization that must be mitigated. The demands placed on the network are increasing from all directions it s being challenged to support ever-evolving LAN and WAN landscapes (e.g. the infrastructure is undergoing architectural changes due to consolidation and convergence); it s being extended outwards to support an increasingly distributed workforce; and it s being stretched in terms of the bandwidth and capacity required to support all the new media-rich, collaborative (video) applications. Taking into account the growing complexity of the enterprise networks, the ever-changing application landscape and the rapidly evolving WAN environment, it s easy to see why many enterprise IT departments struggle to keep their networks secure. The threat vectors are increasing in size and complexity at the same time the threats, themselves, are increasing in number and sophistication. All of this means an organization needs to be more vigilant than ever in their attempts to secure their network and maintain a consistent security stance throughout their operations. It s why, according to IDC, securing the network is the top concern of WAN Managers. 1 The problem is most organizations are focused on lights on activities; just trying to keep their networks up and running takes up most of the IT department s resources. Many enterprises find themselves lacking the technology and skilled security professionals they need to truly manage and maintain an effective security stance. It s extremely time-intensive to train staff and ensure they remain up-to-date on all the types of threats facing their organization. As a result, enterprises often struggle to understand the security policies they need, analyze all the traffic on their network to differentiate between benign activity and likely attacks, and quickly respond to reduce the risks facing the organization. 1 U.S. WAN Managers Survey, IDC, 2007. 1 < >

Sometimes enterprises are unable to make the capital investments they need to ensure they have the comprehensive coverage required by today s dynamic threat landscape. Or, sometimes they simply want or need to focus their attention elsewhere; security is often not a core competency for the organization and, with the finite resources of an IT department, decisions may need to be made about how best to utilize the assets and expertise at hand. All of these reasons contribute to why many enterprises are turning to managed service providers to help them with their network security needs. Leveraging the staff, resources and expertise of a managed service provider can help organizations ensure they achieve the security stance they need, while reducing costs, relieving the management burden, and ensuring accountability and quick resolution of any issues. The following table shows just what WAN managers feel are the benefits of using a managed service provider: Perceived Benefits of Managed Services Percentage of respondents ranking each factor #1, #2, or #3 Refocus resources on core business Reduce network operations costs Lack of internal skills/resources Improve network/application availability and performance Technology/application upgrades/deployments Single point of contact/accountability Source: IDC U.S. WAN Managers Survey, 2007 0 10 20 30 40 50 60 70 80 2 < >

This white paper will examine the landscape in which IT departments are operating, the particular security issues they are facing, the potential benefits of turning to a managed service provider and what to expect from a managed security service. It will finish with a quick preview of some of the specific benefits associated with using a managed service that leverages industry-leading Blue Coat technology. The Affects of the Changing IT Landscape on Security A recurring theme within IT has always been do more, with less, so it s probably not a surprise that managing and reducing operational expenses is a top priority of most IT departments. More specifically, an IDC survey 2 identified the primary IT directives of executive managers are to improve the efficiency of business operations (58%) and reduce costs (54%). Of course, these objectives are then followed by a seemingly incongruous focus on innovation and increased responsiveness (at 34% and 33%, respectively). This is the perennial dilemma of IT how to balance the pressure to reduce the operational costs of the IT infrastructure, while at the same time trying to leverage that infrastructure to do more to drive business growth. The infrastructure is being extended to a wider variety of users, located in increasingly disparate sites, to deliver always-on access to an ever-changing set of business critical services and applications. The reality is to compete, organizations need to be able to quickly connect people and resources to the information and services they need to do business, regardless of where they are located; they need to ensure the business is agile enough to quickly roll out new services and applications to seize rapidly evolving market opportunities. As a result, 90 percent of enterprise respondents to a Nemertes survey 3 say they operate virtual organizations, supporting an increasingly geographical dispersed workforce operating out of many remote sites and home offices to be able to address the opportunities of the modern economy. However, while users have been moving outward, most enterprise applications and data have been centralized (57% by some accounts 4 ). This means that all the services and applications a typical business relies on now have to travel across the WAN to distributed end-users, creating new challenges for the organization. 2 IDC Network-IT Convergence Survey, IDC, 2007. 3, 4 Meeting the Enterprise Collaboration Challenge: Managed Network Services Can Guarantee Application Performance, Irwin Lazar, Nemertes Research, 2009. 3 < >

