SlideShare a Scribd company logo
1 of 14
Security as a ServiceThe evolution in Security and why we should shift to the new model By  George Fares, FInstSMM International Business  Development Manager Panda Security
Agenda What is it? How does it work? Key characteristics and benefits SaaS - History SaaS – Current situation SaaS – Where are we heading? Conclusion George Fares
SaaS – What is it? It is a new way to deliver traditional security applications  (i.e. anti-virus, email protection, anti-spam, etc.) from the cloud (internet based services). George Fares
SaaS – How does it work? Security Vendor Infrastructure The above design was provided from Panda Security George Fares
Key characteristics and benefits Everything is on the web No need to spend for dedicated hardware (servers) and software (O/S, databases, etc.); everything is hosted on the vendor’s datacenter. Different licensing than traditional security Companies no longer have to pay in advance for their security solution. Updates All the latest updates are available and already “installed”. George Fares
Key characteristics and benefits – Cont’d Upgrades Automatically without any intervention from the IT department. Always on latest version. Remote administration, monitoring, and deployment from a single console (web-console accessible from anywhere in the world) Lower TCO than traditional solutions No need to budget for next year for renewals or upgrades. Predictable annual licensing cost. You add licenses as your business grows. Ability to utilize better the IT personnel to core competencies George Fares
SaaS - History McAfee was the first vendor who tried to bring SaaS to the market. The product McAfee ASaP wasn’t a big hit at the time. The markets were not so mature to accept such products (hosted on the web). George Fares
SaaS – Current situation Almost everything is on the web!!! Google (Docs, Apps, email). Salesforce.com (CRM). Security products (Panda Security, McAfee, Trend Micro). Companies need to achieve lower TCO with increased ROI. With no need to host such a solution locally the company achieves lower TCO. By investing in SaaS, ROI is bigger and faster. George Fares
SaaS – Current situation – Cont’d Worldwide penetration of broadband access  George Fares
SaaS – Where are we heading? As somebody can understand: With the continuous penetration of the internet to our everyday lives, it is much easier to reap the benefits of broadband connection and use services based on the web. As time goes by and fiber optic is getting easier to have, the increased capabilities will make us ask for more. The whole world will be (eventually) connected to the internet. George Fares
SaaS - Conclusion Companies need to lower their OpEx and CapEx due to the current financial situation and they need to do so without compromising the safety of their IT infrastructure. Increased complexity (managing different solutions in H/W & S/W) makes IT departments not productive. Lower TCO with better ROI is what every company needs to achieve. George Fares
SaaS - Conclusion Security-as-a-Service is the future! The benefits ofadopting such a model are too many to be ignored. The current trends in the Global IT arena are: Virtualization & Cloud computing So, everybody re-evaluate your plans and save money and hassle for your company.  Adopt SaaS and be the hero of the day George Fares
References Wikipedia - http://en.wikipedia.org/wiki/Security_as_a_service Panda Security - www.pandasecurity.com McAfee - www.mcafee.com OECD – www.oecd.org George Fares
Thank you George Fares

More Related Content

What's hot

2012 10 cloud security architecture
2012 10 cloud security architecture2012 10 cloud security architecture
2012 10 cloud security architecture
Vladimir Jirasek
 

What's hot (20)

Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
 
John Merline - How make your cloud SASE
John Merline - How make your cloud SASE John Merline - How make your cloud SASE
John Merline - How make your cloud SASE
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
 
Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles
 
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
 
Security as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologySecurity as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor Technology
 
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeCloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
Workshop on CASB Part 2
Workshop on CASB Part 2Workshop on CASB Part 2
Workshop on CASB Part 2
 
Cloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption ExplainedCloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption Explained
 
2012 10 cloud security architecture
2012 10 cloud security architecture2012 10 cloud security architecture
2012 10 cloud security architecture
 
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
Close your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with CloudflareClose your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with Cloudflare
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
Secure remote access to AWS your users will love
Secure remote access to AWS your users will loveSecure remote access to AWS your users will love
Secure remote access to AWS your users will love
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 
Cloud Security Demystified
Cloud Security DemystifiedCloud Security Demystified
Cloud Security Demystified
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applications
 

Viewers also liked

Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
guest536dd0e
 

Viewers also liked (11)

How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...
How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...
How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...
 
