SlideShare une entreprise Scribd logo
1  sur  15
Télécharger pour lire hors ligne
In Search of New Streams Parviz Iskhakov
March, 2016
The Digital Telecom Security Services
• Growth in traditional telecom in developed and
developing markets is stagnant with declining ARPU and
prices.
• The OTT players are long affecting CSPs by substituting
voice and messaging services, placing significant strain on
the CSP data networks and grabbing consumer mind
share, and thus weakening the CSPs’ relationship with
their user communities.
• Thus, CSPs find themselves under increasing pressure, they
not only want to protect their core business and their
relationship with consumers, but have to seek new revenue
opportunities in nontraditional markets.
• CSPs are beginning to partner with alternative partner types
to fill gaps in their service portfolios and accelerate the time
to market of new services. In contrast to aggressive,
competitive and alienating tactics to address OTT vendor
threats, CSPs can benefit substantially from pursuing these
more collaborative approaches.
SMS and OTT Messages
New Digital Domains CSPs are Focusing on
The figure is approximate and is
based on Gartner’s research
- Market trends: Eight
innovative CSPs embark on
digital service
transformation
- CSPs’ market trends and
digital transformation
strategy
82%of U.S. business executives are
worried that cyber threats could
impact their companies’ growth
prospects
10%of organizations are fully
confident that their connected
devices secure
Source: AT&T
Security in the Smartphone Era
• Market research firm Gartner says global spending on IT security is set to
increase 4.7 percent in 2015 to $75.4 billion, and the world will spend $101
billion on information security in 2018.
• The cyber security market is estimated to grow to $170 billion (USD) by 2020, at
a Compound Annual Growth Rate (CAGR) of 9.8 percent from 2015 to 2020,
according to a report from Markets and Markets. The aerospace, defense, and
intelligence vertical continues to be the largest contributor to cybersecurity
solutions.
$101 Bn
IT Security
Spendings
$170 Bn
Market
• The British insurance company Lloyd’s estimates that cyber attacks cost
businesses as much as $400 billion a year, which includes direct damage plus
post-attack disruption to the normal course of business. Some vendor and media
forecasts put the cybercrime figure as high as $500 billion and more.
• Сyberattacks could cost up to $90 trillion by 2030 if cybersecurity fails to
advance at a rapid pace. Atlantic Council and the Zurich Insurance Group
$90 Tn
Damage till 2030
$400 Bn
Damage a year
Security Concerns Rise Across the World with Rise
of Scale of Cyber Threats
TechSci Research says the banking and financial
services sector has been the prime target of
cyber criminals over the last five years, followed
by IT & telecom, defense, and the oil and gas
sector.
No vendor or user of computer technology is
immune from a potential cyber security incident
The Essential Guide to Industrial Cyber Security, Honeywell
Recent large-scale cases include Sony’s breach,
attacks on Lenovo and other companies such
as JPMorgan Chase and Home Depot.
Most businesses think they are too small to be
the victims of a cyber attack. But that is not the
case since they are victims of hacking either for
their own data or because they are the weakest
point of entry in a digital information supply chain.
Days of Just Securing the Perimeter are Over
• Wireline operators tend to suffer the greater
exposure, particularly when they host IT
infrastructure or provide managed security
services for enterprise customers.
• So do mobile operators with their huge customer
bases. CSP’s customers are exposed to data
exfiltration, denial of service, fraud and all the
other attack vectors.
• Cloud and IoT services significant growth is
putting even more pressure on service providers
that have to craft their strategies in the age of
cyber insecurity.
It’s Time for the Secure Pipe
• The standard service-level agreement for years allowed
that CSPs just push the traffic in and out. To pass traffic,
not pass judgment. CSPs didn’t usually touch it.
• Some CSPs however has been quietly getting permission
from its customers to stop certain kinds of traffic altogether.
Number of businesses have signed up to have the CSP to
filter out spam, viruses, DDoS attacks and other malicious
activity behind the scenes, before the traffic touches their
enterprises.
• The “productization” of security services will take time
though to catch up with vertical leaders. The final task will
be the “clean pipe” with fewer risks with a bill attached. This
will force transformation from “dumb pipe” to smart one.
CSP’s Security Services Portfolio
92%of the 100K security incidents
studied from the past ten years
can be described by just nine
basic patterns
1. POINT OF SALE INTRUSIONS
2. DENIAL OF SERVICE ATTACKS
3. CRIMEWARE
4. WEB APPLICATION ATTACKS
5. INSIDER MISUSE
