• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Presentation
 

Presentation

on

  • 271 views

 

Statistics

Views

Total Views
271
Views on SlideShare
270
Embed Views
1

Actions

Likes
0
Downloads
8
Comments
0

1 Embed 1

http://www.slideshare.net 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Presentation Presentation Presentation Transcript

    • John Maddison Vice President Core Technology Solutions The Marriage of Security and Cloud Computing: Better Security and Good Business Rolled into One
    • The $16B Security Application Market Antivirus 2009 Market Data : IDC Report URL Filtering Firewall Anti-Spam
    • 2008 CSI Computer Crime & Security Survey (FBI) The most expensive computer security incidents were those involving financial fraud with an average reported cost of $500,000. The second most expensive, on average was dealing with “bot” computers at $350,00 per respondent Virus incidents occurred the most frequently occurring at almost half (49%) of the respondents organizations. Inside abuse was second Almost 1 in 10 organizations reported they’d had a Domain Name Systems (DNS) incident Twenty-seven percent of those responding confirmed they had experienced a targeted attack or an attack exclusively aimed at their organization
    • Current Threat Environment $$ $$ Malware is Multiplying
      • Malware Samples
      • 1988: 1,738
      • 1998: 177,615
      • 2008: 1,100,000+
      • Pattern Files Can’t Keep Up
      { Malware is Sophisticated
      • Malware Variants
      • Multi-Vector
      • Polymorphic
      • Rapid Variants
      { Malware is Profit-Driven
      • Malware Actions
      • Stealthy
      • Targeted
      • Data Leakage
      • Increased Liability Costs
      {
    • Appliance 1. Collection (Automated) 2. Processing (ie. Hadoop) 3. Distribution (Cloud Client) 4. Platform (SaaS) Typical Security Services Delivery Architecture Push Push Push Endpoint SaaS Cloud Web Reputation URL File Reputation Files Email Reputation IP Threats
    • Security follows mainstream IT Platform Evolution 1990’s Operational Complexity Reduced 2000 2002 2005 Software Gateway Software Client-Server Appliance SaaS Software End-Point 2009 Virtual Machine Cloud Mobile
    • Few Security Companies can Successfully Manage all Platform “Form” Factors Software Organic Growth. Software  SaaS Appliance SaaS Acquisitive Growth. Integrate or Establish SaaS Division $3.7B SurControl - $400m (WebSense 2007) 80% of revenue Software related. ISS - $1.2B (IBM 2006) RSA - $2.1B (EMC 2006) $1.7B Tipping Point - $430m (3com 2006) 90% of revenues Appliance related Secure Computing - $465m (McAfee 2008) Iron Port - $830 (Cisco 2006) $1.5B Frontbridge - $200m (Microsoft 2006) Pure SaaS only, no MSSP Deals Included Postini - $625m (Google 2007) Message Lab - $695 (Symantec 2008)
    • Projected Threats Threat of Volume Projected Increase in Unique Threat Samples PER HOUR (Conservative Projections) By 2015 233,000,000 Per Year
    • Next generation architecture Threat Protection Databases PAST Past Small Pattern DB Slowly Updating Patterns < 50 Per Day Patterns Threat Protection Databases TODAY Today Large Pattern DB Rapidly Updating Patterns > 50,000/day Some Dynamic Reputation Threat Protection Databases NEXT GENERATION Full Dynamic Reputation Next Generation Small Cache Plus Mobile Pattern DB Multi-Threat Correlation
    • Key Customer Questions on SaaS and Cloud Client type services Privacy Performance Availability Personalization Encryption Global/Local Caching Application Design Multi-Tenant
    • The End