SlideShare une entreprise Scribd logo
1  sur  24
How Adopting the Cloud Can Improve
    Your Security.

    Martin Lee CISSP CEng
    Senior Analyst

Cloud Can Improve Your Security.         1
Cloud Advantages – Customer.

       Ease of provision - register & use.


       Elastic capacity - seamless expansion.


       Resource pooling - shared costs across customer base.


       Pay-as-you-go billing - easy to budget.


       Ubiquitous - same service everywhere.




Cloud Can Improve Your Security.                               2
Cloud Advantages – Provider.


       Defined product offering – all customers use single version.


       Easy capacity planning – most customers are alike.


       Efficiencies of scale – work becomes easier.


       Network efficiencies – rare events become common.




Cloud Can Improve Your Security.                                      3
Predicted Data Growth.




                                     Year.
  Source: 2011 IDC Digital Universe Study.

Cloud Can Improve Your Security.             4
Data Breach Cost Per Record.




                                     Year.
  Source: Cost of a Data Breach, Ponemon Institute.

Cloud Can Improve Your Security.                      5
Cloud Adoption Barriers – Security.

   87% believe cloud will not
   impact or will actually improve
   their security posture.


                                   Yet, they rate security as their #1 concern.

                                   • Mass malware outbreak at your cloud provider
                                   • Hacker-based data theft from your cloud provider
                                   • Sharing sensitive data insecurely via the cloud
                                   • Rogue use of cloud leading to a data breach
                                   • Data spillage in a multi-hosted environment



  Source: State of Cloud Survey, Symantec.

Cloud Can Improve Your Security.                                                        6
Who provides better security, you or your cloud provider?




Cloud Can Improve Your Security.                                 7
Strong Incentives to Keep Cloud Operating.




    Problems can’t be hidden.




Cloud Can Improve Your Security.             8
Predicted Growth in Number of Info. Sec. Staff.




                                      Year.
  Source: The 2011 (ISC)2 Global Information Security Workforce Study.

Cloud Can Improve Your Security.                                         9
Shortage of Specialist Staff.


     ~ 600 000 info sec staff in EMEA.

     ~ 20.8 million companies in EU.




                 1 info sec professional for every 35 companies!




  Source: Annual Report on EU Small and Medium sized Enterprises 2010/2011. DG Enterprise.

Cloud Can Improve Your Security.                                                             10
Web Malware Context.




Cloud Can Improve Your Security.   11
Email Malware Context.




                         12
Growth in Malware Variants.

                                                              In 2010

                                                          ~13,300
                                                         Signatures per day




                                           Or 1 every 6.5 seconds!



                                         In 2000

                                          ~5
                                    Signatures per day




 Cloud Can Improve Your Security.                                             13
Targeted Attacks



Cloud Can Improve Your Security.   14
Characteristics of Targeted Attacks.

Targeted                                                     Non-Targeted

Attack relevant to interests of recipient                    No regard to recipient
Low copy number                                              High copy number
Bespoke malware                                              Often kit based
Obscure business model                                       Clear financial incentive



           The attackers’ aim appears to be covert gathering and transmitting of
           commercially or economically valuable information. - CPNI




 Cloud Can Improve Your Security.                                                        15
Targeted Attack – Example.




Cloud Can Improve Your Security.   16
Targeted Attack – Example.




Cloud Can Improve Your Security.   17
Symantec.cloud Targeted Attack Data.

Targeted attacks remain rare.

During 2011:

              1 in 50.07 of all customers was sent a targeted attack.

              1 in 88.93 of SMEs was sent a targeted attack.




Cloud Can Improve Your Security.                                        18
Frequency of Attack During 2011.




                                   Annual attack frequency.

Cloud Can Improve Your Security.                              19
Detecting Rare & Sophisticated Malware.



Large number of samples +
detailed analysis = better detection.




 Cloud Can Improve Your Security.          20
Choosing a Cloud Provider



Cloud Can Improve Your Security.   21
Going Cloud.


       Define your requirements.
       Define your expectations.