6. MISCELLANIOUS ERRORS
7. PHYSICAL THEFT/LOSS
8. CARD SKIMMERS
Source: Verizon
Mobility and End-
Point Security
Hybrid cloud
security
Next Generation
Perimeter Solutions
Application Threat
Protection
Advanced Malware
Protection
Discovery Security
Analytics
Social Engineering
Protect the network and endpoints from both known and zero-day malware
The ability to protect hybrid cloud environments and identity business risks
associated with SaaS usage
Deploying next generation network perimeter solutions to identify and mitigate
application threats
Detect and remediate application vulnerabilities and prevent malicious hacks and
attacks
State-of-the-art sandboxing technology helping protect against hacks that bypass
signature-based controls
Correlating a diverse set of security, network and application event data to improve
understanding of normal and discover first seen problems – the unknown unknown
Ensuring adequate security awareness in-house and appropriate procedures in
place
CSPs Security Services Value Chain
• Endpoint Security
(including mobile security)
• Server Security
• E-mail Security
• Network Security
• Cloud Security
• Anti-Phishing, Anti-
malware, Antivirus
• Perimeter Solutions
• Application Security
• Security Analytics
• Monitored or managed firewalls or
intrusion prevention systems (IDS/IPS)
• Cloud, mobile and web assets (DDoS
protection, email security, web filtering)
• Security information and event
management (SIEM)
• Need more advanced services such as
real-time and batch security analytics
• Reporting associated with
monitored/managed devices and
incident response
• Security compliance
and consulting
services
• Security design and
architechture services
• Security audit and
assessment services
• Professional services
• Managed services
• Cyberdefence
solutions
Point Products Managed Security Services
Information Security
Consulting Services
Consumer
Ad hoc Security
Services
Security Services
Bundle
Network Security
Services
Fully Managed
Security Environment
Level of
Strategic
Partnership
with the
Customer
Why MSSP solutions are good for Businesses?
• Managed security services are the network security services that have been outsourced to a service
provider. A company providing such a service is a managed security service provider (MSSP).
• According to recent industry research, most organizations (74%) manage IT security in-house, but 82%
of IT professionals said they have either already partnered with, or plan to partner with, a managed
security service provider.
• MSSPs offer better resources, scalability, and talent - all for a cheaper price. So cost is the major
reason. Chief Information Security Officers looking to security services cite cost reduction as a top
factor, with 62% of CISOs listing this as an important or very important reason.
• Other important issues include flexibility, expertise, global coverage and advanced technology.
• CISOs want trusted, strategic partners. Information security is an activity built on trust. MSSPs that
understand this develop strong supporting partnerships with their clients and help them overcome their
biggest security challenges.
• Forrester believes that the relationship between CISOs and MSSPs will continue to deepen. As the
MSSP demonstrates competency and even proficiency in certain areas, the partnership will quickly
develop from an ad hoc relationship to a fully managed security IT environment.
• Advanced technologies, such as threat intelligence and correlation, drive future demand.
Sophistication of new threat intelligence technology to detect intrusions with a rapidly changing threat
landscape discover a need for solutions capable of detecting suspicious activity and need to receive
alerts in near real time. Forrester believes those MSSPs that get this right will have a huge advantage
in the market during the next two to five years
Trust
Global
Coverage Flexibility
Cost
Real-time
Detection
Advanced
Technology
82%Of Chief Information and
Security Officers partnered or
plan to partner with MSSPs
Why MSSP solutions are good for Businesses?
Source: Trustwave
Global Leading CSPs Clearly Show the Potential for
CSPs in Security Domain
• Verizon is a top telecommunications provider with a very large North American
presence, with more than 2,000 unique clients in the region. Verizon employs one of
the largest security teams in the market with an aggressive recruiting strategy.
• Verizon emphasizes the business value and cost-controlling aspects that it delivers
through managed security services and helps clients allocate resources to the most
critical assets through its enhanced risk-based correlation engine.
As a large, North American telecommunications provider, AT&T has one of the largest
customer bases, with more than 1,200 unique customers in the region. AT&T has an
aggressive threat intelligence program and scans more than 25 petabytes of data
travelling over its networks daily. AT&T focuses on threat detection with strong network