Security Service Management
Security Service ManagementSecurity Service Management
Security Service Management
 
Hosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture DesignHosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture Design
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Elite Force Security Service Brief
Elite Force Security Service BriefElite Force Security Service Brief
Elite Force Security Service Brief
 
Cyber Security as a Service
Cyber Security as a ServiceCyber Security as a Service
Cyber Security as a Service
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
How to avoid your website from keep getting hacked
How to avoid your website from keep getting hackedHow to avoid your website from keep getting hacked
How to avoid your website from keep getting hacked
 
Security as a Service in a Financial Institution: Reality or Chimera?
Security as a Service in a Financial Institution: Reality or Chimera?Security as a Service in a Financial Institution: Reality or Chimera?
Security as a Service in a Financial Institution: Reality or Chimera?
 
Security as a Service = JSOC
Security as a Service = JSOCSecurity as a Service = JSOC
Security as a Service = JSOC
 

Similar to Security As A Service

20100521 anubis networks eurocloud v2
20100521 anubis networks eurocloud v220100521 anubis networks eurocloud v2
20100521 anubis networks eurocloud v2
EuroCloud
 
Get The Facts Comparing Windows Mobile And Blackberry 2003
Get The Facts  Comparing Windows Mobile And Blackberry 2003Get The Facts  Comparing Windows Mobile And Blackberry 2003
Get The Facts Comparing Windows Mobile And Blackberry 2003
jasonlan
 
Global IoT Cloud Services Survey-Aug-20160527
Global IoT Cloud Services Survey-Aug-20160527Global IoT Cloud Services Survey-Aug-20160527
Global IoT Cloud Services Survey-Aug-20160527
August Lin
 
MOP Technical Presentation.Ppt
MOP Technical Presentation.PptMOP Technical Presentation.Ppt
MOP Technical Presentation.Ppt
tswong
 

Similar to Security As A Service (20)

20100521 anubis networks eurocloud v2
20100521 anubis networks eurocloud v220100521 anubis networks eurocloud v2
20100521 anubis networks eurocloud v2
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...
 
Cloud Computing for Nonprofit Organizations
Cloud Computing for Nonprofit OrganizationsCloud Computing for Nonprofit Organizations
Cloud Computing for Nonprofit Organizations
 
The benefits of cloud technology for remote working
The benefits of cloud technology for remote workingThe benefits of cloud technology for remote working
The benefits of cloud technology for remote working
 
The benefits of cloud technology for remote working
The benefits of cloud technology for remote workingThe benefits of cloud technology for remote working
The benefits of cloud technology for remote working
 
Get The Facts Comparing Windows Mobile And Blackberry 2003
Get The Facts  Comparing Windows Mobile And Blackberry 2003Get The Facts  Comparing Windows Mobile And Blackberry 2003
Get The Facts Comparing Windows Mobile And Blackberry 2003
 
Global IoT Cloud Services Survey-Aug-20160527
Global IoT Cloud Services Survey-Aug-20160527Global IoT Cloud Services Survey-Aug-20160527
Global IoT Cloud Services Survey-Aug-20160527
 
11 IT Management Predictions for 2011
11 IT Management Predictions for 201111 IT Management Predictions for 2011
11 IT Management Predictions for 2011
 