       Can the cloud provider fulfill?
       How will you know?
       What is their track record?


       SLA + metrics + track record.




Cloud Can Improve Your Security.         22
“We get a more robust solution … than we would be able to host for
   ourselves, and at a much more reasonable cost. We don’t have to put any
   team member’s time into it, and we don’t have to provide hardware.”

                                   David Wassenar, Vice President, IT, Apprise Software




Cloud Can Improve Your Security.                                                      23
Thank you!
    Martin Lee
    martin_lee@symantec.com
    +44 7775 823 278

     www.symanteccloud.com
    Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
    the U.S. and other countries. Other names may be trademarks of their respective owners.

    This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
    are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


Cloud Can Improve Your Security.                                                                                                                                                            24

Contenu connexe

Tendances

Cybersecurity infographic
Cybersecurity infographicCybersecurity infographic
Cybersecurity infographicCSC Australia
 
Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013 Skybox Security
 
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie AheadRethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie AheadOpenDNS
 
5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecureMedia Sonar
 
Carbon Black: Justifying the Value of Endpoint Security
Carbon Black: Justifying the Value of Endpoint SecurityCarbon Black: Justifying the Value of Endpoint Security
Carbon Black: Justifying the Value of Endpoint SecurityMighty Guides, Inc.
 
Pat Gelsinger - Welcome
Pat Gelsinger - WelcomePat Gelsinger - Welcome
Pat Gelsinger - Welcomescoopnewsgroup
 
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...OK2OK
 
Avoiding Container Vulnerabilities
Avoiding Container VulnerabilitiesAvoiding Container Vulnerabilities
Avoiding Container VulnerabilitiesMighty Guides, Inc.
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfYounesChafi1
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesMighty Guides, Inc.
 
Avoiding Limitations of Traditional Approaches to Security
Avoiding Limitations of Traditional Approaches to SecurityAvoiding Limitations of Traditional Approaches to Security
Avoiding Limitations of Traditional Approaches to SecurityMighty Guides, Inc.
 
Carbon Black: 32 Security Experts on Changing Endpoint Security - Quotes from...
Carbon Black: 32 Security Experts on Changing Endpoint Security - Quotes from...Carbon Black: 32 Security Experts on Changing Endpoint Security - Quotes from...
Carbon Black: 32 Security Experts on Changing Endpoint Security - Quotes from...Mighty Guides, Inc.
 
Enhancing Authentication to Secure the Open Enterprise
Enhancing Authentication to Secure the Open EnterpriseEnhancing Authentication to Secure the Open Enterprise
Enhancing Authentication to Secure the Open EnterpriseSymantec
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...Dana Gardner
 
RSA 2010 Kevin Rowney
RSA 2010 Kevin RowneyRSA 2010 Kevin Rowney
RSA 2010 Kevin RowneySymantec
 
Ransomware 2020 Report
Ransomware 2020 ReportRansomware 2020 Report
Ransomware 2020 ReportFortis
 
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBoltDDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBoltMazeBolt Technologies
 
Symantec Web Security Solutions
Symantec Web Security SolutionsSymantec Web Security Solutions
Symantec Web Security SolutionsSymantec
 
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsMobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsSkycure
 

Tendances (20)

Cybersecurity infographic
Cybersecurity infographicCybersecurity infographic
Cybersecurity infographic
 
Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013
 
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie AheadRethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
 
5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure
 
Carbon Black: Justifying the Value of Endpoint Security
Carbon Black: Justifying the Value of Endpoint SecurityCarbon Black: Justifying the Value of Endpoint Security
Carbon Black: Justifying the Value of Endpoint Security
 
Pat Gelsinger - Welcome
Pat Gelsinger - WelcomePat Gelsinger - Welcome
Pat Gelsinger - Welcome
 
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
 
Avoiding Container Vulnerabilities
Avoiding Container VulnerabilitiesAvoiding Container Vulnerabilities
Avoiding Container Vulnerabilities
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT Practices
 
Avoiding Limitations of Traditional Approaches to Security
Avoiding Limitations of Traditional Approaches to SecurityAvoiding Limitations of Traditional Approaches to Security
Avoiding Limitations of Traditional Approaches to Security
 
Carbon Black: 32 Security Experts on Changing Endpoint Security - Quotes from...
Carbon Black: 32 Security Experts on Changing Endpoint Security - Quotes from...Carbon Black: 32 Security Experts on Changing Endpoint Security - Quotes from...
Carbon Black: 32 Security Experts on Changing Endpoint Security - Quotes from...
 
