The Benefits of a Hybrid Security Architecture



Similar documents
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

White. Paper. Understanding and Addressing APTs. September 2012

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst

Managing Web Security in an Increasingly Challenging Threat Landscape

White. Paper. Rethinking Endpoint Security. February 2015

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst

Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst

VDI-Centric Endpoint Security Can Help Lower Costs and Increase ROI

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Virtual Patch Management Offers Automation, Availability, and Cost Benefits Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst

White. Paper. Good Enough Security Is No Longer Good Enough. January 2013

Top 10 Reasons Enterprises are Moving Security to the Cloud

Compensating Security Controls for Windows Server 2003 Security

Is your organization developing its own custom applications specifically for mobile devices? (Percent of respondents, N=242)

Advanced Cyber Threats Demand a New Privileged Account Security Model Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst

Cisco Systems and the Migration from Network Access Control (NAC) to Endpoint Visualization, Access, and Security (EVAS)

This ESG White Paper was commissioned by Blue Coat and is distributed under license from ESG.

The Challenge of Securing and Managing Data While Meeting Compliance

ESG Brief. Overview by The Enterprise Strategy Group, Inc. All Rights Reserved.

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

The Network Application Security Architecture Requirement

White. Paper. What s Needed for Cloud Computing? Focus on Networking and WAN Optimization. June, 2010

How To Understand The Needs Of The Network

Securing the Borderless Enterprise

The Evolution of the Enterprise And Enterprise Security

IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst

Online File Sharing and Collaboration: Deployment Model Trends

2012 Bit9 Cyber Security Research Report

Securing Cloud-Based

Secure Web Gateways Buyer s Guide >

Safeguarding the cloud with IBM Dynamic Cloud Security

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

Mitigating Web Threats with Comprehensive, Cloud-Delivered Web Security

Information-driven Security and RSA Security Analytics and RSA ECAT

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

How To Integrate Identity And Security With A Network-Based Business Process

White. Paper. Endpoint Security Demands Defense-indepth and Advanced Analytics. November 2013

On and off premises technologies Which is best for you?

End-user Security Analytics Strengthens Protection with ArcSight

Types of cyber-attacks. And how to prevent them

Market Research. Study. Database Security and Compliance Risks. December, By Jon Oltsik

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

WHITE PAPER SPON. A Cloud-Client Architecture Provides Increased Security at Lower Cost. Published January 2012 SPONSORED BY

The Cloud App Visibility Blindspot

White. Paper. Cloud Computing Demands Enterprise- class Password Management and Security. April 2013

Symantec Protection Suite Add-On for Hosted and Web Security

Next-Generation Firewalls: Critical to SMB Network Security

The Cost Benefits of a Hybrid Approach to Security

Capturing the New Frontier:

Research Report. Abstract: 2013 Public Cloud Computing Trends. March 2013

VMware and the Need for Cyber Supply Chain Security Assurance

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Fighting Advanced Threats

The Evolving Public Cloud Landscape Date: June 2014 Author: Mark Bowker, Senior Analyst and Bill Lundell, Senior Research Analyst

Stop advanced targeted attacks, identify high risk users and control Insider Threats

WEBSENSE TRITON SOLUTIONS

Defending Against Cyber Attacks with SessionLevel Network Security

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

Advantages of Managed Security Services

Integrated Network Security Architecture: Threat-focused Nextgeneration

overview Enterprise Security Solutions

INTRODUCING isheriff CLOUD SECURITY

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

Carbon Black and Palo Alto Networks

Putting Web Threat Protection and Content Filtering in the Cloud

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

Research Perspectives

Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model

Payment Card Industry Data Security Standard

I D C A N A L Y S T C O N N E C T I O N

Next-generation Security Architecture for the Enterprise

Reducing the Critical Time from Incident Detection to Containment

Buyers Guide to Web Protection

White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks

Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor

Cloud-Client Enterprise Security Impact Report Increased Protection at a Lower Cost

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Research Report. Abstract: 2014 Public Cloud Computing Trends. March 2014

Single-Vendor Security Ecosystems Offer Concrete Benefits Over Point Solutions

Achieve Deeper Network Security

Research Report. Remote Office/Branch Office Technology Trends. July 2011

Building a Business Case:

