Facebook Status: Expanded Customer Relations or Increased Security Threats?


Published on

Frost & Sullivan analysis on Facebook Status: Expanding Customer Relations or Increased Security Threats?

Published in: Technology
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Facebook Status: Expanded Customer Relations or Increased Security Threats?

  1. 1. Facebook Status: Expanded Customer Relations or Increased Security Threats? Martha Vazquez Research Analyst, Network Security Frost & Sullivan February 23, 2010
  2. 2. Focus Points • Overview of the Challenging Threat Landscape • The Shift to Using Social Networking • The Threats of Social Networking • Solving the Problem • Vendors in the Market • Conclusions 2
  3. 3. Overview of the Challenging Threat Landscape • Cybercrime has changed dramatically in the past 5 years Teens, hackers looking to Cybercriminals/ organized create chaos and to “show off” crime rings located globally focused on gaining profit High profile attacks Targeted attacks – spyware, Mass mailers phishing, botnets, vulnerabilities Loss of productivity by bloating Loss of intellectual property resources and causing network Loss of revenue issues Identity theft 3
  4. 4. The shift to using social networking • In the past, using sites such as Facebook and MySpace were seen as fun applications with very little business purpose. • Business is now being conducted via social networking sites and through mobile devices. • According to Cisco’s 2009 annual security report, social media proves to be impacting the enterprise. Of over 4,000 of Cisco’s web security customers, 2 percent of all web traffic is being accessed through social network sites such as Facebook, MySpace, and LinkedIn. 4
  5. 5. The Threats of Social Networking • According to a Sophos survey conducted in December 2009, 60% of respondents believe that Facebook presents the biggest security risk of the social networking sites, significantly ahead of MySpace, Twitter, and LinkedIn 5
  6. 6. Solving the Problem • The growth of social networking sites continues as well as the number of users, and is a strong marketing tool used by many businesses. • Businesses cannot simply stop employees from having access to these sites. • Blogging on these sites is no longer seen as wasted time, but as a means to having employees advertise, communicate benefits, and build rapport customers. 6
  7. 7. Solving the Problem • A unified, comprehensive approach to security • No single solution will work • A layer approach is critical Managed Security Solutions Web and Email Gateway Solutions Endpoint Security 7
  8. 8. Content Filtering Market • Frost & Sullivan uses the term content filtering to refer to a trusted subsystem which enforces a security policy on the data that passes through it, or a program or section of code designed to examine each input or output request for certain qualifying criteria, which then processes or forwards the request accordingly. • These solutions will basically block or allow content that is acceptable based on set policies. • Most commonly used for email and Internet websites. • Inappropriate access to websites and content can be monitored and protected from malicious web sites. 8
  9. 9. Content Filtering Market • Pros • It can be placed in the network and can offer a first line of defense in protecting data loss and malware • A great way to restrict what websites or emails that can be accessed • Cons • Employees may feel that they are being micromanaged and only allowed to visit certain websites • Additional privacy concerns from employees may become a concern as they are being closely monitored 9
  10. 10. Content Filtering Market Key Features •Protect from malware at the gateway •URL and email filtering •Zero-day Web protection Benefits •Added layer of defense for enterprises •Protect from loss of intellectual property and identity theft •Zero-day Web protection •Preserve bandwidth 10
  11. 11. Endpoint Security Frost & Sullivan defines endpoint security as security software that is implemented into devices such as mobile devices laptops, PCs, netbooks, email servers, or file servers. The product is usually offered as a bundled solution for clients and servers or as a standalone product for only a server or client. Technologies include those that prevent and/or recover malware from being launched on a device. A variety of security technologies used by endpoint security providers include: • Anti-virus/anti-malware (signature detection) • Anti-spyware • Personal firewall • Host IDS/IPS • Encryption • Behavior blocking such as heuristics • Whitelisting/blacklisting Source: Dataplex Systems 11