Enhancing Authentication to Secure the Open Enterprise
Enhancing Authentication to Secure the Open EnterpriseEnhancing Authentication to Secure the Open Enterprise
Enhancing Authentication to Secure the Open Enterprise
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...
 
RSA 2010 Kevin Rowney
RSA 2010 Kevin RowneyRSA 2010 Kevin Rowney
RSA 2010 Kevin Rowney
 
7 cloud security tips
7 cloud security tips7 cloud security tips
7 cloud security tips
 
Ransomware 2020 Report
Ransomware 2020 ReportRansomware 2020 Report
Ransomware 2020 Report
 
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBoltDDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
 
Symantec Web Security Solutions
Symantec Web Security SolutionsSymantec Web Security Solutions
Symantec Web Security Solutions
 
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsMobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 Predictions
 

En vedette

PlayScience - Families and Gaming - Casual Connect Seattle 2012
PlayScience - Families and Gaming - Casual Connect Seattle  2012PlayScience - Families and Gaming - Casual Connect Seattle  2012
PlayScience - Families and Gaming - Casual Connect Seattle 2012PlayScience
 
Identifying Risk Factors for Subjects of Targeted Attack
Identifying Risk Factors for Subjects of Targeted AttackIdentifying Risk Factors for Subjects of Targeted Attack
Identifying Risk Factors for Subjects of Targeted Attackmartin_lee1969
 
Playing Big Across Generations: 5 Top Tips
Playing Big Across Generations: 5 Top TipsPlaying Big Across Generations: 5 Top Tips
Playing Big Across Generations: 5 Top TipsPlayScience
 
J. Alison Bryant - Navigating between academic and non-academic worlds
J. Alison Bryant - Navigating between academic and non-academic worldsJ. Alison Bryant - Navigating between academic and non-academic worlds
J. Alison Bryant - Navigating between academic and non-academic worldsPlayScience
 
Clustering Disparate Attacks: Mapping The Activities of The Advanced Persiste...
Clustering Disparate Attacks: Mapping The Activities of The Advanced Persiste...Clustering Disparate Attacks: Mapping The Activities of The Advanced Persiste...
Clustering Disparate Attacks: Mapping The Activities of The Advanced Persiste...martin_lee1969
 
PlayScience: 10 Things You Need to Know About Kids as Digital Learners
PlayScience: 10 Things You Need to Know About Kids as Digital LearnersPlayScience: 10 Things You Need to Know About Kids as Digital Learners
PlayScience: 10 Things You Need to Know About Kids as Digital LearnersPlayScience
 
PlayScience: 10 Predictions for the Next 10 Years of Kids' Media
PlayScience: 10 Predictions for the Next 10 Years of Kids' MediaPlayScience: 10 Predictions for the Next 10 Years of Kids' Media
PlayScience: 10 Predictions for the Next 10 Years of Kids' MediaPlayScience
 
SMBs: The Threat Ahead
SMBs: The Threat AheadSMBs: The Threat Ahead
SMBs: The Threat Aheadmartin_lee1969
 
PlayScience: Media as a prompt for play
PlayScience: Media as a prompt for playPlayScience: Media as a prompt for play
PlayScience: Media as a prompt for playPlayScience
 
Gen Z and Cause-Related / Pro-Social Branding: 8 Rules for Playing Big
Gen Z and Cause-Related / Pro-Social Branding: 8 Rules for Playing BigGen Z and Cause-Related / Pro-Social Branding: 8 Rules for Playing Big
Gen Z and Cause-Related / Pro-Social Branding: 8 Rules for Playing BigPlayScience
 
