Content Security For The Next Decade

  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Content Security For The Next Decade as PDF for free.

More details

  • Words: 1,209
  • Pages: 43
Content security for the next decade The security service and products opportunity for resellers

Bob Tarzey, Service Director Quocirca Ltd

Partner conference – Nov 7th 2008

Agenda     

The need for content security The resellers dilemma The risk landscape Security policy for the business Technology - problem and solution

© 2008 Quocirca Ltd

2

Agenda     

The need for content security The resellers dilemma The risk landscape Security policy for the business Technology - problem and solution

© 2008 Quocirca Ltd

3

The IP revolution

“For small business and office departments Windows 95 will support about 20 PCs working together”

Not a new problem 1980s

Corporate IT Firewall

Print and fax

2008

FTP Email Web

IM Blogs, wikis, RSS Social networks/ virtual worlds

Number of employees

Use of laptops

Percentage of laptops 1,200 European and US small and mid-sized businesses, 2006

Number of employees

Use of mobile devices

Employee use of mobiles to access IT 1,200 European and US small and mid-sized businesses, 2006 © 2008 Quocirca Ltd

7

Data, information or content Content generators

Create data and information © 2008 Quocirca Ltd

8

Agenda     

The need for content security The resellers dilemma The risk landscape Security policy for the business Technology - problem and solution

© 2008 Quocirca Ltd

9

The resellers dilemma

Italy Spain France Germany USA UK Canada 0%

20%

40%

General IT

60%

80%

100%

Security specialist

Research by Quocirca 2006 – types of reseller 600 reseller managers (400 Europe, 200 US/Canada) With security products in their portfolio © 2008 Quocirca Ltd

10

Revenue from IT security products and services?

10% 30% 50% 70% 90% Don't know

20% 40% 60% 80% All

Research by Quocirca 2006 – types of reseller 600 reseller managers (400 Europe, 200 US/Canada) With security products in their portfolio © 2008 Quocirca Ltd

11

Primary reseller target markets

Enterprise Mid-market SMB Small business Public sector SOHO Consumers

Research by Quocirca 2006 – types of reseller 600 reseller managers (400 Europe, 200 US/Canada) With security products in their portfolio © 2008 Quocirca Ltd

12

How strongly do you agree with the following statements?

0%

20%

40%

60%

80%

100%

Security specialists will always be needed Points solutions are best for new threats

Infrastructure vendors do not have skills IT security will become embedded 5 – Strongly agree

4

3

2

1 – Completely disagree

Research by Quocirca 2006 – types of reseller 600 reseller managers (400 Europe, 200 US/Canada) With security products in their portfolio © 2008 Quocirca Ltd

13

Impact of Microsoft entering IT security market Which statement most closely matches your view? Will continue to source IT security products from current partners Will make use of Microsoft security capabilities where we can Will continue to buy from existing suppliers when Microsoft capability is inadequate We consider that Microsoft can now cover most of our customers’ IT security requirements

0%

10%

20%

30%

40%

Research by Quocirca 2006 – types of reseller 600 reseller managers (400 Europe, 200 US/Canada) With security products in their portfolio © 2008 Quocirca Ltd

14

Where do resellers sell?

Local

National

International 0%

20%

40%

60%

80%

100%

Local expertise is a critical value add Local language Local applications Local culture © 2008 Quocirca Ltd

15

Agenda     

The need for content security The resellers dilemma The risk landscape Security policy for the business Technology - problem and solution

© 2008 Quocirca Ltd

16

Nationwide – just a laptop theft?

FSA fine: £980K

© 2008 Quocirca Ltd

17

Cost of data breach

Direct

Indirect

Theft Fines

Reputation Customer loss Share price

© 2008 Quocirca Ltd

18

Indirect costs – bad publicity

Scientist takes secret designs to competition

© 2008 Quocirca Ltd

19

Compliance and disclosure Government and EU regulations

US and other non-EU regulations

Industry regulations

Miscellaneous Non-Disclosure Agreement Software Licence Agreement

© 2008 Quocirca Ltd

20

The main sources of data leaks

Internal - Employee carelessness/stupidity and/or poor policy

Internal – Employee malice © 2008 Quocirca Ltd

External – Malware – spyware, phishing, Pharming etc.

External – Hackers

21

Causes of leaks – mostly internal

Employee oversight Poor business process Manager approved Malicious Other

Source, Symantec, Risk Assessment Findings, 2008 © 2008 Quocirca Ltd

22

Do employees implement back door solutions for IM, VoIP, web conferencing etc. 0%

10%

20%

30%

40%

Definitely Probably Possibly

No Don't know

Source, Superhighway at the Crossroads –Quocirca, September 2008 © 2008 Quocirca Ltd

23

Use of Web 2.0 technologies in businesses

Heavily Moderately Sparingly Not at all

© 2008 Quocirca Ltd

Source, Quocirca, Why Application Security is Crucial, March 2008

24

Policies and technologies for Limiting or blocking use

Yes

Working on creating them No

Source, Quocirca, Why Application Security is Crucial, March 2008 © 2008 Quocirca Ltd

25

Ignoring the insider threat

Desire to trust

Provide access

Weak policy Deny

© 2008 Quocirca Ltd

Avoid bad press

26

Malice Money Coercion Ideology

Oct 2005 © 2008 Quocirca Ltd

27

Number of organisations worldwide targeted by phishing attacks by month (March 2006 to June 2008)

Source, MarkMonitor – October 2008 © 2008 Quocirca Ltd

28

Hacking

© 2008 Quocirca Ltd

29

Agenda     

The need for content security The resellers dilemma The risk landscape Security policy for the business Technology - problem and solution

© 2008 Quocirca Ltd

30

The need for policy

Policy should: 1. Aim to prevent breaches 2. Detail how breaches are handled 3. Be reviewed date in light off • New technology • New legislation • New business processes

Services opportunity • • © 2008 Quocirca Ltd

Precede technology Justifies technology investment 31

Aim of policy

To define how people

Handle content

© 2008 Quocirca Ltd

32

Percentage saying external users are provided access to internal systems 0%

20%

40%

60%

80%

Finance Utility

Telecomms and Media Public Sector

Retail Industrial

Healthcare Contractors

Partners

Suppliers

Customers

Source, Quocirca, The Distributed Business Index, March 2008 © 2008 Quocirca Ltd

33

Standard starting points

ISO 27001

© 2008 Quocirca Ltd

34

Agenda     

The need for content security The resellers dilemma Security policy for the business The risk landscape Technology - problem and solution

© 2008 Quocirca Ltd

35

Consequences for IT security

Security

People Content

Servers and end points

Network Time © 2008 Quocirca Ltd

36

A world of risk – the need for content-filtering

Insider Corporate boundary

Outsider

© 2008 Quocirca Ltd

37

The encryption conundrum The right data needs to easy to share, with the right people and at the right time

© 2008 Quocirca Ltd

38

Managing end-points User access devices

© 2008 Quocirca Ltd

USB Mania

39

End of life

© 2008 Quocirca Ltd

40

DLP – data leak prevention

Print USB

SMTP

Policy

FTP

Web 2.0 Web Mail

© 2008 Quocirca Ltd

Blogs

HTTP

41

Conclusion Back to the resellers dilemma The content security opportunity Businesses feel a threat

They need help to understand the threat and policies to mitigate They need advice on the best technology to achieve this

© 2008 Quocirca Ltd

42

Conclusions

Thanks, this presentation will be available on www.quocirca.com

Thank you Bob Tarzey Quocirca www.quocirca.com

© 2008 Quocirca Ltd

43

Related Documents