Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
WHITE PAPER                                     Why You Need to Consider                                  Cloud-Based Secu...
Why You Need to Consider Cloud-Based Security in 2012Executive SummaryProtecting endpoints from various threats is perhaps...
Why You Need to Consider Cloud-Based Security in 2012The Growing Challenges of Email and Web SecurityTHREATS ARE GROWING I...
Why You Need to Consider Cloud-Based Security in 2012•   As discussed later in this white paper, spammers, malware authors...
Why You Need to Consider Cloud-Based Security in 2012Penetration of Company-Supplied and Personal Mobile Devices2011 and 2...
Why You Need to Consider Cloud-Based Security in 2012addition to the more traditional impacts to storage, bandwidth, infra...
Why You Need to Consider Cloud-Based Security in 2012•   Also in November 2010, employees at the Ministry of Economics, Fi...
Why You Need to Consider Cloud-Based Security in 2012Priorities for Security-Related Spending% Responding a Priority or Hi...
Why You Need to Consider Cloud-Based Security in 2012    A cloud security solution – whether used for messaging security, ...
Why You Need to Consider Cloud-Based Security in 2012•   Distribution of security tasks    As a corollary to the point abo...
Why You Need to Consider Cloud-Based Security in 2012Installed Base of Security Solutions by Delivery Model2011 and 2012Th...
Why You Need to Consider Cloud-Based Security in 2012an outright replacement. While many small organizations may opt for a...
Why You Need to Consider Cloud-Based Security in 2012•   What architectural capabilities ensure that there is neither dela...
Why You Need to Consider Cloud-Based Security in 2012    important, even more important is how malicious content is handle...
Why You Need to Consider Cloud-Based Security in 2012Proofpoint, Inc. helps the largest and most successfulcompanies in th...
Why You Need to Consider Cloud-Based Security in 2012SpamTitan, a provider of sophisticated enterpriselevel email and Inte...
Why You Need to Consider Cloud-Based Security in 2012© 2012 Osterman Research, Inc. All rights reserved.No part of this do...
Upcoming SlideShare
Loading in …5
×

Why You Need to Consider Cloud-Based Security in 2012

994 views

Published on

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

Why You Need to Consider Cloud-Based Security in 2012

  1. 1. WHITE PAPER Why You Need to Consider Cloud-Based Security in 2012ON An Osterman Research White Paper Published January 2012 SPONSORED BY ! ! ! SPON ! ! ! sponsored by sponsored by Osterman Research, Inc. P.O. Box 1058 • Black Diamond, Washington • 98010-1058 • USA Tel: +1 253 630 5839 • Fax: +1 253 458 0934 • info@ostermanresearch.com www.ostermanresearch.com • twitter.com/mosterman
  2. 2. Why You Need to Consider Cloud-Based Security in 2012Executive SummaryProtecting endpoints from various threats is perhaps the single most critical function for any ITdepartment. Given the still voluminous quantity of spam that hits corporate email servers, thegrowing threat from malware and advanced persistent threats, and the increasing number ofphysical platforms and Web-based applications that have access to corporate data resources,protecting critical these resources and platforms should be at the top of virtually IT decision-maker’s “must-do” list.However, the sheer volume of these threats and their sophistication in using social engineeringand other methods to penetrate corporate defenses, coupled with an increasingly dispersedworkforce, mean that on-premise security solutions alone will not provide adequate protectionin most cases. Consequently, many organizations have opted for cloud-based securitysolutions, either as complete replacements for their existing on-premise solutions or – morecommonly – as supplements to it.KEY TAKEAWAYSThere are four key takeaways presented in this white paper:• The number, sophistication and consequences of email, Web and other threats is increasing and will require more advanced, faster and more efficient ways of dealing with them.• Security is a priority that has not been lost on IT and business decision makers. Most continue to view security as a top-of-mind issue, resulting in security spending and analysis of new security models as a leading priority in most organizations.• The use of cloud-based security capabilities is increasing at a faster pace than use of on- premise security servers and appliances. While we do not believe that on-premise solutions are by any means going away, their use is being displaced and/or supplemented by cloud services.• Cloud-based services are generally seen as a complement to existing on-premises email security and Web security solutions, rather than an outright replacement, particularly in larger organizations. To an extent this is because some organizations are taking a cautious approach to cloud-based services for email and Web security and will run these in addition to in-house systems. For others – and we believe a growing proportion – the goal is to create a layered security model that performs pre-filtering in the cloud and uses on-premise solutions for the “heavy lifting” tasks associated with data loss prevention (DLP) and other CPU-intensive tasks.ABOUT THIS WHITE PAPERThis white paper discusses key security issues focused on email, Web and other communicationand collaboration systems. It also provides information on the sponsors of this white paper –AppRiver, Proofpoint and SpamTitan – and their relevant offerings. Information on each vendoris provided at the end of this document.©2012 Osterman Research, Inc. 1