Is Information Security Worth It?
Is Information Security Worth It?Is Information Security Worth It?
Is Information Security Worth It?martin_lee1969
 
PlayScience: 10 things you need to know to PlayBig in the kids gaming space (...
PlayScience: 10 things you need to know to PlayBig in the kids gaming space (...PlayScience: 10 things you need to know to PlayBig in the kids gaming space (...
PlayScience: 10 things you need to know to PlayBig in the kids gaming space (...PlayScience
 

En vedette (12)

PlayScience - Families and Gaming - Casual Connect Seattle 2012
PlayScience - Families and Gaming - Casual Connect Seattle  2012PlayScience - Families and Gaming - Casual Connect Seattle  2012
PlayScience - Families and Gaming - Casual Connect Seattle 2012
 
Identifying Risk Factors for Subjects of Targeted Attack
Identifying Risk Factors for Subjects of Targeted AttackIdentifying Risk Factors for Subjects of Targeted Attack
Identifying Risk Factors for Subjects of Targeted Attack
 
Playing Big Across Generations: 5 Top Tips
Playing Big Across Generations: 5 Top TipsPlaying Big Across Generations: 5 Top Tips
Playing Big Across Generations: 5 Top Tips
 
J. Alison Bryant - Navigating between academic and non-academic worlds
J. Alison Bryant - Navigating between academic and non-academic worldsJ. Alison Bryant - Navigating between academic and non-academic worlds
J. Alison Bryant - Navigating between academic and non-academic worlds
 
Clustering Disparate Attacks: Mapping The Activities of The Advanced Persiste...
Clustering Disparate Attacks: Mapping The Activities of The Advanced Persiste...Clustering Disparate Attacks: Mapping The Activities of The Advanced Persiste...
Clustering Disparate Attacks: Mapping The Activities of The Advanced Persiste...
 
PlayScience: 10 Things You Need to Know About Kids as Digital Learners
PlayScience: 10 Things You Need to Know About Kids as Digital LearnersPlayScience: 10 Things You Need to Know About Kids as Digital Learners
PlayScience: 10 Things You Need to Know About Kids as Digital Learners
 
PlayScience: 10 Predictions for the Next 10 Years of Kids' Media
PlayScience: 10 Predictions for the Next 10 Years of Kids' MediaPlayScience: 10 Predictions for the Next 10 Years of Kids' Media
PlayScience: 10 Predictions for the Next 10 Years of Kids' Media
 
SMBs: The Threat Ahead
SMBs: The Threat AheadSMBs: The Threat Ahead
SMBs: The Threat Ahead
 
PlayScience: Media as a prompt for play
PlayScience: Media as a prompt for playPlayScience: Media as a prompt for play
PlayScience: Media as a prompt for play
 
Gen Z and Cause-Related / Pro-Social Branding: 8 Rules for Playing Big
Gen Z and Cause-Related / Pro-Social Branding: 8 Rules for Playing BigGen Z and Cause-Related / Pro-Social Branding: 8 Rules for Playing Big
Gen Z and Cause-Related / Pro-Social Branding: 8 Rules for Playing Big
 
Is Information Security Worth It?
Is Information Security Worth It?Is Information Security Worth It?
Is Information Security Worth It?
 
PlayScience: 10 things you need to know to PlayBig in the kids gaming space (...
PlayScience: 10 things you need to know to PlayBig in the kids gaming space (...PlayScience: 10 things you need to know to PlayBig in the kids gaming space (...
PlayScience: 10 things you need to know to PlayBig in the kids gaming space (...
 

Similaire à How Adopting the Cloud Can Improve Your Security.

