SlideShare une entreprise Scribd logo
1  sur  4
I D C               A N A L Y S T                          C O N N E C T I O N


                         Phil Hochmuth
                         Program Manager, Security Products



Considering a Move to Cloud -Based Web
Security? Answ ers to Your Top Questions
October 2012

With the rise of cloud applications and an increasingly mobile workforce, Web security that can be
delivered as a service across a global network is becoming critical in order to protect users and
ensure that policies for social media and other traffic can be enforced consistently anywhere at any
time. Along with protecting employees who are using company-owned mobile devices, enterprises
must efficiently secure an increasing number of mobile workers who are using unmanaged devices
(bring your own device, or BYOD). Cloud-based Web solutions can secure mobile users without
requiring VPN backhaul to an onsite gateway or security agents installed on clients. The worldwide
Web security market reached $1.9 billion in 2011, growing 12.1% over 2010, and IDC predicts that
the market will grow to $3.2 billion in 2016, representing an 11.2% compound annual growth rate
(CAGR) from 2011 to 2016. Web security SaaS will be the fastest-growing segment of the Web
security market. Web security SaaS will grow from $250.4 million in 2011 to $695.2 million in 2016,
representing a 22.7% CAGR. Pressure on enterprise IT security teams to secure and control
corporate data in an increasingly unmanaged endpoint environment is driving much of this market
growth; more than a third of enterprises cite data loss as their top security concern, according to
IDC's 2011 Security Survey; meanwhile, nearly two-thirds of enterprises are challenged by end users
who do not follow corporate security policies.
The following questions were posed by Blue Coat to Phil Hochmuth, program manager for IDC's
Security Products service, on behalf of Blue Coat's customers.

Q.         What are the top business or security challenges and requirements driving Web
           security SaaS adoption?

A.         One initial challenge is the general extension of the security perimeter. For most enterprises,
           the corporate boundary between the external Internet and internal networks and LANs has
           essentially dissolved as more employees are using mobile devices outside the office. This is
           a result of more people working from home as well as corporations extending to more branch
           and remote offices globally. It is more difficult to maintain the traditional network perimeter in
           these scenarios. Having a "hard wall" around employees has always been the main defense
           and control point for enterprise security. Mobile devices stretch the control zone that
           enterprises traditionally had over endpoints, often making these controls less effective or
           inefficient to implement.

           Another challenge is the explosion of social networking use. Social networking can be both a
           time-wasting tool and a productivity-enhancing tool for enterprises, depending on how it's
           used and who is using it. For example, many enterprises have official Twitter and Facebook
           accounts, and certain employees are required to access them and keep them up to date. The
           new reality in many enterprises is that employees increasingly need real-time access to


IDC 1385
social networks, both inside corporate perimeters and during off hours or from remote
     locations, and the need to ensure that corporate policies for these applications "follow the
     user" is becoming acute.

     Cloud-based security solutions can provide a more overarching and ubiquitous type of
     security service, and mobility and social network usage are two very good reasons that
     enterprises are looking at these kinds of solutions. A cloud-based solution can deliver
     consistent, universal security policies for users wherever they are located — inside the office,
     at home, or in a hotel room — at any time.

Q.   What are the top features that enterprises look for in cloud-based Web security?

A.   Scalability is key — the ability to handle lots of traffic with low latency as well as enable
     universal delivery. Enterprises need services that are always available and that provide the
     same user experience no matter where a user is located. This requires a Web security
     vendor to have a global presence in terms of datacenters for regional support as well as
     things like redundant hardware, tier 1 connectivity, and strong SLAs for each location.

     Another important feature is the ability to enforce policy controls over social media
     applications across all platforms: desktops, laptops, mobile browsers, etc. This is something
     that advanced Web security solutions are moving toward. Also, as with an on-premise Web
     security solution, a cloud-based solution must have strong bidirectional threat detection
     capabilities, including the ability to see incoming threats (i.e., viruses or malware) as well as
     outgoing threats (i.e., Botnet commands) and control traffic or sensitive data that might be
     leaving the organization through a Web channel.

     Inbound-only detection falls short of identifying data streams that could be threats. Often, this
     outbound data can be more damaging to an organization than in-bound threats; it could
     involve a compromised corporate PC sending attack traffic to another site or individual (under
     the control of cybercriminals) or an employee or an outsider intentionally sending out (or
     extracting) valuable data via the Web. As a result, having bidirectional traffic inspection
     capability is critical.

Q.   What is hybrid Web security, and what are the most important criteria enterprises
     should look for when deploying this security architecture?