Enterprises need to ensure their employees, partners and customers can effectively communicate to drive innovation, accelerate problem solving, solicit feedback, and improve responsiveness and business agility. But how does the IT organization keep all these connections secure? Businesses can t afford to introduce risk to their organizations, but protecting the company s network from malware, web-based threats and data leakage is increasingly difficult, as the users and the applications they are using to conduct their work, and inevitably their lives, expand further out of the IT organization s direct control. Consumer-based services, such as social media apps like YouTube or Facebook, which typical employees use in their personal lives, are increasingly being brought into the corporate environment and applied to solve business problems many organizations have their own YouTube channel or leverage Facebook (or a similar service) to connect disparate employees to facilitate information sharing and collaboration. While all these can be great technology enablers, they can also introduce risks that can ultimately threaten productivity, corporate compliance objectives and the overall ability to do business if they are not secured. The Weak Links As globalization accelerates, businesses are racing to compete, while enabling employees, partners, and customers to access the information they need to conduct business at all times, from wherever they are in the world. While this expansion may be a business imperative, from a security standpoint, it s an IT nightmare. Imagine all the potential entry points created by this expanded network: -> How does an organization keep up with all the latest threats originating from around the world? -> How does an organization remain vigilant about its security posture? -> How does an organization ensure compliance? Protecting an organization s intellectual capital and reducing disruptions to business operations is progressively more difficult as the threat vectors constantly change and increase. It becomes a very tall order for most IT organizations, who are already stretched to their limits, from both a budget and manpower perspective, to stay ahead of the ever-increasing threats. 4 < >

The web gateway, which has traditionally served as a sentry at the point of entry to the network has found its role changing. Now, in addition to filtering Web requests, blocking objectionable content, collecting logs and information to support compliance efforts, and supplying HR with visibility into relevant employee activity (e.g. Joe went to a pornographic site), it is being asked to protect against increasingly sophisticated Web 2.0 threats such as Web site injections and new search engine bait engines (SEO poisoning). It must also supply visibility to the IT and risk management teams to ensure they understand all the security threats facing the organization. What used to just be complicated has suddenly become very complex; and every indication is that it will only continue to require more expertise and vigilance as organizations strive to secure their WAN traffic to reduce the overall risks to the organization. The Managed Service Advantage Enterprises facing the dilemma of how to effectively manage their security and reduce their risks, while still keeping everything else going, are increasingly turning to Managed Service Providers for support. As defined by IDC, a managed service provides enterprises a help-me-do-it or do-itfor-me approach to the operation, monitoring and performance optimization of network and/or IT functions. By contracting a third-party provider to take care of these aspects of an IT s operations on an on-going basis, an enterprise can: -> Augment their staff s expertise rely on the managed service provider and their wealth of experience to ensure the network is up-to-date -> Innovate free up staff to focus on other business imperatives, while increasing the overall coverage of the IT infrastructure through global services that can scale to meet the changing needs of the organization -> Achieve predictability a predefined service level agreement (SLA) ensures organizations can expect a predictable level of performance/availability/ capacity/etc.; an agreed upon monthly or annual fee means there is visibility into operational costs to ensure the enterprise can confidently plan and manage threat levels 5 < >

-> Increase responsiveness issues are quickly resolved by the managed service provider, reducing overall maintenance and troubleshooting burdens and ensuring IT organizations can stay on top of other IT imperatives -> Support compliance and governance requirements receive comprehensive records of all activity and actions taken What to Expect From a Managed Security Service Enterprises turn to managed service providers for all sorts of reasons, but the ability of a provider to provide broad attack coverage in a 24 x 7 service model creates a cost-effective value proposition that is attractive to many organizations. Some analysts 5 have found managed security services are the fastest growing segment of the information security market. There are multiple managed security service options offered by providers, ranging from deploying equipment at the organization s premise (CPEbased) to providing a dedicated hosted service. The goal is to find an MSP that meets the needs of the organization; one that delivers the level of security and reporting needed to maintain a consistent security stance throughout the infrastructure. The service needs to provide real-time protection against: -> Dubious web sites with traditional URL filtering capabilities, providers can reduce risk profiles by ensuring users can t go to those sites known to be infected with malware or containing objectionable/unauthorized content. -> The latest malware anti-virus and anti-malware capabilities provide protection against viruses and worms that can degrade performance and compromise the integrity of systems and intellectual assets. -> Web threats newer techniques are required to identify and protect against Web 2.0 threats, such as bait-oriented (phishing sites masquerading as a legitimate site to lure users to unwittingly download malware or provide valuable personal information) or web site injection threats (malicious links embedded on otherwise safe and legitimate web sites e.g. recent attacks on BBC or USA Today). -> Data leakage protection (DLP) robust policy management should allow control, at a granular level, of who is able to do what on the network, to easily identify anomalies (e.g. that application can only be accessed by the Finance department) that could represent a potential threat. 5 Gartner Dataquest 6 < >