  3. 3. Why You Need to Consider Cloud-Based Security in 2012The Growing Challenges of Email and Web SecurityTHREATS ARE GROWING IN SOPHISTICATION AND SEVERITYDuring the past several years, we have observed growing numbers of organizations reportingsecurity violations experienced through the Web and email – albeit with a slight drop in 2011 –as shown in the following figure from an Osterman Research study published in late 2011i.Proportion of Organizations Reporting a Successful Security Violation by Mode2007 through 2011The data in the figure above suggest that security violations – namely malware, phishing andrelated types of attacks – are growing steadily over time. The drop in these issues in our 2011research suggests that defenses against these incursions are becoming somewhat moresuccessful as they become more widely deployed and as organizations are deploying cloud-based defenses as a supplement to traditional on-premise systems. That said, the proportion oforganizations reporting security violations is at a very high level and is creating an enormousnumber of risks for organizations of all sizes and across all industries.SECURITY IS MORE DIFFICULT BECAUSE THERE ARE MORE INGRESS POINTSComplicating the problem of security, and at least partially explaining the growth of malwareincursions over the past several years, are two fundamental problems that virtually allorganizations need to manage:©2012 Osterman Research, Inc. 2
  4. 4. Why You Need to Consider Cloud-Based Security in 2012• As discussed later in this white paper, spammers, malware authors and other criminals are becoming more adept at their craft, they are better financed than in years past, and thus they are better able to penetrate corporate security defenses.• As companies provide users with more mobile platforms, as shown in the following figure, and as employees “consumerize” IT by using their personal devices alongside those supplied by their employer, as shown in the next figure, the number of ingress points for malware continues to increase.Please note that the data in these figures totals to more than 100% because many employeesuse multiple devices.Penetration of Company-Supplied Mobile Devices2009 through 2012©2012 Osterman Research, Inc. 3
  5. 5. Why You Need to Consider Cloud-Based Security in 2012Penetration of Company-Supplied and Personal Mobile Devices2011 and 2013SPAM IS STILL A SERIOUS ISSUEThe good news about spam is that volumes of this unwanted content were substantially lowerin 2011 than in 2010 due to the takedown of various botnets. The bad news is that spamcontinues to represent roughly 75% of all email traversing the Internet.Spam, while not “dangerous” from a security perspective per se, wastes bandwidth, storage,and employee time, not to mention the cost of deploying systems to deal with identifying anderadicating spam from corporate networks. Spam wastes IT’s time, users’ time and drives upthe overall cost of email and other IT-managed systems.MALWARE IS BECOMING A MORE SERIOUS THREATMuch more sinister than the spam problem is malicious email – messages, such as phishing orspearphishing attempts, that are sent with the specific intent of carrying a damaging payload ordirecting a victim to a malware site so that information or funds can be stolen. The growingnumber of keystroke loggers, password-stealing Trojans and other types of malware meansthat corporate data and finances are increasingly at risk. Data theft can include sensitivecontent like usernames and passwords, but it can also include login data for banking systems,customer data, trade secrets and other types of confidential information. The increasing endgoals of stealing information (both personal and corporate), hijacking systems for a wide rangeof purposes and launching additional malicious attacks all have serious business implications, in©2012 Osterman Research, Inc. 4