A.   Hybrid Web security is a combination of on-premise Web security appliances (or virtual
     appliances) and a cloud-based Web security service. The idea is that these complementary
     technologies can protect corporate users and data regardless of device or location.
     Generally, the two platforms are used in concert, where cloud services protect mobile/remote
     workers and on-premise appliances/software protect in-office employees. The approach can
     provide broader security controls and more flexibility in terms of handling some of the
     challenges related to mobility and social networking.

     One important criterion of hybrid is the ability to create policies in a single place, a "universal
     policy," which an organization can deploy and enforce on both platforms. For example, an
     end user who accesses a social networking site on a corporate laptop, whether at the office,
     at home, or in a hotel on a business trip, would still be controlled by policies in a hybrid Web
     security scenario: When the employee is outside the perimeter, the laptop is secured by the
     cloud service; when the employee is on-premise, the laptop is secured by the gateway or
     virtual appliance.

     However, the true value of hybrid is not to simply apply the same policy everywhere. The
     ability to have policies that automatically adapt — based on the context of the end user's
     connection, location, and device — is another important aspect to consider. In the traveling


                                                  2                                            ©2012 IDC
employee scenario, when the employee moves from inside the office to a less secure
        environment, such as a hotel, the security controls might actually be adjusted. The policy
        might tighten the level of access of the employee or limit things that the employee can do
        when connecting from an unsecure location versus the corporate LAN. Having policies that
        not only can be enforced on both cloud and on-premise platforms but also can factor in the
        context of the connection and end-user activity is a differentiating capability.

        Unified reporting is also an important aspect of hybrid Web security. The ability to understand
        all corporate user activities in a single unified format, both when users are in the office and
        when they are traveling and using laptops or tablets, is an increasingly critical feature for
        Web security deployments that integrate on-premise and cloud-based Web security
        solutions.

Q.      How is the BYOD phenomenon affecting enterprise Web security, and how are IT
        security professionals reacting to it?

A.      While enterprises are just starting to understand how to secure company-issued mobile
        devices, BYOD adds an additional level of complexity. More than 40% of enterprises in IDC's
        2011 Security Survey said that the introduction of unmanaged mobile devices into their
        environments would be a top security challenge over the next year. However, enterprises are
        worried about more than just the devices; they are also concerned about what employees will
        be doing on these gadgets. Nearly 50% of enterprises cited increased sophistication of
        attacks (such as targeted attacks) as a top challenge, while nearly 60% of enterprises said
        they are worried most about employees underestimating the importance of following
        corporate security policies.

        Enterprises know they need to secure the use of devices that they do not own or control
        while considering the dual scenarios of business use and personal use of these devices.
        There is less control over these devices in general versus a traditional laptop or even a tablet
        that might have been issued by the corporation to the end users. With BYOD, enterprises are
        not able to put agents on clients, whether for antivirus, bandwidth management, Web
        security, or site monitoring tools. Organizations just don't have the access to the machines.

        In response, many organizations are looking at cloud-based Web security to control this
        situation. They see cloud as a solution to address the BYOD problem. Whether the device is
        on-premise or offsite, it can still connect to the cloud service, which will provide a level of
        security that follows the device wherever it goes. Additionally, certain advanced cloud/SaaS
        services can provide universal policy protection regardless of the type of network the device
        is attached to — on-premise LAN, unmanaged WiFi, or the employee's personal 3G/4G
        connection.

Q.      Can you talk about best practices for securing personal mobile devices?

A.      The first step many enterprises take in controlling BYOD environments is setting expectations
        as to what types of applications and tools will be made available to these devices. Not every
        internal corporate application can be feasibly delivered to all types of personal devices. A
        trade-off scenario between the end user and IT must be established; personal devices are
        fine to use, but certain restrictions or policies will be enforced.

        The same acceptable use policies for Web access and data access should be expected on
        personal mobile devices, especially when workers use these devices on corporate WiFi
        networks. Some enterprises have had success setting up tiered levels of service for BYOD,
        depending on the level of corporate control that is given to these devices. For instance, for
        completely unmanaged devices, control policies might mirror the type of access that is given
        to guests or visiting contractors — limited Internet access or even a captive portal for tracking


©2012 IDC                                          3
and auditing. Some enterprises are also deploying "containerization" strategies for corporate
         application and data access; this can involve providing access to virtual desktops on personal
         devices (such as noncorporate PCs or tablets) or deploying mobile device management
         (MDM) technologies that can provide "sealed off" access to corporate data and applications
         on personal smartphones, without allowing data to be downloaded or saved to the device.