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

The Hillstone and Trend Micro Joint Solution

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

IAAS REFERENCE ARCHITECTURES: FOR AWS

Threat Containment for Facebook

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

White. Paper. Information Security, Virtualization, and the Journey to the Cloud. August, 2010

How To Secure Your Store Data With Fortinet

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

Advanced Persistent Threats

W H I T E P A P E R W e b S e c u r i t y S a a S : T h e N ext Generation of Web Security

SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES

Transcription:

White Paper The Benefits of a Hybrid Security Architecture By Jon Oltsik, Senior Principal Analyst November, 2011 This ESG White Paper was commissioned by Blue Coat Systems, Inc, and is distributed under license from ESG. 2011, Enterprise Strategy Group, Inc. All Rights Reserved

White Paper: The Benefits of a Hybrid Security Architecture 2 Contents Executive Summary... 3 The Increasingly Dangerous Web Threat Landscape... 3 Large Organizations Are Investing In Web Threat Management... 4 Which Web Threat Management Model Is Best?... 5 Web Threat Management Gateways Are Great for Large Collocated Organizations... 5 Cloud-based Web Threat Management Makes Sense for Distributed Enterprises... 6 Large Global Enterprises Need a Hybrid Security Architecture... 7 Hybrid Web Threat Management Provides Flexibility and Immediate Security Benefits... 8 The Bigger Truth... 9 All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change from time to time. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of the Enterprise Strategy Group, Inc., is in violation of U.S. copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at (508) 482-0188.

White Paper: The Benefits of a Hybrid Security Architecture 3 Executive Summary Cloud computing has become a viable model for a multitude of IT requirements. In some cases, large organizations purchase cloud-based CPU cycles on an as-needed basis for test, development, and batch processing using Infrastructure-as-aService (IaaS) offerings from vendors like Amazon, Rackspace, and Terremark. Other times they simply outsource an entire application, handing email to Google, CRM to Salesforce.com, or payroll to ADP. In spite of its value however, IT professionals remain engaged in a philosophical debate on the value of cloud computing. They ask if cloud computing and SaaS designed for the masses are really suitable alternatives to on-site IT equipment residing in corporate data centers. After all, premise-based IT equipment offers line-speed performance and can be tuned for the specific requirements of an individual organization. Recently, CISOs have had similar deliberations with regard to information security requirements, especially as they relate to web threat management. Security professionals ponder a similar question: Should large organizations opt for on-premise security gateways or simply offload web threat management to the cloud? This paper concludes: Regardless of the solution choice, web threat management needs to be addressed as soon as possible. While theoretical pondering about on-premise versus cloud services persists, web threat management is an increasingly insidious risk. As a result, ESG Research indicates that large organizations are actively investing in web threat management solutions. On-premise and cloud deployments have strengths and weaknesses. Web threat management gateways work well in large centralized facilities while SaaS is a good fit for remote offices and mobile workers. Unfortunately, large global organizations need coverage in all of these areas so neither security gateways nor SaaS are adequate on their own. CISOs wonder if they should settle on one choice or implement multiple solutions from multiple vendors. Large global organizations need tightly-integrated hybrid solutions. Typical multi-national enterprises have a combination of large populations of centralized and distributed employees. These firms need consistent policy management, enforcement, and oversight in order to provide strong security for all employees regardless of the location of the networks they connect to. In fact, this is the most compelling reason for a unified hybrid web security solution combining the on-premise control of appliances with the flexibility of cloud. Using a hybrid architecture, large global organizations get central management, distributed enforcement, and capitalize on the crowd sourcing aspects of a cloud computing community for mobile, remote, and centralized employees alike. This best-of-both-worlds architecture will become a standard enterprise deployment moving forward. The Increasingly Dangerous Web Threat Landscape Defending against viruses, worms, and Trojans has always been difficult but many CISOs admit that threat management is getting precipitously more difficult each day. This is due to the fact that large organizations face traditional attack vectors as well as increasingly dangerous web threats. Things will only get worse because of: Unprecedented malicious code volume. According to the latest Blue Coat web threat report, the volume of web threats grew more than 500% over the past year alone. Additionally, the volume of malicious code variants grew by over 300% while phishing attacks were up more than 600%. Dangerous web content. Nearly half of malicious code threats now target Internet browsers because many web applications are vulnerable, making them easy targets to infect. Users also tend to trust websites from high-traffic sites like Google, Yahoo, and Bing which have been compromised in the past and used for malcode proliferation. Web 2.0 is driven by dynamic content, a new and perpetually changing threat vector. Finally, web threats can be targeted at a specific organization or individual making detection and prevention extremely difficult. Social networking vectors. Social networking sites have quickly become criminal enclaves. For example, the Zeus botnet sent over 1.5 million phishing messages on Facebook over the past few years. Little