infrastructure and perimeter defense offerings, including robust log monitoring and
analysis features. Areas of improvement were its customer portal and reporting features.
• BT's MSS offerings include monitoring and management of customer premises
deployed devices and network-based security controls as part of its larger portfolio of
telecommunications and IT services. BT uses self-developed technology for log and
event collection, correlation, query, reporting, and device management.
• NTT has a global presence as well as a broad range of security service
offerings and delivery options, in addition to broader telecommunications and
IT infrastructure service offerings.
• Headquartered in Paris, with offices in Atlanta and Singapore, Orange offers a broad
range of telecommunications and cloud-based IT infrastructure services, security
consulting and integration services, and MSSs. Orange MSSs are based on
commercial SIEM technology for data collection, correlation and analysis, reporting,
and log management, with self-developed technology for workflow.
Gartner
Forrester Wave: Information Security Consulting Services, Q1 ‘13
But Still Much in CSPs To-Do-List to Gain Leadership in
Information Security Consulting Services Though
Only two CSPs were included in Forrester Wave Information Security Consulting Services.
• Verizon demonstrates strong incident response skills, but lack of global coverage is
restrictive.
• Verizon has battled to gain brand awareness within the security consultancy space and
has succeeded thanks to its incident analysis and strong PCI practice. Although some of
the company’s higher-level solutions (for GRC and strategy, for example) may not be as
sophisticated as those of larger competitors.
• The company does offer a wide range of solutions, including strong offerings in
application security, biometrics, DLP, and IAM, many of which it will also subsequently
operate.
• Client feedback stressed the flexibility of the Verizon consultants and its strength in
incident response; areas of potential improvement included Verizon’s comparatively low
number of consultants (just over 400) and weak global coverage, as well as challenges
with internal collaboration and communication.
• BT Global Services delivers pragmatic solutions, with a focus on technology.
• BT was the other organization that stood out because of its unique perspective and
approach to client engagement; the company’s spokespeople come across as very
honest and candid, suggesting that clients are likely to receive straightforward advice,
even if it meant BT recommending a course of action that BT could not support.
• BT focuses on the delivery of predefined security service packages and does not offer
regulatory- or compliance-related services.
• Although BT’s staff is relatively small and inexperienced (with an average of fewer than
five years of experience), the company has a strong presence in the UK and continental
Europe.
• BT plays to these strengths, ensuring that the customers receive high-value consulting
using strong security technology solutions.
Forrester Wave: Information Security Consulting Services, Q1 ‘13
Approaches to Unlocking the Cyber Security
Potential
Build
Buy
• Orange – Atheos
• Singtel – Trustwave
• Telstra – Bridgepoint and O2 networks
• Telstra – Docusign
• Telefonica - Blueliv
• DT – Cyphercloud, Zenguard, Lockout
• Network Security – Fortinet, F-Secure
• Endpoint Security – Lookout, McAfee,
Symantec
• Cloud Security – Symantec, Akamai
• Cyberdefence – FireEye, AllienVault
• Professional Services – IBM, HP
CAPEX
consumption
OPEX
consumption
Time-to-Market
Partner
Market Cases
Security Services Portfolio and Partnerships
leveraged. AT&T Case
• AT&T has partnered with Cisco for the home
controller, plus other specialist vendors for service,
components, and installation. Service Innovation
Digital Life is AT&T’s new consumer
home security and home automation service.
• AT&T partners with Juniper for Mobile Security. It
will help to manage personal or enterprise-owned
devices, enable anti-virus, anti-malware, and
application monitoring and control.
• At the center of AT&T's partnership with AWS is its
NetBond offering, which the company describes as
a "network-enabled cloud solution.
• AT&T also partners with security app provider
Lookout in order to protect AT&T Android devices
from app-based threats. Lookout's
Mobile Security software is expected to be installed
on most AT&T Android phones moving forward.
• AT&T Government Solutions selected Aviat
Networks as its microwave communications partner.
AT&T Government Solutions is a proven solutions
integrator, with expertise in areas such as
Cyber Security, Network Solutions, Application.
AT&T Security Services Portfolio
The Digital Telecom Security Services
In Search of New Streams
Thank you!
Should you have any questions or feedback please contact me,
Parviz.Iskhakov@gmail.com