         Even with these types of access controls and security infrastructure in place, gaps in security
         and control can occur. Enterprises can tightly control what resources personal devices can
         access on the corporate network. However, there is a blind spot in terms of what other types
         of applications and tools are running on personal devices. Applications in particular are an
         issue because end users may be using their own applications on personal mobile devices
         that are attached to a corporate WiFi network. These applications, downloaded by end users
         to their own personal devices, could be used to transmit or share sensitive files of information
         or violate corporate acceptable use policies.

         In addition, this traffic can fly under the radar of tiered access control infrastructures. A cloud-
         based Web security service can provide additional features to fill in this security "app gap"; a
         cloud-based Web security service — separate from on-LAN infrastructure controls — can
         block such applications from using the corporate network. In scenarios where BYOD
         endpoints can be configured to proxy through a cloud service, this type of protection follows
         the BYOD end user beyond the corporate network to other WiFi or cellular connections.



  A B O U T     T H I S    A N A L Y S T

  Phil Hochmuth is the program manager of IDC's Security Products service. In this role, he conducts primary research and
  provides insight and analysis on a range of enterprise security markets, including data loss prevention (DLP), information
  protection and control (IPC), messaging security, and Web security. His research also examines the convergence of these,
  and other, security technologies as enterprises address new and evolving data security challenges.




A B O U T    T H I S   P U B L I C A T I O N

This publication was produced by IDC Go-to-Market Services. The opinion, analysis, and research results presented herein
are drawn from more detailed research and analysis independently conducted and published by IDC, unless specific vendor
sponsorship is noted. IDC Go-to-Market Services makes IDC content available in a wide range of formats for distribution by
various companies. A license to distribute IDC content does not imply endorsement of or opinion about the licensee.

C O P Y R I G H T      A N D   R E S T R I C T I O N S

Any IDC information or reference to IDC that is to be used in advertising, press releases, or promotional materials requires
prior written approval from IDC. For permission requests, contact the GMS information line at 508-988-7610 or gms@idc.com.
Translation and/or localization of this document requires an additional license from IDC.

For more information on IDC, visit www.idc.com. For more information on IDC GMS, visit www.idc.com/gms.

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com




                                                             4                                                    ©2012 IDC

Contenu connexe

Tendances

New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataEMC
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareGFI Software
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...GFI Software
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveIcomm Technologies
 
2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging Threats2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging ThreatsLumension
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentK Singh
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
Strategic Information Management Through Data Classification
Strategic Information Management Through Data ClassificationStrategic Information Management Through Data Classification
Strategic Information Management Through Data ClassificationBooz Allen Hamilton
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing InvestmentsCaston Thomas
 
Securing the network perimeter
Securing the network perimeterSecuring the network perimeter
Securing the network perimeterinfra-si
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...BlackBerry
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceCourtland Smith
 
Security that works
Security that worksSecurity that works
Security that worksJames1280
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERMobiloitte
 

Tendances (20)

New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud Data
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of Bloatware
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
 
Embracing BYOD
Embracing BYODEmbracing BYOD
Embracing BYOD
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to Solve
 
2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging Threats2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging Threats
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environment
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Strategic Information Management Through Data Classification
Strategic Information Management Through Data ClassificationStrategic Information Management Through Data Classification
Strategic Information Management Through Data Classification
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Securing the network perimeter
Securing the network perimeterSecuring the network perimeter
Securing the network perimeter
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic Workforce
 
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
 
Security that works
Security that worksSecurity that works
Security that works
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
J3602068071
J3602068071J3602068071
J3602068071
 

En vedette

Laser dermatology
Laser dermatologyLaser dermatology
Laser dermatologySpringer
 
Mc collisterm resume-2016_ca
Mc collisterm resume-2016_caMc collisterm resume-2016_ca
Mc collisterm resume-2016_caMike McCollister
 
Ophelie Marek Resume
Ophelie Marek ResumeOphelie Marek Resume
Ophelie Marek ResumeOphelie Marek
 
ملف شركة نور الحجاز (2) (1)
ملف شركة نور الحجاز (2) (1)ملف شركة نور الحجاز (2) (1)
ملف شركة نور الحجاز (2) (1)Ahmad Alomari
 
St Jordi (23 d'abril)
St Jordi (23 d'abril)St Jordi (23 d'abril)
St Jordi (23 d'abril)bjunque
 
1. Shipit Smarter Concept & Functionalities (English)
1. Shipit Smarter Concept & Functionalities (English)1. Shipit Smarter Concept & Functionalities (English)
1. Shipit Smarter Concept & Functionalities (English)Pieter Nijman
 
Cryptorchidism in adults - case report
Cryptorchidism in adults - case reportCryptorchidism in adults - case report
Cryptorchidism in adults - case reportSandrina Dascalescu
 
