SlideShare a Scribd company logo
1 of 6
Download to read offline
Building a Business Case:
Cloud-Based Security for Small
and Medium-Size Businesses
table of contents
	 +	 Key Business Drivers .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 3
	 +	 The Business Case for Endpoint Security in the Cloud .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 4

	 +	 Conclusion .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 6

A TechTarget White Paper brought to you by
©2013 Symantec
+ Key Business Drivers
+ The Business Case for
Endpoint Security in the Cloud
Investing in IT security is one of the most important strategic decisions for
executives at small or medium-size businesses. The damage caused by a
security breach could have dramatic consequences: A single security breach
can cost a company millions of dollars, and malicious attacks are the most
costly of all data breaches.1

+ Conclusion

And don’t think because your business is small or medium-size it isn’t
vulnerable to attack. In fact, your size may make you even more vulnerable:
Since the beginning of 2010, 40% of cyberattacks have been targeted at
2
SMBs, versus 28% against large enterprises. And in 2012, attacks against
3
SMBs doubled compared with 2011, with the average business facing 5,000
4
sophisticated malware threats alone every month and the number of
5
malicious new URLs growing by 30,000 every single day. Some
cybercriminals are even using SMBs as a way to find a backdoor into larger
organizations, which means a lack of adequate protection may not only make
your business more vulnerable, but it could also severely impact your partner
relationships.
The unfortunate reality is that far too many SMB executives are unaware of
the types of threats they face and are not doing nearly enough to protect their
organizations against potentially crippling attacks. Nearly 90% of SMBs have
no formal written Internet policy for employees, 70% do not have policies
for social media use, and 69% don’t even have an informal Internet security
policy to provide users with commonly accepted guidelines on how to use
6
the Internet. With no policies in place at all, users are pretty much free to do
whatever they want, including visiting non-business or nefarious websites,
such as those devoted to gaming or pornography, that might leave the
company more vulnerable to attack.
Clearly, with the number of threats escalating, the sophistication of the threats
increasing, and the growing vulnerability of SMBs as a target, something has
to be done to alter the course for small or midsize organizations. To avoid
major consequences, they must shift their mindset and approach from one
of being merely reactive to a position where they are installing effective and
proactive defenses.
1 2011 Cost of a Data Breach Study: United States, Ponemon Institute, March 2012

2 SMB Threat Awareness Poll, Symantec, November 2011
3 New Survey Shows U.S. Small Business Owners Not Concerned about Cybersecurity; Majority Have No Policies or Contingency Plans,
4 National Cyber Security Alliance and Symantec, Oct. 15, 2012
5 Blue Coat Systems 2012 Web Security Report
6 Security Threat Report 2012, Sophos

2

©2013 Symantec
+ Key Business Drivers
+ The Business Case for
Endpoint Security in the Cloud

Key Business Drivers
For SMB executives, building a business case for investing in endpoint
security comes down to answering a few fundamental questions. How
much will it cost? More important, how much will it cost to get the right
amount of protection? What are the risks of making this investment – or,
with security, what are the risks of not making the investment? Where is the
organization most vulnerable, and how does the organization ensure it is
delivering adequate protection where it is most likely to face attacks? How
can the company ensure protection for the future, even as cybercriminals
change their tactics and seek to exploit new weaknesses?
In many ways, investing in security is akin to buying an insurance policy:
You hope you never need it, but when you do, you thank your lucky stars
you had it in place. It could, in fact, save your business.
A few things will become clear as you start delving into these questions:
1.	 Focus on Risk Management: Not investing in adequate security is not
really an option. The consequences of a successful attack are too great,
and the potential solutions to achieve solid protection are relatively
inexpensive. In fact, as you’ll see below, by using a cloud-based service
for security, you will be able to minimize your investment and manage
endpoint security so you are only paying for the security you need. Any
cost analysis looking at risk vs. reward will tell you that investing in IT
security is one of the smartest business decisions you can make.
2.	 Protect Your Endpoints: This is where your business is most vulnerable to
attacks. Cybercriminals always focus on your weakest links, and
because many SMBs don’t protect them well enough, endpoints are
where the threat of attack is often the greatest. Criminals are increasingly exploiting everyday activities that make users more vulnerable, such
as using email, search engines, social media and popular websites. As
7
many as 30,000 malicious websites are being created every single day.
Without proper security safeguards, every user on any device on your
network has the potential to bring harm to your organization, by inadvertently downloading a virus or piece of malware or perhaps through malice
or negligence, such as losing a laptop.
7 Security Threat Report 2012, Sophos

