Why are Companies in the EU Adopting More and More Cloud-Based Security Solutions? François GRATIOLET, Qualys Inc., CSO EMEA



Similar documents
Why companies in the EU are adopting more and more cloud-based security solutions?

BEST PRACTICES RESEARCH

Bringing Continuous Security to the Global Enterprise

NE T GENERATION CLOUD SECURITY PLATFORM

Rozwiązanie SaaS w zakresie bezpieczeństwa teleinformatycznego i ochrony danych dla przedsiębiorstw

Safeguarding the cloud with IBM Dynamic Cloud Security

Click to edit Master title style. How To Choose The Right MSSP

State of Security Monitoring of Public Cloud

Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

On Premise Vs Cloud: Selection Approach & Implementation Strategies

Caretower s SIEM Managed Security Services

How to manage IT Risks and IT Compliance as a Service

How To Secure Cloud Computing

Working anytime anywhere

Strategies for the. Efficient CISO. The Shift into the Cloud

Simple. Smart. Professional. A 2BSecured Company

Introduction to QualysGuard IT Risk SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Cloud Security Panel: Real World GRC Experiences. ISACA Atlanta s 2013 Annual Geek Week

Cloud Security Specialist Certification Self-Study Kit Bundle

With Eversync s cloud data tiering, the customer can tier data protection as follows:

How To Protect Your Cloud From Attack

Building a Business Case:

Logging In: Auditing Cybersecurity in an Unsecure World

Secure Cloud Computing

Address C-level Cybersecurity issues to enable and secure Digital transformation

2012 North American Managed Security Service Providers Growth Leadership Award

Choosing Between Managed Security Services or In-house SIEM? Consider the Benefits of both!

How to ensure control and security when moving to SaaS/cloud applications

Adding value as a Cloud Broker. Nick Hyner Director Cloud Services EMEA Twitter Dell.com/Cloud

3Si Managed Authentication Services Service Description

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Software Defined Hybrid IT. Execute your 2020 plan

REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION

Cloud Security Introduction and Overview

The Pathway to a Cloud-Enabled Enterprise Jim Wagstaff

1 The intersection of IAM and the cloud

Introduction to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:

Cloud Security: An Independent Assessent

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments

Security Issues in Cloud Computing

What REALLY matters in Cloud Security? RE: Internet of things sensors, data, security and beyond!

Is it Time to Trust the Cloud? Unpacking the Notorious Nine

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

Cloud Virtualization Specialist Certification Self-Study Kit Bundle

Intro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

SECURITY IN THE CLOUD

Securing business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security

IT Security Conference Romandie - Barracuda Securely Publishing Web Application a field dedicated to expert only?

The Evolution of Application Monitoring

VULNERABILITY MANAGEMENT

Cloud Service Providers Overcoming security and compliance barriers

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Trusted Geolocation in The Cloud Technical Demonstration

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

SIEM Implementation Approach Discussion. April 2012

A COMPLETE APPROACH TO SECURITY

Intelligence Driven Security

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

Virtualization Impact on Compliance and Audit

Westcon Presentation on Security Innovation, Opportunity, and Compromise

EAaaS Cloud Security Best Practices

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

RETHINKING CYBER SECURITY Changing the Business Conversation

Cloud Security. Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014

Cloud Computing An Auditor s Perspective

Accenture Cyber Security Transformation. October 2015

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) 2014: 245 incidents reported

CALNET 3 Category 7 Network Based Management Security. Table of Contents

AccelOps Cloud Security Survey 2013

The agile Cloud Brokerage approach. An innovative, business aligned and mature IT services delivery model!

Open Certification Framework. Vision Statement

Looking Ahead The Path to Moving Security into the Cloud

CAS8489 Delivering Security as a Service (SIEMaaS) November 2014

Cloud Services Overview

Security Information & Event Management (SIEM)

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Emerging Trends in the Network Security Market in India, CY 2013

Redesigning IT Service Organization for Digital Era

Cloud Courses Description

Cyber Security Operations: Building or Outsourcing

MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013

Sean Horne CTO EMC UKI. The leakage of Intellectual Property.. .and the risk of Privacy, Trustworthiness, Governance and Data Breaches

Cloud Computing: Background, Risks and Audit Recommendations

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Global Web Application Firewall Market

CorreLog: Mature SIEM Solution on Day One Paul Gozaloff, CISSP. Presentation for SC Congress esymposium CorreLog, Inc. Tuesday, August 5, 2014

Cloud and Regulations: A match made in heaven, or the worst blind date ever?