The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?NTEN
 
Cloud Security - Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - IdealwareIdealware
 
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...cVidya Networks
 
The Myths of the Cloud are Holding Businesses Back
The Myths of the Cloud are Holding Businesses BackThe Myths of the Cloud are Holding Businesses Back
The Myths of the Cloud are Holding Businesses BackBen Jones
 
Should we fear the cloud?
Should we fear the cloud?Should we fear the cloud?
Should we fear the cloud?Gabe Akisanmi
 
Four Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud GenerationFour Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud GenerationAboutSSL
 
Moving Sucks. Making Secure Cloud Migration Painless
Moving Sucks. Making Secure Cloud Migration PainlessMoving Sucks. Making Secure Cloud Migration Painless
Moving Sucks. Making Secure Cloud Migration PainlessJoAnna Cheshire
 
Cyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrCyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrZYMR, INC.
 
Zymr Cybersecurity
Zymr Cybersecurity Zymr Cybersecurity
Zymr Cybersecurity Zymr Cloud
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAmazon Web Services
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Acrodex
 
Are you ready for the private cloud? [WHITEPAPER]
Are you ready for the  private cloud? [WHITEPAPER]Are you ready for the  private cloud? [WHITEPAPER]
Are you ready for the private cloud? [WHITEPAPER]KVH Co. Ltd.
 
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats -  CSA Congress, San JoseThe Notorious 9 Cloud Computing Threats -  CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats - CSA Congress, San JoseMoshe Ferber
 
Notorious 9 ciso platform moshe
Notorious 9 ciso platform  moshe Notorious 9 ciso platform  moshe
Notorious 9 ciso platform moshe Priyanka Aash
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityDell EMC World
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...Cloudflare
 
EveryCloud_Company_Intro_Piece
EveryCloud_Company_Intro_PieceEveryCloud_Company_Intro_Piece
EveryCloud_Company_Intro_PieceKeith Purves
 
EveryCloud_Company_Intro_Piece
EveryCloud_Company_Intro_PieceEveryCloud_Company_Intro_Piece
EveryCloud_Company_Intro_PiecePaul Richards
 

Similaire à How Adopting the Cloud Can Improve Your Security. (20)

The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
 
Cloud Security - Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - Idealware
 
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
 
The Myths of the Cloud are Holding Businesses Back
The Myths of the Cloud are Holding Businesses BackThe Myths of the Cloud are Holding Businesses Back
The Myths of the Cloud are Holding Businesses Back
 
Should we fear the cloud?
Should we fear the cloud?Should we fear the cloud?
Should we fear the cloud?
 
Four Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud GenerationFour Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud Generation
 
Moving Sucks. Making Secure Cloud Migration Painless
Moving Sucks. Making Secure Cloud Migration PainlessMoving Sucks. Making Secure Cloud Migration Painless
Moving Sucks. Making Secure Cloud Migration Painless
 
Cyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrCyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - Zymr
 
Zymr Cybersecurity
Zymr Cybersecurity Zymr Cybersecurity
Zymr Cybersecurity
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
 
Are you ready for the private cloud? [WHITEPAPER]
Are you ready for the  private cloud? [WHITEPAPER]Are you ready for the  private cloud? [WHITEPAPER]
Are you ready for the private cloud? [WHITEPAPER]
 
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats -  CSA Congress, San JoseThe Notorious 9 Cloud Computing Threats -  CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
 
Notorious 9 ciso platform moshe
Notorious 9 ciso platform  moshe Notorious 9 ciso platform  moshe
Notorious 9 ciso platform moshe
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in Cybersecurity
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
 
EveryCloud_Company_Intro_Piece
EveryCloud_Company_Intro_PieceEveryCloud_Company_Intro_Piece
EveryCloud_Company_Intro_Piece
 
EveryCloud_Company_Intro_Piece
EveryCloud_Company_Intro_PieceEveryCloud_Company_Intro_Piece
EveryCloud_Company_Intro_Piece
 

How Adopting the Cloud Can Improve Your Security.