Contenu connexe

Tendances

150 0046-001 cost-lte_outages_industryinsights_final
150 0046-001 cost-lte_outages_industryinsights_final150 0046-001 cost-lte_outages_industryinsights_final
150 0046-001 cost-lte_outages_industryinsights_final
Terry Young
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
Rachel Anne Carter
 
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Michael Bunn
 

Tendances (19)

150 0046-001 cost-lte_outages_industryinsights_final
150 0046-001 cost-lte_outages_industryinsights_final150 0046-001 cost-lte_outages_industryinsights_final
150 0046-001 cost-lte_outages_industryinsights_final
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
Telecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoTTelecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoT
 
ICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber security
 
Threat Intelligence Market
Threat Intelligence MarketThreat Intelligence Market
Threat Intelligence Market
 
Whitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco IndustryWhitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco Industry
 
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
 
2015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i32015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i3
 
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
 
2019 Cyber Security Trends
2019 Cyber Security Trends2019 Cyber Security Trends
2019 Cyber Security Trends
 
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
 
Creating a fuzzer for telecom protocol 4G LTE case study
Creating a fuzzer for telecom protocol 4G LTE case studyCreating a fuzzer for telecom protocol 4G LTE case study
Creating a fuzzer for telecom protocol 4G LTE case study
 
2019 State of Cyber Security Report
2019 State of Cyber Security Report2019 State of Cyber Security Report
2019 State of Cyber Security Report
 
Signaling security essentials. Ready, steady, 5G!
 Signaling security essentials. Ready, steady, 5G! Signaling security essentials. Ready, steady, 5G!
Signaling security essentials. Ready, steady, 5G!
 
The State of Cyber
The State of CyberThe State of Cyber
The State of Cyber
 
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
 
The State of Ransomware 2020
The State of Ransomware 2020The State of Ransomware 2020
The State of Ransomware 2020
 
Webinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWebinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking Apps
 

En vedette

Domingo 6.Pascua.
Domingo 6.Pascua.Domingo 6.Pascua.
Domingo 6.Pascua.
ayo05
 
Mentors Facilitating The Success Of Disadvantaged Students
Mentors Facilitating The Success Of Disadvantaged StudentsMentors Facilitating The Success Of Disadvantaged Students
Mentors Facilitating The Success Of Disadvantaged Students
Clayton State University
 
Ensuring optimised design, successful migration and safety compliant systems
Ensuring optimised design, successful migration and safety compliant systemsEnsuring optimised design, successful migration and safety compliant systems
Ensuring optimised design, successful migration and safety compliant systems
Torben Haagh
 
COMENTARIOS AL CODIGO CIVIL SOBRE DESALOJO INQUILINO MOROSO
COMENTARIOS AL CODIGO CIVIL SOBRE DESALOJO INQUILINO MOROSOCOMENTARIOS AL CODIGO CIVIL SOBRE DESALOJO INQUILINO MOROSO
COMENTARIOS AL CODIGO CIVIL SOBRE DESALOJO INQUILINO MOROSO
MARC GUILLERMO ARMAS
 
El pez payaso
El pez payasoEl pez payaso
El pez payaso
martepol
 
A criatividade com a literatura infanto juvenil - jose eduardo gallo
A criatividade com a literatura infanto juvenil - jose eduardo galloA criatividade com a literatura infanto juvenil - jose eduardo gallo
A criatividade com a literatura infanto juvenil - jose eduardo gallo
Andrezza Belota Lopes Machado
 
Calendario de actividades 21 de septiembre
Calendario de actividades 21 de septiembreCalendario de actividades 21 de septiembre
Calendario de actividades 21 de septiembre
RLN_rn
 
4 manual identidad-corporativa_era7
4  manual identidad-corporativa_era74  manual identidad-corporativa_era7
4 manual identidad-corporativa_era7
Guillermo Nanni
 

En vedette (20)

The Digital Telecom. Internet of Things
The Digital Telecom. Internet of ThingsThe Digital Telecom. Internet of Things
The Digital Telecom. Internet of Things
 
The Digital Telecom. Security Services
The Digital Telecom. Security ServicesThe Digital Telecom. Security Services
The Digital Telecom. Security Services
 
Presentacion qwds 2012 ii
Presentacion qwds 2012 ii Presentacion qwds 2012 ii
Presentacion qwds 2012 ii
 
Suplemento univ austral marzo 2013
Suplemento univ austral marzo 2013Suplemento univ austral marzo 2013
Suplemento univ austral marzo 2013
 
Domingo 6.Pascua.
Domingo 6.Pascua.Domingo 6.Pascua.
Domingo 6.Pascua.
 