CYBER SECURITY SERVICES PWNED

Cloud services: Security, Compliance and Privacy. Nasos Kladakis Solutions Specialist Microsoft Hellas

Big Data, Big Risk, Big Rewards. Hussein Syed

It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe

Akamai Security Products

Changing the Enterprise Security Landscape

Cloud-Based dwaf A Real World Deployment Case Study. OWASP 5. April The OWASP Foundation

Transcription:

Why are Companies in the EU Adopting More and More Cloud-Based Security Solutions? François GRATIOLET, Qualys Inc., CSO EMEA

2

Agenda What is the cloud business value? What about the SecaaS? Why companies are increasingly adopting cloud-based security solutions? Key takeaways How to increase transparency? 3

What is the Cloud Business Value? Continuous Security Built Private Clouds SaaS PaaS/IaaS into the Infrastructure Security Delivered as a Service Zero Days Fishing Web Applications Security as a Services Targeted Attacks Attack Kits Internet Mobile Threats Social Networking The soft belly of Cloud Computing Net Devices Replacing Corporate Desktops Data Centric Security Model 4

What About the SecaaS? Security controls that are owned, delivered and managed remotely by one or more providers. The provider delivers the security function based on a share set of security technology and data definitions that are consumed in a one-to-many model by all contracted customers anytime on a pay-for-use basis, or as a subscription based on metrics Security as a Service refers to the provision of security applications and services via the cloud either to cloudbased infrastructure and software or from the cloud to the customers on-premise systems SecaaS or Security as a Service or cloud-based security services 5 Taxonomy of IT security services

What About the SecaaS? An emerging market Services in many forms which have caused market confusion and complicated the selection process for end users Fuzzy and closed frontiers between sub segments and markets Pure players, new entrants, defense and historical players to come Collaboration and competition A star and growing market A very attractive EU market which was estimated to $1.5 billion in 2011 Gartner predicts that cloud-based security service us will grow to $4.2 billion in 2016 with a 23,4% CAGR 6 Main market segments IAM services, Secure Web Gateway, Secure Email Gateway, SIEM Distributed-denial-of-service protection Security intelligence, Vulnerability Assessment

What About the SecaaS? Segments annual growth rates 7

Why Companies are Increasingly Adopting SecaaS? 8

Why Companies are Increasingly Business Drivers Adoption of the cloud in order to enhance IT business value at utility, transformation and innovation levels Focusing on their core business, using security specialists Risk management at the governance level Flexibility and agility Addressing global presence and smooth deployment needs Do more with less Adopting SecaaS? Addressing increasing compliance requirements to standards (e.g. PCI-DSS for merchants) and EU regulations (e.g. EU data privacy and breach notification legislations) 9

10 Why Companies are Increasingly Adopting SecaaS? Security Drivers CISO becoming more strategic has to excel in innovation, technology, stewardship, and operational efficiencies War of talents and scarcity of security expertise on the market Accessing to more advanced security services Easy integration and complementary of SecaaS solutions Anticipating more, and reacting efficiently and quickly to new cyber threats and vulnerabilties Focus on analyzing security information and making decisions, not implementing the services Better enforcement of security policy, governance and processes Automatic and transparent security updates and patches Availability of new features and services without deploying software agents/updates

Why Companies are Increasingly Cost Drivers Reduction of operational cost and maintenance Only OPEX budgets, no CAPEX budgets required Lower switching costs Adopting SecaaS? 11 2010 Forrester study «The Total Economic Impact of QualysGuard» (Net Present Value computing)

12 Key Takeaways Cloud services can improve security Cloud-based security solutions can be more robust, effective and cheaper than traditional enterprise software solutions. It s a matter of managing risks vs rewards Security is increasingly being seen as a driver rather than an inhibitor (2011 Cloud Computing Outlook Survey by Cloud.com ) Some issues and challenges remain Service management and governance Liability, contracting and SLA terms and conditions Right to audit the provider Data location and transfer Auditing and security certifications (ISO 2700x, SSAE-16) Need for further standards development in order to increase trust and transparency Some SecaaS solutions are on the way Web Application Firewalls (WAF), cloud-based log management solutions

How to Increase Transparency? SIEM The ability to make security event information from the cloud service available for the organization to process in existing enterprise Security Information Event Management (SIEM) systems. Identity Management The ability to allow an organization to manage the identities of the individuals within the organization that use the cloud service, which is also known as Federated Identity Management (FIM) 13 Third party risk management As more organizations depend upon third parties for critical and important business processes the need for a formal third party risk management program has become more important. Service Organization Control (SOC) reports Shared Assessments Standard Information Gathering (SIG) ISO 27001 certifications Cloud Security Alliance Consensus Assessments Initiative Questionnaire (CAIQ) Cloud Security Alliance Cloud Controls Matrix

Qualys at a Glance QualysGuard Cloud Platform & Suite of Integrated Solutions 6,500 + Customers 100 + Countries $99M LTM Revenues * 14 The 12 months ended June 30 st 2013

Cloud Oriented Architecture VMware ESX and ESXi Perimeter Scanners IaaS/PaaS Scanners Physical Scanners Hypervisor Browser Plugins Virtual Scanners Mobile Agents 15

Integrated Security & Compliance Solution Continuous Asset Discovery Network Threat Protection Web Application Security Governance Risk & Compliance QualysGuard Cloud Platform 16

QualysGuard Private Virtual Cloud Platform Extends the reach of Qualys by enabling MSSPs, large enterprises, government or military agencies to deploy the QualysGuard Cloud platform in their own data centers. Remotely managed by Qualys Planning fully disconnected version for military/federal SOC 24x7x365 Monitoring and Support Daily Vulnerability Feeds Bi-quarterly Platform Updates VMware ESX and ESXi VCE Implementation 17

18 Qualys Cloud Deployment Model

Thank You fgratiolet@qualys.com