White Paper: The Benefits of a Hybrid Security Architecture 4 wonder then that more than three-quarters (77%) of security professionals working at enterprise organizations (i.e., more than 1,000 employees) believe that employee access to social networking sites increases the likelihood of a sophisticated attack (see Figure 1) 1. Figure 1. Belief that Social Networking Sites Increase Likelihood of APT Attacks Please respond to the following statement: I believe that employee access to social networking sites (e.g., Facebook, Twitter, etc.) increases the likelihood of an APT or other type of sophisticated attack. (Percent of respondents, N=244) Disagree, 5% Strongly disagree, 1% Strongly agree, 25% Neither agree nor disagree, 16% Agree, 52% Source: Enterprise Strategy Group, 2011. Increased mobility. Employees regularly access a combination of corporate and consumer web applications using laptops, smart phones and tablet PCs. While this mobility can help bolster productivity, it makes it more difficult to manage device configuration, update security signatures, or monitor activity for suspicious and/or anomalous behavior. Large Organizations Are Investing In Web Threat Management Wikipedia defines the term web threat as follows: A web threat is any threat that uses the internet to facilitate cybercrime. Web threats use multiple types of malware and fraud, all of which utilize HTTP or HTTPS protocols, but may also employ other protocols and components, such as links in email or IM, or malware attachments or on servers that access the Web. They benefit cybercriminals by stealing information for subsequent sale and help absorb infected PCs into botnets. Web threats pose a broad range of risks, including financial damages, identity theft, loss of confidential information/data, theft of network resources, damaged brand/personal reputation, and erosion of consumer confidence in e-commerce and online banking. Given the ubiquity, volume, and growth of web threats, CISOs are investing in specific web threat safeguards. This is demonstrated in recent ESG Research. Nearly one-third of organizations said that they will invest in web security in 2011 (see Figure 2) 2. 1 Source: ESG Research Report, U.S. Advanced Persistent Threat Analysis, November 2011. 2 Source: ESG Research Report, 2011 IT Spending Intentions Survey, January 2011.

White Paper: The Benefits of a Hybrid Security Architecture 5 Figure 2. Large Organizations Will Invest in Web Security With regards to specific spending plans for for security, in which of the following areas will your organization make the most significant investments over the next 12-18 months? (Percent of respondents, N=286, five responses accepted) Network security 48% Desktop security 36% Web security Mobile device security Security management and operations Application and database security Identity and access management Information assurance 31% 30% 29% 27% 25% 24% Physical security Secure software development tools PKI (public key infrastructure) / certificate management 19% 15% 10% 0% 10% 20% 30% 40% 50% 60% Which Web Threat Management Model Is Best? Source: Enterprise Strategy Group, 2011. When CISOs look for web threat management technology safeguards, they face a daunting and often confusing number of choices. While hyperbolic vendor claims are to be expected, many security executives confront a new decision criterion: Should they purchase and implement traditional gateway security solutions or bypass on-site options in favor of SaaS-based cloud services? Web Threat Management Gateways Are Great for Large Collocated Organizations Web threat management gateways reside at network ingress/egress points in order to filter and block malicious web content like phishing exploits, viruses, worms, Trojans, and botnets. To maintain protection over time, security vendors regularly update on-site web threat management gateways with new rules and signatures as new malware threats are discovered. In the past, large organizations usually opted for on-premise web threat management gateways. These traditional bastion servers offer a number of benefits such as: High performance. Gateway appliances are designed to operate at wire speed, with minimal latency or impact on network performance. Large organizations with enterprise-class IT, networking, and security skills can easily implement and tune a gateway security appliance so it delivers strong security protection for thousands of network-based employees without any adverse impact on performance requirements.