Panorama IT Introduction V1.2
Panorama IT Introduction V1.2Panorama IT Introduction V1.2
Panorama IT Introduction V1.2
 
shchyrinprom2009
shchyrinprom2009shchyrinprom2009
shchyrinprom2009
 
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile WorldDarren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
The Business Case behind Cloud Computing - The risks and rewards
The Business Case behind Cloud Computing - The risks and rewardsThe Business Case behind Cloud Computing - The risks and rewards
The Business Case behind Cloud Computing - The risks and rewards
 
Applications Of Cloud Computing
Applications Of Cloud ComputingApplications Of Cloud Computing
Applications Of Cloud Computing
 
D slides
D slidesD slides
D slides
 
SmartOffice Business Broadband
SmartOffice Business BroadbandSmartOffice Business Broadband
SmartOffice Business Broadband
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
MOP Technical Presentation.Ppt
MOP Technical Presentation.PptMOP Technical Presentation.Ppt
MOP Technical Presentation.Ppt
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Security As A Service

  • 1. Security as a ServiceThe evolution in Security and why we should shift to the new model By George Fares, FInstSMM International Business Development Manager Panda Security
  • 2. Agenda What is it? How does it work? Key characteristics and benefits SaaS - History SaaS – Current situation SaaS – Where are we heading? Conclusion George Fares
  • 3. SaaS – What is it? It is a new way to deliver traditional security applications (i.e. anti-virus, email protection, anti-spam, etc.) from the cloud (internet based services). George Fares
  • 4. SaaS – How does it work? Security Vendor Infrastructure The above design was provided from Panda Security George Fares
  • 5. Key characteristics and benefits Everything is on the web No need to spend for dedicated hardware (servers) and software (O/S, databases, etc.); everything is hosted on the vendor’s datacenter. Different licensing than traditional security Companies no longer have to pay in advance for their security solution. Updates All the latest updates are available and already “installed”. George Fares
  • 6. Key characteristics and benefits – Cont’d Upgrades Automatically without any intervention from the IT department. Always on latest version. Remote administration, monitoring, and deployment from a single console (web-console accessible from anywhere in the world) Lower TCO than traditional solutions No need to budget for next year for renewals or upgrades. Predictable annual licensing cost. You add licenses as your business grows. Ability to utilize better the IT personnel to core competencies George Fares
  • 7. SaaS - History McAfee was the first vendor who tried to bring SaaS to the market. The product McAfee ASaP wasn’t a big hit at the time. The markets were not so mature to accept such products (hosted on the web). George Fares
  • 8. SaaS – Current situation Almost everything is on the web!!! Google (Docs, Apps, email). Salesforce.com (CRM). Security products (Panda Security, McAfee, Trend Micro). Companies need to achieve lower TCO with increased ROI. With no need to host such a solution locally the company achieves lower TCO. By investing in SaaS, ROI is bigger and faster. George Fares
  • 9. SaaS – Current situation – Cont’d Worldwide penetration of broadband access George Fares
  • 10. SaaS – Where are we heading? As somebody can understand: With the continuous penetration of the internet to our everyday lives, it is much easier to reap the benefits of broadband connection and use services based on the web. As time goes by and fiber optic is getting easier to have, the increased capabilities will make us ask for more. The whole world will be (eventually) connected to the internet. George Fares
  • 11. SaaS - Conclusion Companies need to lower their OpEx and CapEx due to the current financial situation and they need to do so without compromising the safety of their IT infrastructure. Increased complexity (managing different solutions in H/W & S/W) makes IT departments not productive. Lower TCO with better ROI is what every company needs to achieve. George Fares
  • 12. SaaS - Conclusion Security-as-a-Service is the future! The benefits ofadopting such a model are too many to be ignored. The current trends in the Global IT arena are: Virtualization & Cloud computing So, everybody re-evaluate your plans and save money and hassle for your company. Adopt SaaS and be the hero of the day George Fares
  • 13. References Wikipedia - http://en.wikipedia.org/wiki/Security_as_a_service Panda Security - www.pandasecurity.com McAfee - www.mcafee.com OECD – www.oecd.org George Fares