  12. 12. Endpoint Security • Pros • Extend protection to the desktop, laptop, server and mobile devices • Able to control and manage all endpoints that are accessing the network • Cons • Finding the right solution can be confusing • Threats are becoming more complex and malware writers are becoming more skillful in their attacks 12
  13. 13. Endpoint Security Key Features •Protect from malware at the desktop/server •Protection from known and unknown threats •Protection from losing data Benefits •First layer of defense for enterprises •Protect from losing intellectual property and identity theft •Ability to manage and do centralized reporting 13
  14. 14. Managed Security Service Providers • Managed Security Service Provider monitor and manage client’s electronic infrastructure from their Secure Operating Centers (SOC) in order to protect client data and communications from anomalies and attacks. • By utilizing MSSP services, organizations are often able to reduce expenditure on either customer-premise-equipment (CPE) or in-house security specialists while having sound security management. • Security Services are delivered in various ways which include on premise or hosted. Frost & Sullivan splits the MSSP market into three segments which include: Hosted/In the Cloud, CPE/Managed & Monitoring or through Professional/Assessment Services. 14
  15. 15. Managed Security Service Providers • Pros • Lower costs while increasing security posture • Increase security expertise that is lacking in-house • Cons • Businesses worry about handing over confidential information to a 3rd party outsourcing company • Perceived loss of control 15
  16. 16. Managed Security Service Providers Key Features •Protect from malware and threats at the perimeter and at the endpoint •Protection from known and unknown threats •Protection from losing data Benefits •Enhance security posture •Reduce risk and cost •Enhance security expertise 16
  17. 17. Vendors In the Market 17
  18. 18. Future Growth of Social Networking • Total US Population : 302 Million • Number of Households in the USA (2007) : 114 Million (estimate) • 270+ million wireless subscribers in the US (2008) • Total US Internet Users : 223 Million • Over 10,000 simultaneous mobile marketing campaigns running • Laptop PCs Sold in USA in 2007 : 30 Million • Number of Households with Laptops: 48 Million • Over 2.2 billion wireless devices sold globally (2008) • Over 6 trillion mobile messages sent globally • Over 3.2 billion wireless subscribers globally • 670 million 3G subscribers 18
  19. 19. Mobile Social Networking and Move to Add Location and Presence Mobile Social Networking Facebook, LinkedIn, YouTube -100 Million active mobile Facebook users - Facebook reports mobile Facebook users are 2-3x more active than traditional Facebook users - Over 200 Mobile Operators in 60 countries are working to deploy Facebook Mobile Loopt, meetmoi, m-Dating (a way to monetize social networking) -Loopt is an innovative mobile “social-mapping” network Presence + Location combining Facebook-like functionality with real time presence and location. -Many Web 2.0 dating services are taking advantage of social networking and location. 19
  20. 20. Conclusions From the Consumer Perspective • While social networks are great for shopping and news, consumers need to be aware of outstanding threats. • Education is key to understanding threats to the user. • Integrated endpoint security products are available and “free” anti-malware products are available as well. From a Business Perspective • Education and training employees in the proper use of these sites and understanding the threats of displaying too much information. • In addition, users need to be aware of threats in using wireless devices when traveling. • All in all, education and strict policy enforcement along with protection at the endpoint will remain key in reducing the dangers in using these social networking sites. 20
  21. 21. Next Steps Request a proposal for a Growth Partnership Service to support you and your team to accelerate the growth of your company. (myfrost@frost.com) 1-877-GoFrost (1-877-463-7678) Register for the next Chairman’s Series on Growth: Marketing Excellence and the Art of Winning Customers, March 2, 2010, 2 pm ET (http://www.frost.com/growth) Register for Frost & Sullivan’s Growth Opportunity Newsletters and keep abreast of innovative growth opportunities (www.frost.com/news) 21
  22. 22. Your Feedback is Important to Us What would you like to see from Frost & Sullivan? Growth Forecasts? Competitive Structure? Emerging Trends? Strategic Recommendations? Other? Please inform us by taking our survey. 22
  23. 23. For Additional Information Jake Wengroff Craig Hays Director Sales Manager Corporate Communications Information & Communication (210) 247-3806 Technologies jake.wengroff@frost.com (210) 348-6420 chays@frost.com Robert Ayoub Global Manager Network Security practice (210) 247-3808 robert.ayoub@frost.com 23