White Paper: The Benefits of a Hybrid Security Architecture 6 Customizable policy management and enforcement. Enterprise companies have varied security needs based upon regulations, industry-specific threats, and internal governance. To meet these disparate requirements, many gateway web threat management appliances provide granular controls for policy management and security enforcement. In this way, web threat management gateways can be customized to enforce security policy rules based on a particular user, group, location, or time of day. Central command-and-control. Large organizations that span multiple facilities or campuses with multiple network ingress/egress points may need several web threat management gateways. To meet this requirement, leading web threat management gateways provide central command-and-control for multiple appliances. In this way, CISOs can have common policies across multiple web threat management gateway appliances, or customize individual appliances for specific needs. Integration with other security functionality. In many cases, web threat management may be combined with other security applications, like DLP, anti-virus, or URL filtering, residing on high-performance security gateways. Large organizations can then standardize on a single security appliance in order to lower capital costs, streamline ongoing operations, and centralize maintenance and support. Integrated security appliances may also help improve overall security by correlating events and consolidating reporting. Cloud-based Web Threat Management Makes Sense for Distributed Enterprises Web threat management gateways are most beneficial for large centralized organizations where hundreds or thousands of employees are tethered to the network across multiple collocated facilities. In today s global business environment however, many organizations depend upon a highly distributed and often mobile workforce residing in branch offices, remote locations, or simply on the road. Over the past few years, a growing number of security vendors have embraced a SaaS or cloud delivery model as an alternative to traditional gateway appliances. Distributed enterprises could certainly benefit from web threat management via the cloud as this type of delivery model offers: Easy deployment and operations. SaaS provides a turnkey solution in that there is no need to purchase, test, deploy, or manage new equipment. With web threat management services, it is as simple as routing all web ingress/egress traffic to a cloud-based IP address and, voila, web threat management policies are enforced remotely. Efficient and effective protection. Since cloud vendors design their solutions for the masses, SaaS solutions tend to provide ample protection against the most common types of attacks. With regard to web threat management, this means that cloud services are likely to block malicious URLs and content, phishing sites, and known malware distribution servers. Think of cloud web threat management services as enforcing the 80%/20% rule. They may not offer the customization or security integration of on-premise gateways but they can deliver efficient and effective protection against likely web threats. Support for remote offices and mobile workers. Based upon recent research, ESG believes that employees working at remote and branch offices present a bigger security challenge than those in central locations, especially with regard to PC configuration management, end-user training, and monitoring of remote employee use of sensitive data (see Figure 3) 3. These remote offices with dozens of employees need web threat management but since it may not make economic or technical sense to deploy a gateway appliance at each remote facility, cloud services are especially attractive. Mobile workers are rarely behind the firewall. Because of that, gateway appliances offer no protection whatsoever, so SaaS is the best fit. Cloud-based security services also have a potential security advantage due to the network effect and crowd sourcing. In this model, all cloud clients act as intelligence agents and report back to the cloud when they discover new attack vectors like a previously unseen malicious code executable or compromised URL. Once a new attack is identified, everyone else in the cloud security community is safeguarded from the threat. 3 Source: ESG Research Report, Remote Office/Branch Office Technology Trends, July 2011.

White Paper: The Benefits of a Hybrid Security Architecture 7 Figure 3. Security Challenges for Supporting Remote Office/Branch Office Requirements What would you consider to be the biggest information security challenges your organization faces when it comes to supporting IT requirements for ROBO locations? (Percent of respondents, N=388, multiple responses accepted) Managing remote PC security and configurations Training and enforcing corporate security and compliance policies for ROBO-based employees Monitoring the use and storage of sensitive data accessed by remote users Remote user authentication and access controls 34% 38% 46% 46% Mitigating web application threats Securing data-at-rest (i.e., data residing at ROBO locations) Securing data-in-flight (i.e., data travelling between ROBO and headquarters locations) Installing/managing VPNs Configuring/managing remote office security equipment Securing DNS 27% 24% 24% 22% 20% 16% 0% 10% 20% 30% 40% 50% Large Global Enterprises Need a Hybrid Security Architecture Source: Enterprise Strategy Group, 2011. Some companies will naturally gravitate toward on-premise web threat management gateways or SaaS solutions based upon a single decision point whether their organization is centralized or distributed. That said, many global organizations are made up of pockets of central campuses combined with a multitude of remote offices and mobile workers. Should these firms go with on-premise equipment, cloud services, or both types of solutions? It s easy to see that large global enterprises need web threat management solutions capable of protecting all employees and IT assets whether they reside in the data center or remote offices, or access applications over public networks. Unfortunately, this could mean implementing multiple solutions from multiple vendors, an on-premise solution for the corporate network and a cloud service for remote offices and mobile employees. Yes, multiple solutions may provide coverage and protection but they will also carry high costs and redundant operations. What s needed here is a new hybrid architecture that combines on-site performance and management benefits with cloud-based flexibility and coverage (see Figure 4).

