Top 5 Security Trends and Strategies for 2011/2012 Peter Sandkuijl Europe SE manager network security psandkuijl@checkpoint.com 2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved.
Top Trends of 2011/2012 1 2 3 Virtualization & Cloud Computing IT Consumerization Threat Landscape 4 5 Consolidation & Complexity Data Security and Loss 2
2011 Security Trends 1 Virtualization & Cloud Computing 3
On Data Center Consolidation Private cloud 1 28% have one 30% plan one CIOs will virtualize 55% of production servers next year, up from 42% this year 2 1 Information Week, June 2010 2 Morgan Stanley, June 2010 4
Enterprise Virtualization Initiatives Top Security Challenges for Server Virtualization What are the biggest security challenges preventing server virtualization in your enterprise? Lack of skills in security team 36% Cost of new information security solutions 28% Can t port existing security tools from physical to virtual world Lack of security best practices for server virtualization 24% Regulatory compliance issues 24% 26% Lack of knowledge in security teams remains the biggest challenge in moving to virtualized environments. Enterprise Strategy Group 2010 Survey of enterprise decision makers 5
On Cloud Computing Q: Rate the challenges/issues of the 'cloud'/on-demand model (1=not significant, 5=very significant) Security 88.5% Performance 88.1% Virtualization Security will seep Availability 84.8% out of Hard to the integrate datacenter with and in to 84.5% in-house IT Not enough ability to 83.3% customize other facets of the enterprise IDC: Worldwide Worried Security cloud Products will and Services 2011 Top 10 Predictions 81.1% cost more Bringing back in-house may be difficult Not enough major suppliers yet 74.6% 80.3% Source: Frank Gens & IDC Enterprise Panel 65% 70% 75% 80% 85% 90% % responding 3, 4 or 5 6
On Cloud Priorities Top hardware / IT infrastructure priorities Are you considering building an internal or private cloud operated by IT (not a service provider) in next 12 months? Enterprise 45% 55% Mid-market 56% 44% Small Business 64% 36% Not currently planned On project list Forrester Research 2010 Enterprise and SMB Survey 7
2011 Security Trends 2 IT Consumerization 8
Consumers Leading the Enterprise Consumer hardware used for work Consumer services used for work 9
% Penetration Mobile Workforce Growth Enterprise Mobile Device Population Market penetration over time 100 80 Mobile Population 60 40 20 Anchored Desktop 0 2000 2005 2010 451 Group 2009/2010 10
2011 Security Trends 3 Threat Landscape 11
Today s Threat Landscape Increasing Sophistication Crime and Profit-driven Cyber-warfare and Hactivists Zeus Stuxnet Aurora Botnets XSS Trojans Worms Multi-vector Polymorphic Blended and multi-variant Cyber Crimeware Financial theft Intellectual property Criminal networks Cyber-warfare Iran and Stuxnet Wikileaks Cyber Hactivists 12
TROJAN BOTNET ADWARE EXPLOIT ROOTKIT SCAREWARE On Top Threats Stuxnet widely considered the most sophisticated computer threat Most prevalent threat types created to date Stuxnet exploited four previously unknown vulnerabilities, at a time when exploiting a single one is a big deal. SOFTPEDIA.com 2011 Hackers seeking source code from Google, Adobe and others used nearly 12 pieces of malware and levels of encryption to burrow deeply into the bowels of company networks WIRED 2010 Operation Aurora Zeus Zbot Zeus detected only 23 percent of the time is the No. 1 financial Trojan representing 44 percent of all financial malware infections today. Darkreading.com 2010 13
2011 Security Trends 4 Consolidation and Complexity 16
On Complexity and Point-product Sprawl Biggest IT Security Challenges Which of the following are the biggest information/network security challenges facing your company? Managing the complexity of security 51% Enforcing security policies 35% Preventing data breaches from outside attackers 29% Preventing data theft by employees or other insiders 23% The requirement to manage security complexity grows steadily each year. InformationWeek 2010 Survey of security decision makers 17
On Complexity and Point-product Sprawl Your world: Top And network don t forget security endpoint nearly technologies doubling the and point number products of point deployed products IPS URL URL Filtering Filtering IPS Firewall VPN VPN NAC 18
2011 Security Trends 5 Data Security and Loss 20
On Data Loss 81% Percentage of companies breached who were not PCI compliant. Percentage of outbound e-mail that contains content which poses a legal, financial or regulatory risk. 20% 31% Percentage of customers who end their relationship with a company if they are affected by a breach. 21
USBs and Laptops Corporate Email Public Webmail WiFi Networks CDs/DVDs On Top Sources of Data Loss Risk channels: Top five sources of data loss across organizations and enterprises worldwide 30% 25% 20% 15% 10% 1 2 3 4 5 5% 0% InformationWeek 2010 Security Survey 22
Data Loss in the News Shell Corporation loses database of 176K employees Apple exposed over 100K highprofile ipad customer names Facebook looses user data for 170M subscribers McDonald s loses an undisclosed amount of customer data February June July December 2010 Data Loss Events 23
To Do list for IT security leaders: Meet IT governance, risk and compliance requirements Prevent the loss of sensitive data Secure and manage Web 2.0 applications Secure all fixed and mobile endpoints Protect against attacks and evolving threats Secure virtualized and cloud environments Reduce IT security spending 24
Thank You! 25