  6. 6. Why You Need to Consider Cloud-Based Security in 2012addition to the more traditional impacts to storage, bandwidth, infrastructure and other costs.For example, there have been a number of serious malware incursions during the recent past:• A number of children’s game sites have recently been spreading malware. For example, a Czech security firm found that as of January 10, 2012, the children’s site CuteArcade.com had attempted 12,600 Trojan infections. This is a particularly dangerous threat, since many employees work from home on the “family” computer, potentially leading to infections in corporate networks.• In December 2011, the Web site of Amnesty International UK was compromised and was delivering malware to visitors in a “drive-by” attackii.• Also in December 2011, Microsoft discovered malware that infects users’ PCs with a message supposedly from the national police force of various nationsiii. This particular malware variant is unique in that it is delivered primarily in the local language of the victim, affecting users thus far in Germany, Switzerland, the United Kingdom, Spain and the Netherlands.• In September 2011, Mitsubishi Heavy Industries experienced a spearphishing attack that compromised 83 different systems in 10 locations across the companyiv.• In June 2011, the International Monetary Fund (IMF) experienced a spearphishing attack that may have been perpetrated by a rogue state. Although employees were warned not to open unexpected attachments, to open email from unknown senders or to click on video links, malware in an email successfully penetrated IMF defenses and information was stolen from compromised computersv.• In April 2011, hackers sent phishing emails to many lower level employees at security firm RSA. These emails contained the subject line “2011 Recruitment Plan” and included an Excel spreadsheet attachment that contained a zero-day flaw aimed at vulnerability in Adobe Flash. Although the emails were successfully sent to these users’ spam quarantines, the emails were opened and a Trojan was installed that was able to harvest credentials from many employee accounts, compromising RSA’s SecurID tagsvi. As of late 2011, 760 organizations have been attacked using the same command and control, including IBM, Google, Microsoft and about one-fifth of the Fortune 500vii.• On April 7, 2011, a spearphishing attack sent to the Oak Ridge National Laboratory was able to steal a few megabytes of data before IT administrators cut off Internet access. The email sent to employees was supposedly from the lab’s HR department and was received by 530 employees, 57 of whom clicked on a malicious link contained in the emailviii.• In November 2010, a 26-year-old Hungarian citizen, in a strange attempt to be hired by Marriott International, sent an infected email attachment to several Marriott employees that allowed him to steal sensitive information from the company. Marriott estimates that the cost of analyzing the extent of the compromise of its network cost it somewhere between $400,000 and $1 millionix.©2012 Osterman Research, Inc. 5
  7. 7. Why You Need to Consider Cloud-Based Security in 2012• Also in November 2010, employees at the Ministry of Economics, Finances, and Industry in France received spearphishing emails that contained a Trojan. A minimum of 150 computers were compromised and sensitive G-20-related documents were stolenx.The threat of malware rarely ends with the initial victim, since the data stolen is often used togenerate new attacks. For example, data hijacked in the very well publicized Epsilon breach in2011 is now being used to target customers of Chase Bank.BREACHES CARRY MORE RISKThreat that come from the Web – such as those that can infect users who are simply surfingthe Web or using Web 2.0 applications like Facebook or Twitter – are becoming much moreserious as criminals increasingly exploit holes in corporate security defenses, and as usersemploy more Web-based tools. These threats are becoming so costly that many organizationsare at risk of being put out of business through direct financial losses or the loss of data thatcarries with it very high direct and indirect costs.For example, many organizations have been targeted with keystroke loggers, such as Zeus, thatallow criminals to transfer funds out of corporate financial accounts. There have been manycases of this type of theft – many targeted to small and mid-sized organizations that often donot have full-time IT staff – resulting in major financial losses:• Hillary Machinery: $800,000 (its bank was able to recover only $600,000xi)• The Catholic Diocese of Des Moines: $600,000xii• Patco: $588,000xiii• Western Beaver County School District: $700,000xiv• Experi-Metal, Inc.: $560,000xv• Village View Escrow: $465,000xvi• An unidentified construction company in California: $447,000xvii• Choice Escrow: $440,000xviii• The Government of Bullitt County, Kentucky: $415,000xix• The Town of Poughkeepsie, New York: $378,000xx• An unidentified solid waste management company in New York: $150,000xxi• An unidentified law firm in South Carolina: $78,421xxii• Slack Auto Parts: $75,000xxiiiAs bad as these losses are – particularly in light of the fact that most of these organizations arerelatively small and can ill afford to lose amounts this large – the direct loss of funds is not theonly consequence of malware. For example, the 2011 Data Breach Investigations Report foundthat malware was responsible for nearly 80% of lost data in 2010 and was a factor in roughlyone-half of the cases in which data was lostxxiv. Compromised data can include a wide varietyof valuable content, including trade secrets, financial data, marketing plans, server passwordsand other sensitive and confidential information.IMPROVING SECURITY IS A HIGH PRIORITYThe good news on the security front is that the seriousness of problems involving security riskshave not been lost on IT and other decision makers. For example, Web security, anti-virus,anti-spam, and corporate smartphone security capabilities are all fairly strong priorities forspending, as shown in the following figure.©2012 Osterman Research, Inc. 6