What's your BYOD Strategy? Objectives and tips from Microsoft & Aptera
What's your BYOD Strategy? Objectives and tips from Microsoft & ApteraWhat's your BYOD Strategy? Objectives and tips from Microsoft & Aptera
What's your BYOD Strategy? Objectives and tips from Microsoft & Aptera
 
Mentors Facilitating The Success Of Disadvantaged Students
Mentors Facilitating The Success Of Disadvantaged StudentsMentors Facilitating The Success Of Disadvantaged Students
Mentors Facilitating The Success Of Disadvantaged Students
 
NOTCH Magazine Issues its 9th Edition with Aamir Khan on its cover
NOTCH Magazine Issues its 9th Edition with Aamir Khan on its coverNOTCH Magazine Issues its 9th Edition with Aamir Khan on its cover
NOTCH Magazine Issues its 9th Edition with Aamir Khan on its cover
 
Fortunewest Business Development
Fortunewest Business DevelopmentFortunewest Business Development
Fortunewest Business Development
 
Buena gobernanza en las políticas digitales. Cómo maximizar el potencial de l...
Buena gobernanza en las políticas digitales. Cómo maximizar el potencial de l...Buena gobernanza en las políticas digitales. Cómo maximizar el potencial de l...
Buena gobernanza en las políticas digitales. Cómo maximizar el potencial de l...
 
Ensuring optimised design, successful migration and safety compliant systems
Ensuring optimised design, successful migration and safety compliant systemsEnsuring optimised design, successful migration and safety compliant systems
Ensuring optimised design, successful migration and safety compliant systems
 
Weed
Weed Weed
Weed
 
COMENTARIOS AL CODIGO CIVIL SOBRE DESALOJO INQUILINO MOROSO
COMENTARIOS AL CODIGO CIVIL SOBRE DESALOJO INQUILINO MOROSOCOMENTARIOS AL CODIGO CIVIL SOBRE DESALOJO INQUILINO MOROSO
COMENTARIOS AL CODIGO CIVIL SOBRE DESALOJO INQUILINO MOROSO
 
El pez payaso
El pez payasoEl pez payaso
El pez payaso
 
A criatividade com a literatura infanto juvenil - jose eduardo gallo
A criatividade com a literatura infanto juvenil - jose eduardo galloA criatividade com a literatura infanto juvenil - jose eduardo gallo
A criatividade com a literatura infanto juvenil - jose eduardo gallo
 
Λατινικά, ενότητα 20
Λατινικά, ενότητα 20Λατινικά, ενότητα 20
Λατινικά, ενότητα 20
 
Calendario de actividades 21 de septiembre
Calendario de actividades 21 de septiembreCalendario de actividades 21 de septiembre
Calendario de actividades 21 de septiembre
 
4 manual identidad-corporativa_era7
4  manual identidad-corporativa_era74  manual identidad-corporativa_era7
4 manual identidad-corporativa_era7
 
Representantes y representados: ¿cómo interaccionan en salud laboral?
Representantes y representados: ¿cómo interaccionan en salud laboral?Representantes y representados: ¿cómo interaccionan en salud laboral?
Representantes y representados: ¿cómo interaccionan en salud laboral?
 
Disrupting Aged Care: A Design Manifesto for Change
Disrupting Aged Care: A Design Manifesto for ChangeDisrupting Aged Care: A Design Manifesto for Change
Disrupting Aged Care: A Design Manifesto for Change
 

Similaire à The Digital Telecom. Security Services

Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_Adams
Julius Adams
 
CyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalCyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) final
RobertPike
 

Similaire à The Digital Telecom. Security Services (20)

Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence report
 
empowering your business with top-notch cybersecurity services.pdf
empowering your business with top-notch cybersecurity services.pdfempowering your business with top-notch cybersecurity services.pdf
empowering your business with top-notch cybersecurity services.pdf
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
 
Csa summit la transformación digital y el nuevo rol del ciso
Csa summit   la transformación digital y el nuevo rol del cisoCsa summit   la transformación digital y el nuevo rol del ciso
Csa summit la transformación digital y el nuevo rol del ciso
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_Adams
 
"Navigating the Cybersecurity Landscape: Identifying Your Ideal Service Provi...
"Navigating the Cybersecurity Landscape: Identifying Your Ideal Service Provi..."Navigating the Cybersecurity Landscape: Identifying Your Ideal Service Provi...
"Navigating the Cybersecurity Landscape: Identifying Your Ideal Service Provi...
 