ERP Systems on Cloud Computing
ERP Systems on Cloud ComputingERP Systems on Cloud Computing
ERP Systems on Cloud ComputingSaeid Kourehpazasl
 
Economic challenges face by Pakistan"s economy and their solutions (1)
Economic challenges face by Pakistan"s economy and their solutions (1)Economic challenges face by Pakistan"s economy and their solutions (1)
Economic challenges face by Pakistan"s economy and their solutions (1)Muhammad Zubair
 
Catalogo
CatalogoCatalogo
CatalogoNaileV
 

En vedette (15)

Laser dermatology
Laser dermatologyLaser dermatology
Laser dermatology
 
Mc collisterm resume-2016_ca
Mc collisterm resume-2016_caMc collisterm resume-2016_ca
Mc collisterm resume-2016_ca
 
Ophelie Marek Resume
Ophelie Marek ResumeOphelie Marek Resume
Ophelie Marek Resume
 
ملف شركة نور الحجاز (2) (1)
ملف شركة نور الحجاز (2) (1)ملف شركة نور الحجاز (2) (1)
ملف شركة نور الحجاز (2) (1)
 
St Jordi (23 d'abril)
St Jordi (23 d'abril)St Jordi (23 d'abril)
St Jordi (23 d'abril)
 
1. Shipit Smarter Concept & Functionalities (English)
1. Shipit Smarter Concept & Functionalities (English)1. Shipit Smarter Concept & Functionalities (English)
1. Shipit Smarter Concept & Functionalities (English)
 
How will you control your emerging supply chain risks | for the APICS' North ...
How will you control your emerging supply chain risks | for the APICS' North ...How will you control your emerging supply chain risks | for the APICS' North ...
How will you control your emerging supply chain risks | for the APICS' North ...
 
Cryptorchidism in adults - case report
Cryptorchidism in adults - case reportCryptorchidism in adults - case report
Cryptorchidism in adults - case report
 
Legislación Penal Especial
Legislación Penal EspecialLegislación Penal Especial
Legislación Penal Especial
 
ERP Systems on Cloud Computing
ERP Systems on Cloud ComputingERP Systems on Cloud Computing
ERP Systems on Cloud Computing
 
Poetic Terms
Poetic TermsPoetic Terms
Poetic Terms
 
Soberanía y democracia..
Soberanía y democracia..Soberanía y democracia..
Soberanía y democracia..
 
Economic challenges face by Pakistan"s economy and their solutions (1)
Economic challenges face by Pakistan"s economy and their solutions (1)Economic challenges face by Pakistan"s economy and their solutions (1)
Economic challenges face by Pakistan"s economy and their solutions (1)
 
Poetic techniques
Poetic techniquesPoetic techniques
Poetic techniques
 
Catalogo
CatalogoCatalogo
Catalogo
 

Similaire à IDC: Top Five Considerations for Cloud-Based Security

10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
 
I Brought My Own Device. Now What?
I Brought My Own Device. Now What?I Brought My Own Device. Now What?
I Brought My Own Device. Now What? Array Networks
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile securityJAYANT RAJURKAR
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfInfinityGroup5
 
Unique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative SolutionsUnique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative SolutionsJuniper Networks
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications Array Networks
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityТранслируем.бел
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxMarta Kusinska
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOJim Romeo
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOJim Romeo
 
Enterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptxEnterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptxsreevidyaopenteq
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-clouddrewz lin
 
Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsSecurely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsIBM Software India
 
Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...bupbechanhgmail
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondJ
 
Mobility at the network’s edge
Mobility at the network’s edgeMobility at the network’s edge
Mobility at the network’s edgeDImension Data
 

Similaire à IDC: Top Five Considerations for Cloud-Based Security (20)

10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
I Brought My Own Device. Now What?
I Brought My Own Device. Now What?I Brought My Own Device. Now What?
I Brought My Own Device. Now What?
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
Unique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative SolutionsUnique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative Solutions
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
 
Enterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptxEnterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptx
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-cloud
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsSecurely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology Innovations
 
Protecting Mobile
Protecting MobileProtecting Mobile
Protecting Mobile
 
Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyond
 
Mobility at the network’s edge
Mobility at the network’s edgeMobility at the network’s edge
Mobility at the network’s edge
 

Plus de arms8586

The Digital Universe in 2020
The Digital Universe in 2020The Digital Universe in 2020
The Digital Universe in 2020arms8586
 
The Diverse and Exploding Digital Universe
The Diverse and Exploding Digital UniverseThe Diverse and Exploding Digital Universe
The Diverse and Exploding Digital Universearms8586
 