  8. 8. Why You Need to Consider Cloud-Based Security in 2012Priorities for Security-Related Spending% Responding a Priority or High PriorityWhy Consider Cloud-Based Security?While on-premises security solutions can provide robust defenses against spam, malware andother security threats, cloud-based security – used either as a standalone solution or inconjunction with on-premise defenses – offers a number of inherent advantages:• Most threats never hit the on-premises network The use of a cloud service for spam processing, for example, eliminates the majority of content processing, storage and bandwidth associated with spam before it ever reaches the customer’s network, making the on-premise infrastructure more efficient. More critically, the bulk of malware can be eradicated before it ever reaches the corporate network, leaving on-premise solutions – if they are in place – to act as another layer of protection against these threats.• More efficient use of IT resources One of the key issues that should be considered by any organization – but one that often is not – is the opportunity cost of IT staff members. Most CIOs and IT managers would agree that finding and retaining highly qualified IT staff is not an easy task. As a result, in-house IT staff should be used so that they can provide maximum efficiency to their employer, while also giving them a satisfying work experience that will motivate them not to move elsewhere.©2012 Osterman Research, Inc. 7
  9. 9. Why You Need to Consider Cloud-Based Security in 2012 A cloud security solution – whether used for messaging security, Web security or other capabilities – allows IT staff members to move on from managing security servers and appliances and to work on projects that provide more differential value to the organization and that can result in greater job satisfaction. More broadly, the use of cloud services allows an organization to focus more on its core business rather than devote resources to managing its security infrastructure. Just like the vast majority of organizations do not generate their own electricity or drill their own water wells, organizations should consider security to be a service that should at least partially be in the cloud.• Reduced total cost of ownership Many decision makers believe that internally managed security systems are less expensive to deploy, configure and manage than cloud services. While in some cases that perception may be true, very often it is not largely because many decision makers do not factor in the total cost of providing robust security capabilities. Many underestimate the cost of labor to manage their security infrastructure and they do not consider the highly disruptive impact of outages and other unforeseen events. A cloud security capability can be significantly less expensive than its on-premise counterpart when all of the costs of security are included.• Easier support for mobile and remote users Given that a growing proportion of the working population is mobile – either because of corporate telework initiatives or employees who travel as part of their work – security for these employees can be difficult to manage using on-premise systems. Cloud security capabilities can provide a high level of protection for these employees, many of whom use Wi-Fi hotspots and other resources that are much less secure than their in-office counterparts.• Rapid deployment of services One of the fundamental benefits of a cloud security service is the speed with which services can be deployed. For example, using a cloud service make it easy to add or subtract small numbers of users, or even entire business units, from a particular service, which is particularly advantageous when integrating merged or acquired companies into an IT infrastructure.• Better prevention of zero-hour threats Cloud service providers typically update their capabilities on a near real-time basis and often have access to new malware signatures sooner than they are made available for user of on- premise systems. Moreover, many cloud security providers run multiple threat detection systems, making their solutions less likely to allow malicious content through to customer endpoints, particularly when used in conjunction with on-premise security solutions.• Extending the life of on-premises solutions Related to the point above is that cloud services allow an organization to extend the useful life of an in-house security solution. For example, if a company has reached the maximum capacity of its email filtering appliances, it could implement a cloud-based spam filtering service that would dramatically reduce the amount of incoming traffic and thereby allow new investments in internal hardware to be postponed or avoided altogether.©2012 Osterman Research, Inc. 8