  • 1. How Adopting the Cloud Can Improve Your Security. Martin Lee CISSP CEng Senior Analyst Cloud Can Improve Your Security. 1
  • 2. Cloud Advantages – Customer. Ease of provision - register & use. Elastic capacity - seamless expansion. Resource pooling - shared costs across customer base. Pay-as-you-go billing - easy to budget. Ubiquitous - same service everywhere. Cloud Can Improve Your Security. 2
  • 3. Cloud Advantages – Provider. Defined product offering – all customers use single version. Easy capacity planning – most customers are alike. Efficiencies of scale – work becomes easier. Network efficiencies – rare events become common. Cloud Can Improve Your Security. 3
  • 4. Predicted Data Growth. Year. Source: 2011 IDC Digital Universe Study. Cloud Can Improve Your Security. 4
  • 5. Data Breach Cost Per Record. Year. Source: Cost of a Data Breach, Ponemon Institute. Cloud Can Improve Your Security. 5
  • 6. Cloud Adoption Barriers – Security. 87% believe cloud will not impact or will actually improve their security posture. Yet, they rate security as their #1 concern. • Mass malware outbreak at your cloud provider • Hacker-based data theft from your cloud provider • Sharing sensitive data insecurely via the cloud • Rogue use of cloud leading to a data breach • Data spillage in a multi-hosted environment Source: State of Cloud Survey, Symantec. Cloud Can Improve Your Security. 6
  • 7. Who provides better security, you or your cloud provider? Cloud Can Improve Your Security. 7
  • 8. Strong Incentives to Keep Cloud Operating. Problems can’t be hidden. Cloud Can Improve Your Security. 8
  • 9. Predicted Growth in Number of Info. Sec. Staff. Year. Source: The 2011 (ISC)2 Global Information Security Workforce Study. Cloud Can Improve Your Security. 9
  • 10. Shortage of Specialist Staff. ~ 600 000 info sec staff in EMEA. ~ 20.8 million companies in EU. 1 info sec professional for every 35 companies! Source: Annual Report on EU Small and Medium sized Enterprises 2010/2011. DG Enterprise. Cloud Can Improve Your Security. 10
  • 11. Web Malware Context. Cloud Can Improve Your Security. 11
  • 13. Growth in Malware Variants. In 2010 ~13,300 Signatures per day Or 1 every 6.5 seconds! In 2000 ~5 Signatures per day Cloud Can Improve Your Security. 13
  • 14. Targeted Attacks Cloud Can Improve Your Security. 14
  • 15. Characteristics of Targeted Attacks. Targeted Non-Targeted Attack relevant to interests of recipient No regard to recipient Low copy number High copy number Bespoke malware Often kit based Obscure business model Clear financial incentive The attackers’ aim appears to be covert gathering and transmitting of commercially or economically valuable information. - CPNI Cloud Can Improve Your Security. 15
  • 16. Targeted Attack – Example. Cloud Can Improve Your Security. 16
  • 17. Targeted Attack – Example. Cloud Can Improve Your Security. 17
  • 18. Symantec.cloud Targeted Attack Data. Targeted attacks remain rare. During 2011: 1 in 50.07 of all customers was sent a targeted attack. 1 in 88.93 of SMEs was sent a targeted attack. Cloud Can Improve Your Security. 18
  • 19. Frequency of Attack During 2011. Annual attack frequency. Cloud Can Improve Your Security. 19
  • 20. Detecting Rare & Sophisticated Malware. Large number of samples + detailed analysis = better detection. Cloud Can Improve Your Security. 20
  • 21. Choosing a Cloud Provider Cloud Can Improve Your Security. 21
  • 22. Going Cloud. Define your requirements. Define your expectations. Can the cloud provider fulfill? How will you know? What is their track record? SLA + metrics + track record. Cloud Can Improve Your Security. 22
  • 23. “We get a more robust solution … than we would be able to host for ourselves, and at a much more reasonable cost. We don’t have to put any team member’s time into it, and we don’t have to provide hardware.” David Wassenar, Vice President, IT, Apprise Software Cloud Can Improve Your Security. 23
  • 24. Thank you! Martin Lee martin_lee@symantec.com +44 7775 823 278 www.symanteccloud.com Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Cloud Can Improve Your Security. 24

Notes de l'éditeur

  1. Clients are very excited about the benefits of SaaS