3

©2013 Symantec

+ Conclusion
+ Key Business Drivers
+ The Business Case for
Endpoint Security in the Cloud
3.	 Explore the Cloud: The availability of robust cloud-based security-as-aservice solutions is one of the most important innovations taking place in
IT security today. The benefits of cloud-based security for SMBs can be
dramatic, including lower costs with predictable pricing, state-of-the-art
protection that is constantly updated to address the evolving threat
landscape, and simple deployment, upgrades and provisioning. In
addition, a cloud-based solution enables simple scalability as you add new
users to your organization.
Each business is different and, as you dig deeper into building your business
case for a successful security solution, there will likely be many key factors
to consider. How big is your IT staff, and how well versed are they in
managing security threats? How much time and effort do you want to spend
on managing security and deploying security solutions, such as patches and
updates? How mobile is your workforce, and how much more mobile will it
be over the next few years? Do you support remote workers and/or do you
plan to support them in the future? How can you ensure that the security
solution you deploy does not have a negative impact on application
performance or on the productivity of your workers?

The Business Case for Endpoint Security
in the Cloud
If you examine all of your business drivers for endpoint security, you will
discover that deploying a cloud-based service from a leading vendor such as
Symantec will help you achieve all of your key objectives, including reducing
costs and risks as well as providing the highest level of protection for your
endpoints and your business. Here’s how:
	 ROI and cost containment: Building your own on-premises security
solution can be extremely expensive. You have the up-front costs
for hardware and software, and then you have ongoing costs for
maintenance, support and upgrades. A cloud-based service eliminates
the need for any initial investment and enables you to take advantage of
a subscription model that tends to be both inexpensive and predictable.
You pay only for the services you need, for the specific devices that need
protection. As you scale up with new users, you can simply add them
without purchasing new servers.

4

©2013 Symantec

+ Conclusion
+ Key Business Drivers
+ The Business Case for
Endpoint Security in the Cloud
	 Bulletproof protection: One of the biggest advantages of a cloudbased service is that you are putting your protection in the hands of
security experts who can react quickly to new threats. Cloud services
can stay one step ahead of premises-based solutions because they
can deploy the latest security advances immediately, as they become
available. With the right cloud-based solution, such as Symantec TM
Endpoint Protection Small Business Edition 2013, your business is
protected with the most advanced antivirus and anti-malware
technologies, keeping your servers, desktops and laptops safe from
viruses, worms, Trojans, spyware, bots, zero-day threats, rootkits and
other types of attacks.
	 Risk management: In addition to providing state-of-the art protection,
a cloud-based solution can help you manage risks in other ways.
For example, Symantec Endpoint Protection Small Business Edition
2013 enables always-on protection, so that updates take place
transparently over an Internet connection as soon as they are
available. This helps keep employee systems current and consistent
with policies wherever they are, even if they are not logged into a
virtual private network. This is an important feature for your mobile and
remote workers, particularly if they are using less secure connections
such as Wi-Fi to connect with the business. Also, the cloud-based
delivery of Symantec Endpoint Protection Small Business Edition 2013
provides a service-level agreement that guarantees 100% Web
console availability. This means you can rest assured that your
business will always be able to make changes, as well as manage and
deploy the service wherever needed. In addition, for an added level
of protection, the Symantec cloud-based deployment allows SMBs to
detect and protect against harmful files from USB storage devices.
	 Simplified deployment and manageability: Cloud-based endpoint
security is remarkably simple to deploy and maintain, and has a
minimal impact on your IT organization. Compared with premisesbased solutions, you can save money on IT resources and deploy
IT personnel on initiatives that can help to grow your business.
Symantec’s Endpoint Protection Small Business Edition 2013 can
be installed in minutes, with no special IT staff or training required. It
is managed from a single console and deployed to endpoints via a