  10. 10. Why You Need to Consider Cloud-Based Security in 2012• Distribution of security tasks As a corollary to the point above is the inherent advantage of cloud security services to offload the majority of content scanning and filtering from the on-premise infrastructure, leaving on-premise systems free to do the “heavy lifting” of deep content inspection. Because DLP solutions, for example, typically require more CPU horsepower than scanning for spam or known malware, the on-premise infrastructure can be focused more on these CPU-intensive activities.• Very high reliability and ability to better satisfy SLA commitments Cloud service providers can typically invest more resources into their infrastructure than individual organizations can afford and so provide extremely high levels of reliability. Because most cloud service providers maintain very capable data centers, they can typically offer higher levels of reliability and better Service Level Agreements (SLAs) that would be difficult for internally managed systems to match. This allows customers to focus on providing services that offer greater value to their enterprise with the assurance that functionality will be available virtually 100% of the time. It is also important to consider that cloud providers’ data centers are staffed on a 24x7 basis and that capabilities are monitored around the clock – something that would be cost- prohibitive for smaller companies. This means that problems can be dealt with more rapidly than is feasible in many on-premise deployments.• Improved disaster recovery and business continuity Another important advantage of cloud solutions is that they can provide a very useful backup messaging solution in the event of an outage of the primary messaging system. For example, most cloud security providers will spool incoming email for at least several days (much longer in some cases) if it cannot be delivered to a customer’s server. This prevents an email server outage from causing bouncebacks to senders and ensures that incoming email is still being processed.Considering Different Cloud Deployment ModelsCloud services are increasing in popularity and offer a robust option for organizations toimplement a variety of threat-protection capabilities. As shown in the following figure,deployment of security in the cloud is rapidly outpacing growth in both on-premise server andappliance-based solutions.©2012 Osterman Research, Inc. 9
  11. 11. Why You Need to Consider Cloud-Based Security in 2012Installed Base of Security Solutions by Delivery Model2011 and 2012The primary advantages of the cloud model, as discussed above, are that no investments ininfrastructure are required, up-front costs are minimal, ongoing costs are predictable, and allmanagement and upgrades of the system are managed by the cloud provider.A newer approach that is increasingly offered by vendors is to combine on-premiseinfrastructure with cloud services. For example, a vendor may provide a spam-filteringappliance on-site, but couple this with a cloud spam-filtering service that acts as a sort of pre-filter; or they may rely on a cloud-based anti-malware service and desktop anti-virus tools.Many organizations are deploying their own hybrid solutions, mixing and matching variousvendors’ cloud and on-premise offerings into a customized hybrid solution.The fundamental advantage of this layered, hybrid approach is that the on-premiseinfrastructure is protected from unanticipated events like spikes in spam traffic or overallincreases in the volume of malicious traffic over time. This helps to preserve the on-premiseinvestment and maintain stable performance of the IT infrastructure as measured by metricslike email message delivery time or latency in delivering Web pages.Osterman Research believes that in the future cloud-based services will more often be used acomplement to existing on-premises email security and Web security solutions, rather than as©2012 Osterman Research, Inc. 10
  12. 12. Why You Need to Consider Cloud-Based Security in 2012an outright replacement. While many small organizations may opt for a cloud-only securitymodel, most mid-sized and large firms will adopt a hybrid approach.A new deployment offering is that of private cloud based security solutions, a combination ofcloud and virtualization technologies, delivering immediate private cloud based virtualappliances to the customer. This new and interesting option offers all the benefits of the cloud,but with the additional security of a private cloud.What Should You Ask a Cloud-Based Security Provider?There are a number of questions that should be asked of any prospective cloud securityprovider, among which are the following:• What capabilities do you offer and what is on your roadmap? This is perhaps the most critical single question to ask of a cloud security vendor because of the increasing number of communication and collaboration channels for which security will need to be provided. These include social media, file-sharing capabilities, file- synchronization services, various types of Web 2.0 applications and Web services, etc. A cloud vendor that does not keep pace with the long-term requirements of its market, while a solid choice today, might need to be reconsidered at a later date.