MFX Cybersecurity Services flyer
MFX Cybersecurity Services flyerMFX Cybersecurity Services flyer
MFX Cybersecurity Services flyer
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
Untitled document.otd
Untitled document.otdUntitled document.otd
Untitled document.otd
 
Optiv Security Award Write Up
Optiv Security Award Write UpOptiv Security Award Write Up
Optiv Security Award Write Up
 
EMC Perspective: What Customers Seek from Cloud Services Providers
EMC Perspective: What Customers Seek from Cloud Services ProvidersEMC Perspective: What Customers Seek from Cloud Services Providers
EMC Perspective: What Customers Seek from Cloud Services Providers
 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White Paper
 
Qradar Business Case
Qradar Business CaseQradar Business Case
Qradar Business Case
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
CyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalCyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) final
 
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
GramaxCybersec_Cybersecurity Trends 2024.pdf
GramaxCybersec_Cybersecurity Trends 2024.pdfGramaxCybersec_Cybersecurity Trends 2024.pdf
GramaxCybersec_Cybersecurity Trends 2024.pdf
 
Digital Transformation Requires a "Subscriber-First" Approach
Digital Transformation Requires a "Subscriber-First" ApproachDigital Transformation Requires a "Subscriber-First" Approach
Digital Transformation Requires a "Subscriber-First" Approach
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