Dell's Intelligent Data Management Strategy by IDC
Dell's Intelligent Data Management Strategy by IDCDell's Intelligent Data Management Strategy by IDC
Dell's Intelligent Data Management Strategy by IDCarms8586
 
Video Surveillance Book, 2013
Video Surveillance Book, 2013Video Surveillance Book, 2013
Video Surveillance Book, 2013arms8586
 
RightScale State of the Cloud Report 2013
RightScale State of the Cloud Report 2013RightScale State of the Cloud Report 2013
RightScale State of the Cloud Report 2013arms8586
 
Customer-centric IT - Enterprise IT trends and investment 2013
Customer-centric IT - Enterprise IT trends and investment 2013Customer-centric IT - Enterprise IT trends and investment 2013
Customer-centric IT - Enterprise IT trends and investment 2013arms8586
 
SIIA’S Vision from the Top
SIIA’S Vision from the TopSIIA’S Vision from the Top
SIIA’S Vision from the Toparms8586
 
Ten IT-enabled business trends for the decade ahead
Ten IT-enabled business trends for the decade aheadTen IT-enabled business trends for the decade ahead
Ten IT-enabled business trends for the decade aheadarms8586
 
Harness the power of Big Data
Harness the power of Big DataHarness the power of Big Data
Harness the power of Big Dataarms8586
 
Big data: The next frontier for innovation, competition, and productivity
Big data: The next frontier for innovation, competition, and productivityBig data: The next frontier for innovation, competition, and productivity
Big data: The next frontier for innovation, competition, and productivityarms8586
 
IDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis Dell
IDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis DellIDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis Dell
IDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis Dellarms8586
 
Tintri — A New Approach to Storage for Virtualization
Tintri — A New Approach to Storage for VirtualizationTintri — A New Approach to Storage for Virtualization
Tintri — A New Approach to Storage for Virtualizationarms8586
 
Worldwide Purpose Built Backup Appliance 2011-2015 Forecast and 2010 Vendor S...
Worldwide Purpose Built Backup Appliance 2011-2015 Forecast and 2010 Vendor S...Worldwide Purpose Built Backup Appliance 2011-2015 Forecast and 2010 Vendor S...
Worldwide Purpose Built Backup Appliance 2011-2015 Forecast and 2010 Vendor S...arms8586
 
Box Private Vendor Watchlist Profile: Cloud - Based Content Collaboration Ser...
Box Private Vendor Watchlist Profile: Cloud - Based Content Collaboration Ser...Box Private Vendor Watchlist Profile: Cloud - Based Content Collaboration Ser...
Box Private Vendor Watchlist Profile: Cloud - Based Content Collaboration Ser...arms8586
 
IDC Worldwide IT Cloud Services Taxonomy, 2012
IDC Worldwide IT Cloud Services Taxonomy, 2012IDC Worldwide IT Cloud Services Taxonomy, 2012
IDC Worldwide IT Cloud Services Taxonomy, 2012arms8586
 
IDC MarketScape Virtual Tape Library
IDC MarketScape Virtual Tape LibraryIDC MarketScape Virtual Tape Library
IDC MarketScape Virtual Tape Libraryarms8586
 
IDC Worldwide Software 2008-2012 Forecast Summary
IDC Worldwide Software 2008-2012 Forecast SummaryIDC Worldwide Software 2008-2012 Forecast Summary
IDC Worldwide Software 2008-2012 Forecast Summaryarms8586
 
Cloud Computing in the Midmarket: Assessing the Options
Cloud Computing in the Midmarket: Assessing the OptionsCloud Computing in the Midmarket: Assessing the Options
Cloud Computing in the Midmarket: Assessing the Optionsarms8586
 
IDC's software taxonomy, 2007
IDC's software taxonomy, 2007IDC's software taxonomy, 2007
IDC's software taxonomy, 2007arms8586
 
IDC Archiving
IDC ArchivingIDC Archiving
IDC Archivingarms8586
 

Plus de arms8586 (20)

The Digital Universe in 2020
The Digital Universe in 2020The Digital Universe in 2020
The Digital Universe in 2020
 
The Diverse and Exploding Digital Universe
The Diverse and Exploding Digital UniverseThe Diverse and Exploding Digital Universe
The Diverse and Exploding Digital Universe
 
Dell's Intelligent Data Management Strategy by IDC
Dell's Intelligent Data Management Strategy by IDCDell's Intelligent Data Management Strategy by IDC
Dell's Intelligent Data Management Strategy by IDC
 
Video Surveillance Book, 2013
Video Surveillance Book, 2013Video Surveillance Book, 2013
Video Surveillance Book, 2013
 