5

©2013 Symantec

+ Conclusion
+ Key Business Drivers
+ The Business Case for
Endpoint Security in the Cloud
direct download, email invitations or a redistributable package. Once
the agent is installed, preconfigured policies are enabled for antivirus,
antispyware, firewall and host intrusion prevention. From the
administration console, an administrator can transparently send out
patches, updates and policy changes to all endpoints over the
Internet. The console can also be used for ongoing maintenance,
provisioning new endpoints, managing remote clients, viewing the
status of endpoints and a wide range of other functions.

Conclusion
SMBs can no longer be complacent in the face of a security threat
environment that is increasingly becoming more sophisticated and
coordinated. Attackers have taken note of the weaknesses of many
SMBs and are actively exploiting them as a gateway to their larger
business partners. A successful attack can be devastating, and without
the right protection in place, it can seem to come out of nowhere. In
today’s environment, with the availability of robust endpoint security
solutions offered as a cloud-based service, deploying state-of-the-art
security can be done inexpensively and quickly, without significant impact
on your IT staff or your business operations. It’s important to note,
however, that not all cloud-based security solutions are created equal.
You want to make sure that when you build your business case, you
consider the reputation and credibility of your cloud partner and its
ability to deliver the most advanced endpoint solutions to your
organization – now and in the future. Learn how Symantec Endpoint
Protection Small Business Edition 2013 can be your path to a safe and
effective security solution in the cloud.

1
6

©2013 Symantec

+ Conclusion

More Related Content

More from - Mark - Fullbright

Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
- Mark - Fullbright
 

More from - Mark - Fullbright (20)

CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 
Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps
 
DATA BREACH CHARTS
DATA BREACH CHARTSDATA BREACH CHARTS
DATA BREACH CHARTS
 
Fifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity TheftFifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft
 
Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014
 
The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age
 
DEBT RELIEF SERVICES & THE TELEMARKETING SALES RULE: A Guide for Business
DEBT RELIEF SERVICES & THE TELEMARKETING SALES RULE: A Guide for BusinessDEBT RELIEF SERVICES & THE TELEMARKETING SALES RULE: A Guide for Business
DEBT RELIEF SERVICES & THE TELEMARKETING SALES RULE: A Guide for Business
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Recently uploaded (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 