The Digital Telecom. Security Services

  • 1. In Search of New Streams Parviz Iskhakov March, 2016 The Digital Telecom Security Services
  • 2. • Growth in traditional telecom in developed and developing markets is stagnant with declining ARPU and prices. • The OTT players are long affecting CSPs by substituting voice and messaging services, placing significant strain on the CSP data networks and grabbing consumer mind share, and thus weakening the CSPs’ relationship with their user communities. • Thus, CSPs find themselves under increasing pressure, they not only want to protect their core business and their relationship with consumers, but have to seek new revenue opportunities in nontraditional markets. • CSPs are beginning to partner with alternative partner types to fill gaps in their service portfolios and accelerate the time to market of new services. In contrast to aggressive, competitive and alienating tactics to address OTT vendor threats, CSPs can benefit substantially from pursuing these more collaborative approaches. SMS and OTT Messages
  • 3. New Digital Domains CSPs are Focusing on The figure is approximate and is based on Gartner’s research - Market trends: Eight innovative CSPs embark on digital service transformation - CSPs’ market trends and digital transformation strategy 82%of U.S. business executives are worried that cyber threats could impact their companies’ growth prospects 10%of organizations are fully confident that their connected devices secure Source: AT&T
  • 4. Security in the Smartphone Era • Market research firm Gartner says global spending on IT security is set to increase 4.7 percent in 2015 to $75.4 billion, and the world will spend $101 billion on information security in 2018. • The cyber security market is estimated to grow to $170 billion (USD) by 2020, at a Compound Annual Growth Rate (CAGR) of 9.8 percent from 2015 to 2020, according to a report from Markets and Markets. The aerospace, defense, and intelligence vertical continues to be the largest contributor to cybersecurity solutions. $101 Bn IT Security Spendings $170 Bn Market • The British insurance company Lloyd’s estimates that cyber attacks cost businesses as much as $400 billion a year, which includes direct damage plus post-attack disruption to the normal course of business. Some vendor and media forecasts put the cybercrime figure as high as $500 billion and more. • Сyberattacks could cost up to $90 trillion by 2030 if cybersecurity fails to advance at a rapid pace. Atlantic Council and the Zurich Insurance Group $90 Tn Damage till 2030 $400 Bn Damage a year
  • 5. Security Concerns Rise Across the World with Rise of Scale of Cyber Threats TechSci Research says the banking and financial services sector has been the prime target of cyber criminals over the last five years, followed by IT & telecom, defense, and the oil and gas sector. No vendor or user of computer technology is immune from a potential cyber security incident The Essential Guide to Industrial Cyber Security, Honeywell Recent large-scale cases include Sony’s breach, attacks on Lenovo and other companies such as JPMorgan Chase and Home Depot. Most businesses think they are too small to be the victims of a cyber attack. But that is not the case since they are victims of hacking either for their own data or because they are the weakest point of entry in a digital information supply chain.
  • 6. Days of Just Securing the Perimeter are Over • Wireline operators tend to suffer the greater exposure, particularly when they host IT infrastructure or provide managed security services for enterprise customers. • So do mobile operators with their huge customer bases. CSP’s customers are exposed to data exfiltration, denial of service, fraud and all the other attack vectors. • Cloud and IoT services significant growth is putting even more pressure on service providers that have to craft their strategies in the age of cyber insecurity.
  • 7. It’s Time for the Secure Pipe • The standard service-level agreement for years allowed that CSPs just push the traffic in and out. To pass traffic, not pass judgment. CSPs didn’t usually touch it. • Some CSPs however has been quietly getting permission from its customers to stop certain kinds of traffic altogether. Number of businesses have signed up to have the CSP to filter out spam, viruses, DDoS attacks and other malicious activity behind the scenes, before the traffic touches their enterprises. • The “productization” of security services will take time though to catch up with vertical leaders. The final task will be the “clean pipe” with fewer risks with a bill attached. This will force transformation from “dumb pipe” to smart one.
  • 8. CSP’s Security Services Portfolio 92%of the 100K security incidents studied from the past ten years can be described by just nine basic patterns 1. POINT OF SALE INTRUSIONS 2. DENIAL OF SERVICE ATTACKS 3. CRIMEWARE 4. WEB APPLICATION ATTACKS 5. INSIDER MISUSE 6. MISCELLANIOUS ERRORS 7. PHYSICAL THEFT/LOSS 8. CARD SKIMMERS Source: Verizon Mobility and End- Point Security Hybrid cloud security Next Generation Perimeter Solutions Application Threat Protection Advanced Malware Protection Discovery Security Analytics Social Engineering Protect the network and endpoints from both known and zero-day malware The ability to protect hybrid cloud environments and identity business risks associated with SaaS usage Deploying next generation network perimeter solutions to identify and mitigate application threats Detect and remediate application vulnerabilities and prevent malicious hacks and attacks State-of-the-art sandboxing technology helping protect against hacks that bypass signature-based controls Correlating a diverse set of security, network and application event data to improve understanding of normal and discover first seen problems – the unknown unknown Ensuring adequate security awareness in-house and appropriate procedures in place
  • 9. CSPs Security Services Value Chain • Endpoint Security (including mobile security) • Server Security • E-mail Security • Network Security • Cloud Security • Anti-Phishing, Anti- malware, Antivirus • Perimeter Solutions • Application Security • Security Analytics • Monitored or managed firewalls or intrusion prevention systems (IDS/IPS) • Cloud, mobile and web assets (DDoS protection, email security, web filtering) • Security information and event management (SIEM) • Need more advanced services such as real-time and batch security analytics • Reporting associated with monitored/managed devices and incident response • Security compliance and consulting services • Security design and architechture services • Security audit and assessment services • Professional services • Managed services • Cyberdefence solutions Point Products Managed Security Services Information Security Consulting Services Consumer Ad hoc Security Services Security Services Bundle Network Security Services Fully Managed Security Environment Level of Strategic Partnership with the Customer
