1 / 12

Malware—taking protection to where the threats are

Malware—taking protection to where the threats are. Fran Howarth Senior Analyst, Security Bloor Research. The realities of malware today. Previously on the decline, malware threats are on the rise again. Greater chance of success. The internet is the new perimeter.

Télécharger la présentation

Malware—taking protection to where the threats are

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Malware—taking protectionto where the threats are Fran Howarth Senior Analyst, Security Bloor Research

  2. The realities of malware today Previously on the decline, malware threats are on the rise again Greater chance of success

  3. The internet is the new perimeter “You’ve already been de-perimeterised” An alternative take on the term “de-perimeterisation”, first coined by the Jericho Forum, that describes security exploits such as internet worms and viruses that are designed to bypass the borders of organisations using web and email threats. Source: Network World

  4. Reliance on email and theinternet is growing • 62% of people check work email over the weekend • 55% of mobile email users upgraded to a new phone just to get email • 59% admit to checking email from the bathroom Source: AOL email addiction survey 2009

  5. Today’s ubiquity of communication

  6. The imperative for data security • Some recent headlines: • “Hacked website exposes customers’ credit card details” • “State employee data accessible on website exposing names, addresses, DOB and social security numbers” • “Names and social security numbers of about 5,000 accidentally posted to web” Source: DataLossDB

  7. Why existing securitytechnologies are no longer enough • Too many malware variants, introduced too fast • Existing mechanisms using signatures can’t cope—too long to develop and too much hassle to update all users in in-house deployments • Mobile workers left out in the cold • New technologies make the threats worse—social networking, Web 2.0 in general • Browser as principal means of infection • Hybrid threats using blended mechanisms

  8. Move protection to the cloud Anti-virus Anti-spyware Anti-phishing Application blocking Policy enforcement URL filtering Internet Corporate network at HQ Cloud-based web security Services and analysis centre Remote data centre for failover and redundancy Mobile workers and remote offices Anti-virus Anti-spyware Anti-phishing Application blocking Policy enforcement URL filtering Management reporting dashboard for audit

  9. Why the cloud makes sense Email and web Security provided In the cloud Traffic routed via cloud-based service provider enables better, more economical protection X X X Only good traffic reaches organisation Organisation relies purely on perimeter defences

  10. What drove your move to SaaS? Ranked from 1 = not a factor to 5 = major driver Source: InformationWeek Analytics 2010 SaaS survey of131 business technology Professionals using SaaS

  11. Conclusions Web and email security is a necessity in today’s world where the web is a prime vector of attack Moving protection to where the threats emanate from provides better, faster protection against increasingly complex, sophisticated threats being seen Not only is the available protection provided faster and is of higher quality than traditional security technologies, but the use of cloud-based services can afford organisations with substantial cost benefits as well

  12. Thank you Fran Howarth, Bloor Research fran.howarth@bloorresearch.com

More Related