Cloud-Based Security for Small and Medium-Size Businesses

  • 1. Building a Business Case: Cloud-Based Security for Small and Medium-Size Businesses table of contents + Key Business Drivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 + The Business Case for Endpoint Security in the Cloud . . . . . . . . . . . . . . . . . . . . . 4 + Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 A TechTarget White Paper brought to you by ©2013 Symantec
  • 2. + Key Business Drivers + The Business Case for Endpoint Security in the Cloud Investing in IT security is one of the most important strategic decisions for executives at small or medium-size businesses. The damage caused by a security breach could have dramatic consequences: A single security breach can cost a company millions of dollars, and malicious attacks are the most costly of all data breaches.1 + Conclusion And don’t think because your business is small or medium-size it isn’t vulnerable to attack. In fact, your size may make you even more vulnerable: Since the beginning of 2010, 40% of cyberattacks have been targeted at 2 SMBs, versus 28% against large enterprises. And in 2012, attacks against 3 SMBs doubled compared with 2011, with the average business facing 5,000 4 sophisticated malware threats alone every month and the number of 5 malicious new URLs growing by 30,000 every single day. Some cybercriminals are even using SMBs as a way to find a backdoor into larger organizations, which means a lack of adequate protection may not only make your business more vulnerable, but it could also severely impact your partner relationships. The unfortunate reality is that far too many SMB executives are unaware of the types of threats they face and are not doing nearly enough to protect their organizations against potentially crippling attacks. Nearly 90% of SMBs have no formal written Internet policy for employees, 70% do not have policies for social media use, and 69% don’t even have an informal Internet security policy to provide users with commonly accepted guidelines on how to use 6 the Internet. With no policies in place at all, users are pretty much free to do whatever they want, including visiting non-business or nefarious websites, such as those devoted to gaming or pornography, that might leave the company more vulnerable to attack. Clearly, with the number of threats escalating, the sophistication of the threats increasing, and the growing vulnerability of SMBs as a target, something has to be done to alter the course for small or midsize organizations. To avoid major consequences, they must shift their mindset and approach from one of being merely reactive to a position where they are installing effective and proactive defenses. 1 2011 Cost of a Data Breach Study: United States, Ponemon Institute, March 2012 2 SMB Threat Awareness Poll, Symantec, November 2011 3 New Survey Shows U.S. Small Business Owners Not Concerned about Cybersecurity; Majority Have No Policies or Contingency Plans, 4 National Cyber Security Alliance and Symantec, Oct. 15, 2012 5 Blue Coat Systems 2012 Web Security Report 6 Security Threat Report 2012, Sophos 2 ©2013 Symantec
  • 3. + Key Business Drivers + The Business Case for Endpoint Security in the Cloud Key Business Drivers For SMB executives, building a business case for investing in endpoint security comes down to answering a few fundamental questions. How much will it cost? More important, how much will it cost to get the right amount of protection? What are the risks of making this investment – or, with security, what are the risks of not making the investment? Where is the organization most vulnerable, and how does the organization ensure it is delivering adequate protection where it is most likely to face attacks? How can the company ensure protection for the future, even as cybercriminals change their tactics and seek to exploit new weaknesses? In many ways, investing in security is akin to buying an insurance policy: You hope you never need it, but when you do, you thank your lucky stars you had it in place. It could, in fact, save your business. A few things will become clear as you start delving into these questions: 1. Focus on Risk Management: Not investing in adequate security is not really an option. The consequences of a successful attack are too great, and the potential solutions to achieve solid protection are relatively inexpensive. In fact, as you’ll see below, by using a cloud-based service for security, you will be able to minimize your investment and manage endpoint security so you are only paying for the security you need. Any cost analysis looking at risk vs. reward will tell you that investing in IT security is one of the smartest business decisions you can make. 2. Protect Your Endpoints: This is where your business is most vulnerable to attacks. Cybercriminals always focus on your weakest links, and because many SMBs don’t protect them well enough, endpoints are where the threat of attack is often the greatest. Criminals are increasingly exploiting everyday activities that make users more vulnerable, such as using email, search engines, social media and popular websites. As 7 many as 30,000 malicious websites are being created every single day. Without proper security safeguards, every user on any device on your network has the potential to bring harm to your organization, by inadvertently downloading a virus or piece of malware or perhaps through malice or negligence, such as losing a laptop. 7 Security Threat Report 2012, Sophos 3 ©2013 Symantec + Conclusion