• How integrated are your services? Giving customers a single pane of glass from which to manage cloud security capabilities – spam quarantines and filters, messaging policies and the like – will make management of these services easier and more efficient.• What is your financial viability? It goes almost without saying that any vendor – but particularly one focused on such a critical offering like messaging, Web and collaboration security – must remain solvent and generate the operating funds needed to continually improve their security solutions.• How secure is your infrastructure? Just how physically secure is the provider’s infrastructure in the context of physical security like video monitoring of the data center(s) and access to servers, backups and other resources that house customer data? While this is more important for cloud services at which customer data is stored for long periods, like archiving services, it is also an important consideration for security vendors, as well.• What certifications have you met? Another important question is the level of certification that cloud providers have met or are planning to meet in the future. Among the certifications that might be considered for review are Statement for Attestation Engagements (SSAE) 16, Statement of Auditing Standards (SAS) 70 Type II, Federal Information Security Management Act of 2002 (FISMA) and International Organization for Standardization (ISO) 27001.©2012 Osterman Research, Inc. 11
  13. 13. Why You Need to Consider Cloud-Based Security in 2012• What architectural capabilities ensure that there is neither delay in message delivery nor any additional, unnecessary risk incurred by storing a copy of the message? This is another important question because it can determine the level of latency introduced by the cloud-screening process. While delays of just a few seconds are unlikely to be noticeable in the vast majority of situations, processing delays of a minute or more might impact message throughput and productivity. Moreover, if a provider must store customers’ content – such as when spooling messages when the primary message system is suffering an outage – how content is stored should be well understood.• Are you using your technology or another vendor’s? It is important to understand which vendors’ technologies are used for malware scanning by each prospective cloud provider, since the efficacy of each provider’s services can be significantly impacted by the technologies they employ. Moreover, it is important to understand how these vendors’ solutions will interact with current on-premise systems in a hybrid deployment.• What provisioning tools are available? The availability of provisioning tools, such as a Web-based interface for adding users, modifying services, monitoring content, etc., can vary from one provider to another.• Where is the data stored? This is another important question, particularly for cloud security providers that spool their customers’ data during outages. For example, non-US companies might opt for a cloud provider with data centers outside of the United States in order to avoid potential access of their content under the PATRIOT Act. Countries in which data protection laws prevent the storage of sensitive or confidential data outside of a particular geography must also be cognizant of exactly where cloud providers store their data.• Do you operate multiple data centers? This is an important question because it impacts message latency, as well as the ability of a cloud provider to meet or exceed its SLAs.• How often are upgrades provided? One of the fundamental advantages of cloud security is that it can be updated on an almost continual basis. Leading cloud providers will update their malware signatures and other elements of their infrastructure frequently.• What are the termination conditions? This is by no means a “show-stopper”, but an important question nonetheless because of its impact on the ability of a customer to migrate to a new cloud security provider easily and rapidly.• What reporting capabilities are available? Robust reporting on spam levels, false positives, malware filtering and other parameters of the cloud security service are important to provide IT administrators with the ability to fine- tune corporate security policies, as well as to determine the overall effectiveness of the security offering. However, while the effectiveness of blocking malicious content is©2012 Osterman Research, Inc. 12