It should also provide comprehensive logs and customizable reports to ensure all the data required is available to truly understand what s going on in the network, investigate attacks, and address compliance and regulatory requirements. The right managed security service will enable organizations to: -> Set security policies in line with overall business policies maintain an acceptable corporate risk level, manage access and protect against threats to support compliance objectives. -> Stay up-to-date on the latest threats keep the network from known and yet to be invented/discovered attacks by leveraging the expertise of the provider s security professionals. -> Manage costs ideally, sharing the capital infrastructure investments and expertise of many skilled security professionals across multiple organizations should bring the costs down of deploying, managing and maintaining an effective security posture; it should produce savings on in-house training, and reduce the time dedicated to ongoing security management; minimize the potentially devastating affects a successful attack can have on the network; and achieve greater predictability in the security budget with an agreed upon monthly/quarterly/annual service fee. -> Increase network reliability with security professionals dedicated to monitoring and managing the security of the network, 24 x 7, attain quick resolution and appropriate remediation of security incidents to minimize disruptions and the impact of attacks on the network. -> Maximize staff effectiveness ensure they are focused on business critical projects where they can make the biggest impact. Powerful Combination of a Managed Services Based on Blue Coat Blue Coat has become the platinum standard for security for most managed services, which provides customers with the benefit of relevant security information derived and shared from more than 70 million users. As a result, Blue Coat and the managed service provider can quickly identify localized or worldwide trends and threat levels and ensure organizations are apprised and appropriately protected to reduce risk. With Blue Coat s hybrid cloud model, the managed service provider has the unique ability to provide real-time protection against the latest malware and Web threats, including bait-oriented and web site injection attacks. For example, if a user on the corporate network visits a site (www. xxx. com) the 7 < >

request will be processed by the Blue Coat Secure Web Gateway, which looks up the site on the local database, as well as in the cloud to get real-time information on the threat level posed by that site. If threat-free, the user will be free to go to the site; if, however, a specific link on that site is corrupted, the user will get a message notifying them that it has been identified as malware or violates a corporate acceptable use policy to protect them from infecting their device and the network. This differs from other solutions that rely on databases that are only updated every few hours, or on a daily/weekly/monthly basis. The Web can change within seconds, so it s important to have a solution that can keep up with the ever evolving threat landscape and ensure the organization is effectively protected. Conclusion The success of almost every organization in today s networked world relies on the ability to connect people and resources, whenever and wherever they may be. As IT departments work hard to keep up with the ever-increasing demands placed on the network and do more with less, managed security service providers offer a cost-effective solution that alleviates the burden on IT s resources and staff, freeing them to innovate and focus on other issues core to the business. A managed service that leverages the underlying Blue Coat technology ensures organizations have the resources and expertise at their fingertips to securely roll out all the business-critical applications their increasingly distributed users need to confidently drive the business forward. 8 < >

Blue Coat Systems, Inc. 1.866.30.BCOAT +1.408.220.2200 Direct +1.408.220.2250 Fax www.bluecoat.com Copyright 2010 Blue Coat Systems, Inc. All rights reserved worldwide. No part of this document may be reproduced by any means nor translated to any electronic medium without the written consent of Blue Coat Systems, Inc. Specifications are subject to change without notice. Information contained in this document is believed to be accurate and reliable, however, Blue Coat Systems, Inc. assumes no responsibility for its use. Blue Coat, ProxySG, PacketShaper, CacheFlow, IntelligenceCenter and BlueTouch are registered trademarks of Blue Coat Systems, Inc. in the U.S. and worldwide. All other trademarks mentioned in this document are the property of their respective owners. v.wp-managed-security-services-v1-1010