RightScale State of the Cloud Report 2013
RightScale State of the Cloud Report 2013RightScale State of the Cloud Report 2013
RightScale State of the Cloud Report 2013
 
Customer-centric IT - Enterprise IT trends and investment 2013
Customer-centric IT - Enterprise IT trends and investment 2013Customer-centric IT - Enterprise IT trends and investment 2013
Customer-centric IT - Enterprise IT trends and investment 2013
 
SIIA’S Vision from the Top
SIIA’S Vision from the TopSIIA’S Vision from the Top
SIIA’S Vision from the Top
 
Ten IT-enabled business trends for the decade ahead
Ten IT-enabled business trends for the decade aheadTen IT-enabled business trends for the decade ahead
Ten IT-enabled business trends for the decade ahead
 
Harness the power of Big Data
Harness the power of Big DataHarness the power of Big Data
Harness the power of Big Data
 
Big data: The next frontier for innovation, competition, and productivity
Big data: The next frontier for innovation, competition, and productivityBig data: The next frontier for innovation, competition, and productivity
Big data: The next frontier for innovation, competition, and productivity
 
IDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis Dell
IDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis DellIDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis Dell
IDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis Dell
 
Tintri — A New Approach to Storage for Virtualization
Tintri — A New Approach to Storage for VirtualizationTintri — A New Approach to Storage for Virtualization
Tintri — A New Approach to Storage for Virtualization
 
Worldwide Purpose Built Backup Appliance 2011-2015 Forecast and 2010 Vendor S...
Worldwide Purpose Built Backup Appliance 2011-2015 Forecast and 2010 Vendor S...Worldwide Purpose Built Backup Appliance 2011-2015 Forecast and 2010 Vendor S...
Worldwide Purpose Built Backup Appliance 2011-2015 Forecast and 2010 Vendor S...
 
Box Private Vendor Watchlist Profile: Cloud - Based Content Collaboration Ser...
Box Private Vendor Watchlist Profile: Cloud - Based Content Collaboration Ser...Box Private Vendor Watchlist Profile: Cloud - Based Content Collaboration Ser...
Box Private Vendor Watchlist Profile: Cloud - Based Content Collaboration Ser...
 
IDC Worldwide IT Cloud Services Taxonomy, 2012
IDC Worldwide IT Cloud Services Taxonomy, 2012IDC Worldwide IT Cloud Services Taxonomy, 2012
IDC Worldwide IT Cloud Services Taxonomy, 2012
 
IDC MarketScape Virtual Tape Library
IDC MarketScape Virtual Tape LibraryIDC MarketScape Virtual Tape Library
IDC MarketScape Virtual Tape Library
 
IDC Worldwide Software 2008-2012 Forecast Summary
IDC Worldwide Software 2008-2012 Forecast SummaryIDC Worldwide Software 2008-2012 Forecast Summary
IDC Worldwide Software 2008-2012 Forecast Summary
 
Cloud Computing in the Midmarket: Assessing the Options
Cloud Computing in the Midmarket: Assessing the OptionsCloud Computing in the Midmarket: Assessing the Options
Cloud Computing in the Midmarket: Assessing the Options
 
IDC's software taxonomy, 2007
IDC's software taxonomy, 2007IDC's software taxonomy, 2007
IDC's software taxonomy, 2007
 
IDC Archiving
IDC ArchivingIDC Archiving
IDC Archiving
 

Dernier

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 

Dernier (20)