  14. 14. Why You Need to Consider Cloud-Based Security in 2012 important, even more important is how malicious content is handled if it has entered the corporate network.• Are professional services available? While professional services often will not be necessary in the context of cloud security per se, organizations operating hybrid environments may need these types of services to effectively integrate their on-premise capabilities – such as DLP – with cloud services.SummarySecurity is a critical issue that is becoming more complex and more difficult to address. As aresult, organizations of all sizes need to find new and more effective ways of protecting dataand endpoints in their organization, while reducing the cost of doing so to the greatest extentpossible. Cloud security capabilities should seriously be considered as a replacement for, orsupplement to, on-premise security defenses.Sponsors of This White PaperAppRiver, a leading provider of email messaging andWeb security solutions, was among the first syndicatedpartners to bring the new Microsoft Office 365 suite tomarket. With more than 45,000 corporate customersand 8 million mailboxes worldwide, AppRiver is one of !the largest hosted security service providers in theworld. It is that record of success, and the company’s AppRiver, LLCover-the-top commitment to customer care that made 1101 Gulf Breeze ParkwayAppRiver a natural partner during the launch of Office Suite 200365. Gulf Breeze, FL 32561 USAWith Office 365 from AppRiver, theres no upfront +1 866 223 4645investment in software, updates are automatic and www.appriver.comincluded, and service plans may be tried out for free for30 days. There are no cancellation penalties and clients are free to leave at any time. Thatsaid, the company maintains an impressive 93% customer retention rate since inception andbacks its services with award-winning Phenomenal Care™. Every AppRiver customer has VIPaccess to US-based technicians 24 hours a day, every day. What’s more, a team of trainedsales engineers is available to assist customers with complimentary migration to the cloud.AppRiver offers a growing suite of cloud-based security solutions that may be managed within asingle, easy-to-use customer portal. Services include spam and virus protection, secureExchange hosting, email encryption, email continuity, archiving and Web protection. Thecompany is led by an Ernst & Young Florida Entrepreneur of the Year award winner, and hasbeen identified as a Top 20 Cloud Security Vendor in 2011 by Everything Channel’s CRNmagazine. For more information, please visit www.appriver.com.©2012 Osterman Research, Inc. 13
  15. 15. Why You Need to Consider Cloud-Based Security in 2012Proofpoint, Inc. helps the largest and most successfulcompanies in the world protect and govern their most !sensitive data. Proofpoint is a pioneering security-as-a-service provider that focuses on cloud-based solutions Proofpoint, Inc.for threat protection, compliance, archiving & 892 Ross Drivegovernance and secure communications. Sunnyvale, CA 94089 USAOrganizations around the world depend on Proofpoint’s +1 408 517 4710expertise, patented technologies and on-demand www.proofpoint.com!delivery system to protect against phishing, malwareand spam, safeguard privacy, encrypt sensitiveinformation, and archive and govern messages and critical enterprise information. Proofpoint’scloud-based data protection solutions include:• Proofpoint Enterprise Protection delivers the industry’s most comprehensive threat classification and email security management solution against phish, virus, spam, and other email-borne threats. Robust outbound email features include outbound spam/virus detection and email policy enforcement.• Proofpoint Enterprise Privacy provides powerful data loss prevention, protection and encryption capabilities—the easiest and most cost-effective way for organizations to prevent leaks of sensitive data. Powerful policies help organizations protect email data based on the role of specific users. Advanced, deep content analysis monitors and classifies both structured and unstructured data, ensuring that all sensitive information is protected. The policy-based encryption capabilities of the included Proofpoint Encryption solution support both desktop and mobile users, ensuring an easy, seamless experience from any device.• Proofpoint Enterprise Archive is an on-demand email archiving solution that addresses three key challenges—legal discovery, SEC/FINRA compliance and end user email management—without the headaches of managing email archiving in-house. Proofpoint Enterprise Archive can be utilized for search anytime-anywhere with sustainably fast, reliable performance uniquely backed by a Search Performance Guarantee.• Proofpoint Enterprise Governance is an enterprise information governance solution that allows organizations to easily track, classify, apply policies and monitor unstructured information wherever it exists across the enterprise. Using patented Digital Thread® technology, Proofpoint Enterprise Governance follows every document as it proliferates and migrates, allowing you to take control of all the unstructured, unmanaged, and de- centralized documents in your enterprise.Learn more about Proofpoint solutions at http://www.proofpoint.com/productsHeadquartered in Sunnyvale, California, Proofpoint has offices around the globe includingCanada, Japan, the United Kingdom, Asia Pacific, Europe and Mexico.©2012 Osterman Research, Inc. 14