  • 4. + Key Business Drivers + The Business Case for Endpoint Security in the Cloud 3. Explore the Cloud: The availability of robust cloud-based security-as-aservice solutions is one of the most important innovations taking place in IT security today. The benefits of cloud-based security for SMBs can be dramatic, including lower costs with predictable pricing, state-of-the-art protection that is constantly updated to address the evolving threat landscape, and simple deployment, upgrades and provisioning. In addition, a cloud-based solution enables simple scalability as you add new users to your organization. Each business is different and, as you dig deeper into building your business case for a successful security solution, there will likely be many key factors to consider. How big is your IT staff, and how well versed are they in managing security threats? How much time and effort do you want to spend on managing security and deploying security solutions, such as patches and updates? How mobile is your workforce, and how much more mobile will it be over the next few years? Do you support remote workers and/or do you plan to support them in the future? How can you ensure that the security solution you deploy does not have a negative impact on application performance or on the productivity of your workers? The Business Case for Endpoint Security in the Cloud If you examine all of your business drivers for endpoint security, you will discover that deploying a cloud-based service from a leading vendor such as Symantec will help you achieve all of your key objectives, including reducing costs and risks as well as providing the highest level of protection for your endpoints and your business. Here’s how:  ROI and cost containment: Building your own on-premises security solution can be extremely expensive. You have the up-front costs for hardware and software, and then you have ongoing costs for maintenance, support and upgrades. A cloud-based service eliminates the need for any initial investment and enables you to take advantage of a subscription model that tends to be both inexpensive and predictable. You pay only for the services you need, for the specific devices that need protection. As you scale up with new users, you can simply add them without purchasing new servers. 4 ©2013 Symantec + Conclusion
  • 5. + Key Business Drivers + The Business Case for Endpoint Security in the Cloud  Bulletproof protection: One of the biggest advantages of a cloudbased service is that you are putting your protection in the hands of security experts who can react quickly to new threats. Cloud services can stay one step ahead of premises-based solutions because they can deploy the latest security advances immediately, as they become available. With the right cloud-based solution, such as Symantec TM Endpoint Protection Small Business Edition 2013, your business is protected with the most advanced antivirus and anti-malware technologies, keeping your servers, desktops and laptops safe from viruses, worms, Trojans, spyware, bots, zero-day threats, rootkits and other types of attacks.  Risk management: In addition to providing state-of-the art protection, a cloud-based solution can help you manage risks in other ways. For example, Symantec Endpoint Protection Small Business Edition 2013 enables always-on protection, so that updates take place transparently over an Internet connection as soon as they are available. This helps keep employee systems current and consistent with policies wherever they are, even if they are not logged into a virtual private network. This is an important feature for your mobile and remote workers, particularly if they are using less secure connections such as Wi-Fi to connect with the business. Also, the cloud-based delivery of Symantec Endpoint Protection Small Business Edition 2013 provides a service-level agreement that guarantees 100% Web console availability. This means you can rest assured that your business will always be able to make changes, as well as manage and deploy the service wherever needed. In addition, for an added level of protection, the Symantec cloud-based deployment allows SMBs to detect and protect against harmful files from USB storage devices.  Simplified deployment and manageability: Cloud-based endpoint security is remarkably simple to deploy and maintain, and has a minimal impact on your IT organization. Compared with premisesbased solutions, you can save money on IT resources and deploy IT personnel on initiatives that can help to grow your business. Symantec’s Endpoint Protection Small Business Edition 2013 can be installed in minutes, with no special IT staff or training required. It is managed from a single console and deployed to endpoints via a 5 ©2013 Symantec + Conclusion
  • 6. + Key Business Drivers + The Business Case for Endpoint Security in the Cloud direct download, email invitations or a redistributable package. Once the agent is installed, preconfigured policies are enabled for antivirus, antispyware, firewall and host intrusion prevention. From the administration console, an administrator can transparently send out patches, updates and policy changes to all endpoints over the Internet. The console can also be used for ongoing maintenance, provisioning new endpoints, managing remote clients, viewing the status of endpoints and a wide range of other functions. Conclusion SMBs can no longer be complacent in the face of a security threat environment that is increasingly becoming more sophisticated and coordinated. Attackers have taken note of the weaknesses of many SMBs and are actively exploiting them as a gateway to their larger business partners. A successful attack can be devastating, and without the right protection in place, it can seem to come out of nowhere. In today’s environment, with the availability of robust endpoint security solutions offered as a cloud-based service, deploying state-of-the-art security can be done inexpensively and quickly, without significant impact on your IT staff or your business operations. It’s important to note, however, that not all cloud-based security solutions are created equal. You want to make sure that when you build your business case, you consider the reputation and credibility of your cloud partner and its ability to deliver the most advanced endpoint solutions to your organization – now and in the future. Learn how Symantec Endpoint Protection Small Business Edition 2013 can be your path to a safe and effective security solution in the cloud. 1 6 ©2013 Symantec + Conclusion