  • 10. Why MSSP solutions are good for Businesses? • Managed security services are the network security services that have been outsourced to a service provider. A company providing such a service is a managed security service provider (MSSP). • According to recent industry research, most organizations (74%) manage IT security in-house, but 82% of IT professionals said they have either already partnered with, or plan to partner with, a managed security service provider. • MSSPs offer better resources, scalability, and talent - all for a cheaper price. So cost is the major reason. Chief Information Security Officers looking to security services cite cost reduction as a top factor, with 62% of CISOs listing this as an important or very important reason. • Other important issues include flexibility, expertise, global coverage and advanced technology. • CISOs want trusted, strategic partners. Information security is an activity built on trust. MSSPs that understand this develop strong supporting partnerships with their clients and help them overcome their biggest security challenges. • Forrester believes that the relationship between CISOs and MSSPs will continue to deepen. As the MSSP demonstrates competency and even proficiency in certain areas, the partnership will quickly develop from an ad hoc relationship to a fully managed security IT environment. • Advanced technologies, such as threat intelligence and correlation, drive future demand. Sophistication of new threat intelligence technology to detect intrusions with a rapidly changing threat landscape discover a need for solutions capable of detecting suspicious activity and need to receive alerts in near real time. Forrester believes those MSSPs that get this right will have a huge advantage in the market during the next two to five years Trust Global Coverage Flexibility Cost Real-time Detection Advanced Technology 82%Of Chief Information and Security Officers partnered or plan to partner with MSSPs Why MSSP solutions are good for Businesses? Source: Trustwave
  • 11. Global Leading CSPs Clearly Show the Potential for CSPs in Security Domain • Verizon is a top telecommunications provider with a very large North American presence, with more than 2,000 unique clients in the region. Verizon employs one of the largest security teams in the market with an aggressive recruiting strategy. • Verizon emphasizes the business value and cost-controlling aspects that it delivers through managed security services and helps clients allocate resources to the most critical assets through its enhanced risk-based correlation engine. As a large, North American telecommunications provider, AT&T has one of the largest customer bases, with more than 1,200 unique customers in the region. AT&T has an aggressive threat intelligence program and scans more than 25 petabytes of data travelling over its networks daily. AT&T focuses on threat detection with strong network infrastructure and perimeter defense offerings, including robust log monitoring and analysis features. Areas of improvement were its customer portal and reporting features. • BT's MSS offerings include monitoring and management of customer premises deployed devices and network-based security controls as part of its larger portfolio of telecommunications and IT services. BT uses self-developed technology for log and event collection, correlation, query, reporting, and device management. • NTT has a global presence as well as a broad range of security service offerings and delivery options, in addition to broader telecommunications and IT infrastructure service offerings. • Headquartered in Paris, with offices in Atlanta and Singapore, Orange offers a broad range of telecommunications and cloud-based IT infrastructure services, security consulting and integration services, and MSSs. Orange MSSs are based on commercial SIEM technology for data collection, correlation and analysis, reporting, and log management, with self-developed technology for workflow. Gartner Forrester Wave: Information Security Consulting Services, Q1 ‘13
  • 12. But Still Much in CSPs To-Do-List to Gain Leadership in Information Security Consulting Services Though Only two CSPs were included in Forrester Wave Information Security Consulting Services. • Verizon demonstrates strong incident response skills, but lack of global coverage is restrictive. • Verizon has battled to gain brand awareness within the security consultancy space and has succeeded thanks to its incident analysis and strong PCI practice. Although some of the company’s higher-level solutions (for GRC and strategy, for example) may not be as sophisticated as those of larger competitors. • The company does offer a wide range of solutions, including strong offerings in application security, biometrics, DLP, and IAM, many of which it will also subsequently operate. • Client feedback stressed the flexibility of the Verizon consultants and its strength in incident response; areas of potential improvement included Verizon’s comparatively low number of consultants (just over 400) and weak global coverage, as well as challenges with internal collaboration and communication. • BT Global Services delivers pragmatic solutions, with a focus on technology. • BT was the other organization that stood out because of its unique perspective and approach to client engagement; the company’s spokespeople come across as very honest and candid, suggesting that clients are likely to receive straightforward advice, even if it meant BT recommending a course of action that BT could not support. • BT focuses on the delivery of predefined security service packages and does not offer regulatory- or compliance-related services. • Although BT’s staff is relatively small and inexperienced (with an average of fewer than five years of experience), the company has a strong presence in the UK and continental Europe. • BT plays to these strengths, ensuring that the customers receive high-value consulting using strong security technology solutions. Forrester Wave: Information Security Consulting Services, Q1 ‘13
  • 13. Approaches to Unlocking the Cyber Security Potential Build Buy • Orange – Atheos • Singtel – Trustwave • Telstra – Bridgepoint and O2 networks • Telstra – Docusign • Telefonica - Blueliv • DT – Cyphercloud, Zenguard, Lockout • Network Security – Fortinet, F-Secure • Endpoint Security – Lookout, McAfee, Symantec • Cloud Security – Symantec, Akamai • Cyberdefence – FireEye, AllienVault • Professional Services – IBM, HP CAPEX consumption OPEX consumption Time-to-Market Partner Market Cases
  • 14. Security Services Portfolio and Partnerships leveraged. AT&T Case • AT&T has partnered with Cisco for the home controller, plus other specialist vendors for service, components, and installation. Service Innovation Digital Life is AT&T’s new consumer home security and home automation service. • AT&T partners with Juniper for Mobile Security. It will help to manage personal or enterprise-owned devices, enable anti-virus, anti-malware, and application monitoring and control. • At the center of AT&T's partnership with AWS is its NetBond offering, which the company describes as a "network-enabled cloud solution. • AT&T also partners with security app provider Lookout in order to protect AT&T Android devices from app-based threats. Lookout's Mobile Security software is expected to be installed on most AT&T Android phones moving forward. • AT&T Government Solutions selected Aviat Networks as its microwave communications partner. AT&T Government Solutions is a proven solutions integrator, with expertise in areas such as Cyber Security, Network Solutions, Application. AT&T Security Services Portfolio
  • 15. The Digital Telecom Security Services In Search of New Streams Thank you! Should you have any questions or feedback please contact me, Parviz.Iskhakov@gmail.com