Your SlideShare is downloading. ×
Reference Guide Series Sizing Security: How to Create Your Ideal Infrastructure Contents 	    Overview.  .  .  .  .  .  . ...
Reference Guide Series                                                    Today’s Security Challenges                     ...
Reference Guide Series                                   configuration. Anti-virus and anti-spam are often must-haves, and...
Reference Guide Series                                   PowerConnect users can manage WAN connectivity and VoIP securely....
Upcoming SlideShare
Loading in...5
×

Sizing Security: How to Create Your Ideal Infrastructure

307

Published on

This white paper examines security technology and how it protects businesses of different sizes. It will look at why it’s important to size security carefully, whether for a 50-, 100- or 250-person organization, and look at how Dell and Intel security products can fit those needs.

Published in: Technology, Business
1 Comment
0 Likes
Statistics
Notes
  • Be the first to like this

No Downloads
Views
Total Views
307
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
4
Comments
1
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Sizing Security: How to Create Your Ideal Infrastructure"

  1. 1. Reference Guide Series Sizing Security: How to Create Your Ideal Infrastructure Contents Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Today’s Security Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Why Optimizing for Business Size Matters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Security Needs for Small and Medium Businesses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 - Optimize for Your Size: 50-Person Business. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 - Optimize for Your Size: 100-Person Business . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 - Optimize for Your Size: 250-Person Business . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Dell/Intel Solutions for Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Conclusion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Brought to you compliments of: Overview This white paper examines security technology and how it protects businesses of different sizes. It will look at why it’s important to size security carefully, whether for a 50-, 100- or 250-person organization, and look at how Dell and Intel security products can fit those needs.©2011 Dell, Intel and TechTarget
  2. 2. Reference Guide Series Today’s Security Challenges Most businesses need protection from some of today’s top security threats: spam, viruses, phishing, malware and more. Organized cybercriminals and their scams keep getting smarter, and new ones emerge every day. Added to that, social media, mobile and removable storage devices are a new source of vulnerability for organizations. The results of just one security breach can lead to lost profits and customers, or regulatory compliance violations. And smaller companies often have a harder time recovering from those breaches — one bad breach can put a small company out of business. Many small businesses don’t have plans to deal with IT disruptions, and also might not have the resources for regular server and PC backups. Why Optimizing for Business Size Matters Small and medium businesses have quite a different budget from enterprise organizations, but they need similar security strength. Small businesses experience an average of three IT disruptions each year.1 Half of small businesses have lost critical data within the past year2, and just one lost laptop can cost a small business almost $50,000.3 Threats from the web and email, and data breaches and loss, happen to small businesses just like larger ones. So look for protection that will be sufficient, but not too costly. The good news is that many of today’s security technologies, like VPNs, firewalls and encryption, are available to small businesses. Finding the right balance is the trick, though. Plan purchases to get full protection of data and resources without overspending or ending up with unused features. The right security can automate tasks and centralize control, so that smaller organizations aren’t bogged down by their own tools. Security Needs for Small and Medium Businesses No matter what, security should be easy for smaller organizations. These companies usually don’t have the time or staff to stay ahead of individual threats. And there are several security tools that can be critical for any size business: anti-virus, anti-spam, intrusion prevention, Web filtering and content filtering. Look for security solutions that contain these essential features, without having to buy extra routers, switches or other components. The overall management should be easy and centralized. And, security for small and midsize business can often be scalable and flexible to keep protecting employees, data and applications as the business grows. That includes protecting multiple locations as a business expands. Automation can be a key part of an intelligent security appliance, too. That way, small IT teams can offload tasks wherever possible. Server-based networks instead of client-based networks can add security through better data protection and reliability. Servers with built-in failover add security, and can also help by supporting secure central backups. And, look for server technologies like automated memory error checking and correction. Optimize for Your Size: 50-Person Business Every business is different, but in general, 50-person organizations have some common concerns. Security implementation and management should be straightforward and not require too much 1 SMB Disaster Preparedness Study, Symantec, Q3 2009 2 Rubicon Consulting 2009 survey of US businesses 3 Ponemon Institute, Q2 20092 ©2011 Dell, Intel and TechTarget