White Paper: The Benefits of a Hybrid Security Architecture 8 Figure 4. Hybrid Security Architecture Source: Enterprise Strategy Group, 2011. To meet the large global enterprise requirements, hybrid web threat management architectures must contain: Centralized management and distributed enforcement. A hybrid web threat management architecture provides for consistent policy management and security enforcement regardless of whether these activities execute within an on-premise appliance or in the cloud. Appliances and cloud services are managed through a consistent GUI while reports can be customized for views across the enterprise (i.e. aggregate view of on-premise appliances and cloud services) or any subset of locations regardless of form factor. Cloud-centric intelligence. Threat intelligence is based firmly in the cloud while users and on-premise appliances contribute to intelligence gathering through crowd sourcing as described above. New threats are shared immediately through real-time updates of on-premise appliances. Tight integration. On-premise and cloud management and enforcement can be applied in a flexible way to cover any use case. In addition, a hybrid threat management architecture can be extended for further kinds of security requirements. For example, web threat management can be enhanced with DLP capabilities to address malicious code attacks at network ingress and data exfiltration at network egress. Hybrid Web Threat Management Provides Flexibility and Immediate Security Benefits ESG believes that a hybrid architecture can deliver both short- and long-term benefits that begin almost immediately. A hybrid web security architecture offers these advantages because it: Improves security for remote workers. According to ESG Research, IT support of remote offices creates numerous security challenges including web threat management (see Figure 3). And these same security

White Paper: The Benefits of a Hybrid Security Architecture 9 challenges holds true for mobile workers as well. A hybrid web threat management architecture provides an elegant and effective solution as it alleviates the need to deploy new equipment or one-off SaaS security services. Rather, CISOs can leverage central IT security skills and best-of-breed web security tools to apply blanket coverage for employees regardless of their geographic or network location. The result? Instant security improvement that directly addresses some of the challenges identified in the ESG Research. Offers global visibility and control for rapid problem detection and remediation. With today s sophisticated cyber attacks like APTs, all it takes is one compromised device to cascade into a major data breach. Addressing this risk means monitoring all devices and activities. Since hybrid web threat management architectures provide central command-and-control, policy management, and reporting, CISOs can have visibility and oversight over all devices and enforcement activities across the entire network. This visibility and control can accelerate problem detection and remediation. Creates a cloud migration path. Hybrid web threat management architecture combines the strengths of on-premise equipment and cloud ubiquity. Yes, this provides comprehensive coverage, but some organizations may want to offload web and other threat management activities to the cloud over time, especially as cloud security services mature. A hybrid web threat management architecture provides a flexible path for future security migration. CISOs can simply adjust network settings, replace networkbased appliances with cloud services, and take advantage of cloud-based economics and security skills as they become enterprise-class options in the future. The Bigger Truth Cloud computing and SaaS are too often represented as binary alternatives to traditional IT efforts either you do something yourself or wash your hands of the entire matter. This is an unfortunate portrayal that totally ignores the whole notion of hybrid clouds. Yes, few companies actually burst application workload capacity to public clouds today but this may become a standard method for capacity planning, business continuity, and disaster recovery in the future. This same thought process should also be applied to more granular IT requirements like web threat management. On-premise and cloud solutions offer many benefits but neither of these options provides end-to-end coverage. Rather than choose one of these incomplete options however, smart CISOs will look for hybrid options offering the best of both. The best hybrid options will be designed for central management and distributed security enforcement woven together as a tightly integrated architecture. This is what Blue Coat offers with a web threat management architecture spanning ProxySG/WebFilter appliances and web security cloud security both powered by the WebPulse Collaborative Defense.

20 Asylum Street Milford, MA 01757 Tel:508.482.0188 Fax: 508.482.0218 www.enterprisestrategygroup.com