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 

IDC: Top Five Considerations for Cloud-Based Security

  • 1. I D C A N A L Y S T C O N N E C T I O N Phil Hochmuth Program Manager, Security Products Considering a Move to Cloud -Based Web Security? Answ ers to Your Top Questions October 2012 With the rise of cloud applications and an increasingly mobile workforce, Web security that can be delivered as a service across a global network is becoming critical in order to protect users and ensure that policies for social media and other traffic can be enforced consistently anywhere at any time. Along with protecting employees who are using company-owned mobile devices, enterprises must efficiently secure an increasing number of mobile workers who are using unmanaged devices (bring your own device, or BYOD). Cloud-based Web solutions can secure mobile users without requiring VPN backhaul to an onsite gateway or security agents installed on clients. The worldwide Web security market reached $1.9 billion in 2011, growing 12.1% over 2010, and IDC predicts that the market will grow to $3.2 billion in 2016, representing an 11.2% compound annual growth rate (CAGR) from 2011 to 2016. Web security SaaS will be the fastest-growing segment of the Web security market. Web security SaaS will grow from $250.4 million in 2011 to $695.2 million in 2016, representing a 22.7% CAGR. Pressure on enterprise IT security teams to secure and control corporate data in an increasingly unmanaged endpoint environment is driving much of this market growth; more than a third of enterprises cite data loss as their top security concern, according to IDC's 2011 Security Survey; meanwhile, nearly two-thirds of enterprises are challenged by end users who do not follow corporate security policies. The following questions were posed by Blue Coat to Phil Hochmuth, program manager for IDC's Security Products service, on behalf of Blue Coat's customers. Q. What are the top business or security challenges and requirements driving Web security SaaS adoption? A. One initial challenge is the general extension of the security perimeter. For most enterprises, the corporate boundary between the external Internet and internal networks and LANs has essentially dissolved as more employees are using mobile devices outside the office. This is a result of more people working from home as well as corporations extending to more branch and remote offices globally. It is more difficult to maintain the traditional network perimeter in these scenarios. Having a "hard wall" around employees has always been the main defense and control point for enterprise security. Mobile devices stretch the control zone that enterprises traditionally had over endpoints, often making these controls less effective or inefficient to implement. Another challenge is the explosion of social networking use. Social networking can be both a time-wasting tool and a productivity-enhancing tool for enterprises, depending on how it's used and who is using it. For example, many enterprises have official Twitter and Facebook accounts, and certain employees are required to access them and keep them up to date. The new reality in many enterprises is that employees increasingly need real-time access to IDC 1385
  • 2. social networks, both inside corporate perimeters and during off hours or from remote locations, and the need to ensure that corporate policies for these applications "follow the user" is becoming acute. Cloud-based security solutions can provide a more overarching and ubiquitous type of security service, and mobility and social network usage are two very good reasons that enterprises are looking at these kinds of solutions. A cloud-based solution can deliver consistent, universal security policies for users wherever they are located — inside the office, at home, or in a hotel room — at any time. Q. What are the top features that enterprises look for in cloud-based Web security? A. Scalability is key — the ability to handle lots of traffic with low latency as well as enable universal delivery. Enterprises need services that are always available and that provide the same user experience no matter where a user is located. This requires a Web security vendor to have a global presence in terms of datacenters for regional support as well as things like redundant hardware, tier 1 connectivity, and strong SLAs for each location. Another important feature is the ability to enforce policy controls over social media applications across all platforms: desktops, laptops, mobile browsers, etc. This is something that advanced Web security solutions are moving toward. Also, as with an on-premise Web security solution, a cloud-based solution must have strong bidirectional threat detection capabilities, including the ability to see incoming threats (i.e., viruses or malware) as well as outgoing threats (i.e., Botnet commands) and control traffic or sensitive data that might be leaving the organization through a Web channel. Inbound-only detection falls short of identifying data streams that could be threats. Often, this outbound data can be more damaging to an organization than in-bound threats; it could involve a compromised corporate PC sending attack traffic to another site or individual (under the control of cybercriminals) or an employee or an outsider intentionally sending out (or extracting) valuable data via the Web. As a result, having bidirectional traffic inspection capability is critical. Q. What is hybrid Web security, and what are the most important criteria enterprises should look for when deploying this security architecture? A. Hybrid Web security is a combination of on-premise Web security appliances (or virtual appliances) and a cloud-based Web security service. The idea is that these complementary technologies can protect corporate users and data regardless of device or location. Generally, the two platforms are used in concert, where cloud services protect mobile/remote workers and on-premise appliances/software protect in-office employees. The approach can provide broader security controls and more flexibility in terms of handling some of the challenges related to mobility and social networking. One important criterion of hybrid is the ability to create policies in a single place, a "universal policy," which an organization can deploy and enforce on both platforms. For example, an end user who accesses a social networking site on a corporate laptop, whether at the office, at home, or in a hotel on a business trip, would still be controlled by policies in a hybrid Web security scenario: When the employee is outside the perimeter, the laptop is secured by the cloud service; when the employee is on-premise, the laptop is secured by the gateway or virtual appliance. However, the true value of hybrid is not to simply apply the same policy everywhere. The ability to have policies that automatically adapt — based on the context of the end user's connection, location, and device — is another important aspect to consider. In the traveling 2 ©2012 IDC