  16. 16. Why You Need to Consider Cloud-Based Security in 2012SpamTitan, a provider of sophisticated enterpriselevel email and Internet security solutions, is a globalcompany with customers utilizing their software infive continents. Customers range from smallbusinesses with as few as 10 users to organizations SpamTitanwith 40,000-plus users. IDA Business Park GalwaySpamTitan on Demand offers businesses an on Irelanddemand private cloud virtual appliance solution +1 201 984 3271providing the most comprehensive protection from www.spamtitan.comemail threats, including spam, viruses, Trojans,Phishing, Malware and other unwanted content. SpamTitan’s unique approach in utilizing next-generation virtualization software combined with the cloud eliminates the need for unwieldyhardware and shared resources, giving customers unparalleled flexibility, versatility andscalability but at an affordable price. Integrating best-of-breed technologies.SpamTitan is also used by many Internet Service Providers to offer managed email services totheir clients. SpamTitan is one of a select few to have achieved VMware’s Certified VirtualAppliance status and was one of the first products to be awarded the certification.WebTitan is a gateway Internet monitoring, filtering and reporting solution. It offersorganizations protection to their data and users from malware and other internet threats suchas viruses, spyware, and phishing as well as providing user policy browsing tools to ensurecorporate internet policy is adhered to in the new world of Web 2.0.©2012 Osterman Research, Inc. 15
  17. 17. Why You Need to Consider Cloud-Based Security in 2012© 2012 Osterman Research, Inc. All rights reserved.No part of this document may be reproduced in any form by any means, nor may it be distributed without the permission ofOsterman Research, Inc., nor may it be resold or distributed by any entity other than Osterman Research, Inc., without priorwritten authorization of Osterman Research, Inc.Osterman Research, Inc. does not provide legal advice. Nothing in this document constitutes legal advice, nor shall this documentor any software product or other offering referenced herein serve as a substitute for the reader’s compliance with any laws(including but not limited to any act, statue, regulation, rule, directive, administrative order, executive order, etc. (collectively,“Laws”)) referenced in this document. If necessary, the reader should consult with competent legal counsel regarding any Lawsreferenced herein. Osterman Research, Inc. makes no representation or warranty regarding the completeness or accuracy of theinformation contained in this document.THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND. ALL EXPRESS OR IMPLIED REPRESENTATIONS,CONDITIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULARPURPOSE, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE DETERMINED TO BE ILLEGAL.i Messaging and Web Security Market Trends, 2011-2014; Osterman Research, Inc.ii http://www.zdnet.com/blog/security/amnesty-international-uk-compromised-serving-exploits-and-malware/9861iii http://blogs.technet.com/b/mmpc/archive/2011/12/19/disorderly-conduct-localized-malware-impersonates-the-police.aspxiv http://www.eweek.com/c/a/Security/Mitsubishi-Heavy-Network-Most-Likey-Compromised-by-SpearPhishing-Attack-335314/v http://www.eweek.com/c/a/Security/IMF-Breach-May-Be-StateSponsored-Spear-Phishing-Attack-526401/vi http://www.pcmag.com/article2/0,2817,2382970,00.asp#fbid=uW9bd7GksLRvii http://money.cnn.com/2011/10/27/technology/rsa_hack_widespread/index.htmviii http://www.wired.com/threatlevel/2011/04/oak-ridge-lab-hack/ix http://www.courthousenews.com/2011/11/29/41751.htmx http://arstechnica.com/security/news/2011/03/hackers-spear-phish-infiltrate-french-ministry-of-finances.arsxi http://rixstep.com/1/1/20100126,00.shtmlxii http://krebsonsecurity.com/tag/catholic-diocese-of-des-moines/xiii http://www.networkworld.com/news/2009/092409-construction-firm-sues-after-588000.htmlxiv http://www.post-gazette.com/pg/09195/983738-57.stmxv http://www.computerworld.com/s/article/9156558/Michigan_firm_sues_bank_over_theft_of_560_000_xvi http://krebsonsecurity.com/2010/06/e-banking-bandits-stole-465000-from-calif-escrow-firm/xvii http://www.technologyreview.com/computing/23488/?a=fxviii http://www.bankinfosecurity.com/articles.php?art_id=3159&opg=1xix http://voices.washingtonpost.com/securityfix/2009/07/an_odyssey_of_fraud_part_ii.htmlxx http://www.computerworld.com/s/article/9153598/Poughkeepsie_N.Y._slams_bank_for_378_000_online_theftxxi http://www.suite101.com/content/protect-yourself-against-banking-crimeware-a156086xxii http://www.abajournal.com/news/article/doj_says_massive_decade-old_botnet_helped_web_thieves_steal_millions/xxiii http://voices.washingtonpost.com/securityfix/2009/07/the_pitfalls_of_business_banki.htmlxxiv http://gocsi.com/public/dbir©2012 Osterman Research, Inc. 16

×