  3. 3. Reference Guide Series configuration. Anti-virus and anti-spam are often must-haves, and intrusion prevention, Web filtering and content filtering are available even to smaller businesses. Make it a priority to have a strong firewall, and explore the use of VPNs and encryption. Whatever the features, it’s all got to stay within budget and be easy to maintain. A 50-person organization might have an entry-level, all-in-one security appliance that doesn’t require much management or maintenance. It’s possible they don’t have a security expert on their IT team, so easy, mostly hands-off technology is helpful. And, security automation can help take the burden off IT. Threat management that includes anti-spam and anti-virus can be the starting baseline as these companies are building their infrastructure. A secure perimeter is a building block for further growth. Optimize for Your Size: 100-Person Business A 100-person business may be examining scalable security for continued growth. A strong firewall must continue to protect any new users and applications. These companies may be building or expanding their VPN to meet employee needs, especially for remote or traveling workers. IT teams at 100-employee organizations will continue to add zones and policies as new threats arise. So, for this size business, consider how to protect all endpoints, especially as mobile workers and removable devices represent new vulnerabilities. These organizations may need more performance from their security appliance, so the next step might be exploring faster appliances with more ports and WAN/LAN interface options. Solid integration of security tools into a growing data center is a must. And 100-person busi- nesses may have more than one workforce location that they need to connect and secure. Optimize for Your Size: 250-Person Business A 250-person business likely wants security that grows with them without adding complexity. They might also be seeking better performance and higher availability with their security appliance. And they’re looking at complete endpoint protection as new users and devices come on board. Other considerations for this size business are continued network growth, encryption, adoption of technologies like VoIP and continued automation around security processes. A single, powerful, consolidated device may be able to meet these organizations’ needs, combining switching, routing, security and applications. A business of this size might start to weigh the continued benefits of using unified threat management (UTM) solutions as they grow. And, look at adding firewall and VPN speeds for better performance. Consider higher numbers of security policies. And connectivity options — whether wired or 3G — are a concern, too. Dell/Intel Solutions For Security Dell’s PowerConnect J-SRX series gateways are built in several different configurations to meet the pricing and size needs of smaller businesses. PowerConnect gateways all use unified threat management (UTM), which includes anti-spam, anti-virus and Web filtering functions. They help organizations consolidate routing, security and switching functions for simplicity. And gateways scale easily, with different options for interfaces, more ports and faster performance.3 ©2011 Dell, Intel and TechTarget
  4. 4. Reference Guide Series PowerConnect users can manage WAN connectivity and VoIP securely. Ethernet switching is integrated for ease of use. Most importantly, PowerConnect gateways are comprehensive. They’ll secure a company’s entire perimeter simply, with one appliance. Firewall and VPN technology keep out all threats without a lot of configuration. Administrators can set zones and policies quickly, and then leave the work to the appliance. It’s a single, simple solution that fits in with small and growing companies. Dell security options also include the #1-ranked Trend Micro’s Worry-Free Business Security solutions. They’re designed to be easy for small businesses to block Web-based threats and malware, and handle Exchange server security. Added options included virus protection for remote or local PCs and notebooks without having to add a server. For Intel, their commitment to security became even stronger last year with their pending $7.7 billion purchase of noted security company McAfee. That planned acquisition will lead to more hardware-software integration and overall enhancement of Intel’s security products. Intel’s AES-NI Instructions technology is built into many of their processors to help secure sensitive data faster and enable stronger encryption. Easy encryption comes with Dell/Intel Xeon servers, too. Comprehensive full-disk encryption can encrypt the whole disk, including operating systems and files, and intelligent file/folder encryption lets IT managers choose what to encrypt. That can take decisions out of users’ hands for easier automation and man- agement of encryption. As part of Dell Data Protection, data can be encrypted whether or not a system is connected to the Internet, and lets users report lost or stolen laptops to keep data safe. Secure Sockets Layer (SSL) adapters included in Dell servers make secure communications faster for more clients. Intel’s security technology also includes Intel Active Management technology (AMT) a key feature of the Intel vPro™ technology. Power savings, improved remote management, and inventory control are just a few of the benefits. Laptops with select members of the Intel Core processor family with Intel Anti-Theft Technology provide you with intelligent security for lost or stolen laptops. Because the technology is built into the hardware, Intel AT, in conjunction with enabled service/software providers, provides local protection that works even if a thief reimages the OS, changes the boot order, installs a new hard-drive, or stays off the Internet. Conclusion Choosing the right security options mean that a small or midsize business won’t pay too much for reliable systems and safe data. Today’s big security threats hit businesses of all sizes, so it’s key to get the most security under budget. Organizations can look to Dell and Intel for flexible, all-in-one protection.4 ©2011 Dell, Intel and TechTarget

×