  • 3. employee scenario, when the employee moves from inside the office to a less secure environment, such as a hotel, the security controls might actually be adjusted. The policy might tighten the level of access of the employee or limit things that the employee can do when connecting from an unsecure location versus the corporate LAN. Having policies that not only can be enforced on both cloud and on-premise platforms but also can factor in the context of the connection and end-user activity is a differentiating capability. Unified reporting is also an important aspect of hybrid Web security. The ability to understand all corporate user activities in a single unified format, both when users are in the office and when they are traveling and using laptops or tablets, is an increasingly critical feature for Web security deployments that integrate on-premise and cloud-based Web security solutions. Q. How is the BYOD phenomenon affecting enterprise Web security, and how are IT security professionals reacting to it? A. While enterprises are just starting to understand how to secure company-issued mobile devices, BYOD adds an additional level of complexity. More than 40% of enterprises in IDC's 2011 Security Survey said that the introduction of unmanaged mobile devices into their environments would be a top security challenge over the next year. However, enterprises are worried about more than just the devices; they are also concerned about what employees will be doing on these gadgets. Nearly 50% of enterprises cited increased sophistication of attacks (such as targeted attacks) as a top challenge, while nearly 60% of enterprises said they are worried most about employees underestimating the importance of following corporate security policies. Enterprises know they need to secure the use of devices that they do not own or control while considering the dual scenarios of business use and personal use of these devices. There is less control over these devices in general versus a traditional laptop or even a tablet that might have been issued by the corporation to the end users. With BYOD, enterprises are not able to put agents on clients, whether for antivirus, bandwidth management, Web security, or site monitoring tools. Organizations just don't have the access to the machines. In response, many organizations are looking at cloud-based Web security to control this situation. They see cloud as a solution to address the BYOD problem. Whether the device is on-premise or offsite, it can still connect to the cloud service, which will provide a level of security that follows the device wherever it goes. Additionally, certain advanced cloud/SaaS services can provide universal policy protection regardless of the type of network the device is attached to — on-premise LAN, unmanaged WiFi, or the employee's personal 3G/4G connection. Q. Can you talk about best practices for securing personal mobile devices? A. The first step many enterprises take in controlling BYOD environments is setting expectations as to what types of applications and tools will be made available to these devices. Not every internal corporate application can be feasibly delivered to all types of personal devices. A trade-off scenario between the end user and IT must be established; personal devices are fine to use, but certain restrictions or policies will be enforced. The same acceptable use policies for Web access and data access should be expected on personal mobile devices, especially when workers use these devices on corporate WiFi networks. Some enterprises have had success setting up tiered levels of service for BYOD, depending on the level of corporate control that is given to these devices. For instance, for completely unmanaged devices, control policies might mirror the type of access that is given to guests or visiting contractors — limited Internet access or even a captive portal for tracking ©2012 IDC 3
  • 4. and auditing. Some enterprises are also deploying "containerization" strategies for corporate application and data access; this can involve providing access to virtual desktops on personal devices (such as noncorporate PCs or tablets) or deploying mobile device management (MDM) technologies that can provide "sealed off" access to corporate data and applications on personal smartphones, without allowing data to be downloaded or saved to the device. Even with these types of access controls and security infrastructure in place, gaps in security and control can occur. Enterprises can tightly control what resources personal devices can access on the corporate network. However, there is a blind spot in terms of what other types of applications and tools are running on personal devices. Applications in particular are an issue because end users may be using their own applications on personal mobile devices that are attached to a corporate WiFi network. These applications, downloaded by end users to their own personal devices, could be used to transmit or share sensitive files of information or violate corporate acceptable use policies. In addition, this traffic can fly under the radar of tiered access control infrastructures. A cloud- based Web security service can provide additional features to fill in this security "app gap"; a cloud-based Web security service — separate from on-LAN infrastructure controls — can block such applications from using the corporate network. In scenarios where BYOD endpoints can be configured to proxy through a cloud service, this type of protection follows the BYOD end user beyond the corporate network to other WiFi or cellular connections. A B O U T T H I S A N A L Y S T Phil Hochmuth is the program manager of IDC's Security Products service. In this role, he conducts primary research and provides insight and analysis on a range of enterprise security markets, including data loss prevention (DLP), information protection and control (IPC), messaging security, and Web security. His research also examines the convergence of these, and other, security technologies as enterprises address new and evolving data security challenges. A B O U T T H I S P U B L I C A T I O N This publication was produced by IDC Go-to-Market Services. The opinion, analysis, and research results presented herein are drawn from more detailed research and analysis independently conducted and published by IDC, unless specific vendor sponsorship is noted. IDC Go-to-Market Services makes IDC content available in a wide range of formats for distribution by various companies. A license to distribute IDC content does not imply endorsement of or opinion about the licensee. C O P Y R I G H T A N D R E S T R I C T I O N S Any IDC information or reference to IDC that is to be used in advertising, press releases, or promotional materials requires prior written approval from IDC. For permission requests, contact the GMS information line at 508-988-7610 or gms@idc.com. Translation and/or localization of this document requires an additional license from IDC. For more information on IDC, visit www.idc.com. For more information on IDC GMS, visit www.idc.com/gms. Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com 4 ©2012 IDC