The document discusses the rise of mobile field workers and remote work. It explores the evolving security landscape and threats facing remote workers. It then summarizes security solutions like mobile VPNs that can help secure access for remote workers. The document defines mobile VPNs and provides an analysis of the global mobile VPN market, noting that growth will be fueled by increasing wireless device usage and that the top vendors in the space are expected to be Cisco, Juniper, and NetMotion Wireless.
Wireless Vulnerability Management: What It Means for Your EnterpriseAirTight Networks
The instant and obvious benefits of WiFi have made WLANs a big success
in public, private, and enterprise sectors. Unfortunately, the adoption of
correct security measures for WLANs is lagging far behind the fast pace
at which these networks are being deployed. The presence of WiFi in
most laptops and handhelds, the simplicity of independently installing
WiFi networks, and the ease of exploiting wireless vulnerabilities have
together escalated the risks manifold. Even organizations that do not
own a WLAN are equally at risk.
The Top 20 Cyberattacks on Industrial Control SystemsMuhammad FAHAD
Executive Summary
No industrial operation is free of risk, and different industrial enterprises may legitimately have different “appetites” for certain types of risks. Evaluating cyber risk in industrial control system (ICS) networks is difficult, considering their complex nature. For example, an evaluation can consider (explicitly or implicitly) up to hundreds of millions of branches of a complex attack tree modelling of cyberattacks interaction with cyber, physical, safety and protection equipment and processes. This paper was written to assist cyber professionals to understand and communicate the results of such risk assessments to non-technical business decision-makers.
This paper proposes that cyber risk be communicated as a Design Basis Threat (DBT) line drawn through a representative “Top 20” set of cyberattacks spread across a spectrum of attack sophistication. These Top 20 attacks have been selected to represent cyber threats to industrial sites across a wide range of circumstances, consequences and sophistication. Many industrial cyber risk practitioners will find the list useful as-is, while expert practitioners may choose to adapt the list to their more detailed understanding of their own sites’ circumstances.
2009 Security Mega Trends & Emerging ThreatsLumension
To help define what the biggest security threats will be to an organization’s sensitive and confidential data over the next 12 to 24 months, Lumension has teamed up with the Ponemon Institute, a leading research firm, to charter our first annual 2009 Security Mega Trends Survey. The survey also outlines key alignments and gaps between two traditionally disparate groups - IT Security and IT Operations when it comes to these new and emerging threats.
Wireless Vulnerability Management: What It Means for Your EnterpriseAirTight Networks
The instant and obvious benefits of WiFi have made WLANs a big success
in public, private, and enterprise sectors. Unfortunately, the adoption of
correct security measures for WLANs is lagging far behind the fast pace
at which these networks are being deployed. The presence of WiFi in
most laptops and handhelds, the simplicity of independently installing
WiFi networks, and the ease of exploiting wireless vulnerabilities have
together escalated the risks manifold. Even organizations that do not
own a WLAN are equally at risk.
The Top 20 Cyberattacks on Industrial Control SystemsMuhammad FAHAD
Executive Summary
No industrial operation is free of risk, and different industrial enterprises may legitimately have different “appetites” for certain types of risks. Evaluating cyber risk in industrial control system (ICS) networks is difficult, considering their complex nature. For example, an evaluation can consider (explicitly or implicitly) up to hundreds of millions of branches of a complex attack tree modelling of cyberattacks interaction with cyber, physical, safety and protection equipment and processes. This paper was written to assist cyber professionals to understand and communicate the results of such risk assessments to non-technical business decision-makers.
This paper proposes that cyber risk be communicated as a Design Basis Threat (DBT) line drawn through a representative “Top 20” set of cyberattacks spread across a spectrum of attack sophistication. These Top 20 attacks have been selected to represent cyber threats to industrial sites across a wide range of circumstances, consequences and sophistication. Many industrial cyber risk practitioners will find the list useful as-is, while expert practitioners may choose to adapt the list to their more detailed understanding of their own sites’ circumstances.
2009 Security Mega Trends & Emerging ThreatsLumension
To help define what the biggest security threats will be to an organization’s sensitive and confidential data over the next 12 to 24 months, Lumension has teamed up with the Ponemon Institute, a leading research firm, to charter our first annual 2009 Security Mega Trends Survey. The survey also outlines key alignments and gaps between two traditionally disparate groups - IT Security and IT Operations when it comes to these new and emerging threats.
BMC - Response to the SolarWinds Breach/MalwareMike Rizzo
BMC response to the SolarWinds Breach
Critical compromise to the Solarwinds Orion platform has created an immediate need to respond to the threat from a likely state sponsored actor (Russia)
Marlabs offers an overview of the kind of threats facing technology today and explains the service offerings that will help ensure data security at all costs.
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks
Mobile devices are always on the move, switching from network to network and place to place constantly. The best way to keep your company's information safe is through a unified approach securing at the device, app and network levels.
The Essential Ingredient for Today's EnterpriseReadWrite
The innovation that comes with the mobile enterprise are immense but problems come with this new world of devices. Namely the huge security concerns that arise. Devices can carry so much important information. How do you control it?
This paper from CIO Custom Solutions Group examines the mobile security landscape, including myths surrounding the risks and threats, and how organizations can establish a solid mobile security strategy.
BMC - Response to the SolarWinds Breach/MalwareMike Rizzo
BMC response to the SolarWinds Breach
Critical compromise to the Solarwinds Orion platform has created an immediate need to respond to the threat from a likely state sponsored actor (Russia)
Marlabs offers an overview of the kind of threats facing technology today and explains the service offerings that will help ensure data security at all costs.
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks
Mobile devices are always on the move, switching from network to network and place to place constantly. The best way to keep your company's information safe is through a unified approach securing at the device, app and network levels.
The Essential Ingredient for Today's EnterpriseReadWrite
The innovation that comes with the mobile enterprise are immense but problems come with this new world of devices. Namely the huge security concerns that arise. Devices can carry so much important information. How do you control it?
This paper from CIO Custom Solutions Group examines the mobile security landscape, including myths surrounding the risks and threats, and how organizations can establish a solid mobile security strategy.
ALTASYS Conseil accompagne les collaborateurs dans l’amélioration de leurs compétences et dans la mise en pratique des actions élaborées au cours du projet d’amélioration
Il est également possible de faire intervenir ALTASYS Conseil exclusivement sur des modules de formation intra-entreprise, sans pour autant entamer une démarche de conseil
Becoming the safe choice for the cloud by addressing cloud fraud & security t...cVidya Networks
Nava Levy, cVidya's VP SaaS/Cloud Solutions, chaired and spoke at TM Forum's Management World America's 2011 on Racing Ahead of the Competition by Capitalizing on Your Potential to be the Safe and Secure Choice for Cloud at The Race to Cloud Services Summit
The three main categories of the data network environment effecting IT security are all undergoing major change simultaneously. In the year ahead, these changes will manifest themselves as security challenges. These trends fall into three categories: client devices (the consumerization of IT); the external threat environment (the institutionalization of threat development); and the hosting environment (virtualization). Any one of these dynamics should shade the thinking of IT strategists inside companies and other organizations. Taken together, they may spur major re-evaluations of current practices.
In 2020, many telecommunication companies will debut their first commercial 5G networks. The 5G mission has become a hot-button topic for the entire telecom community. But these networks have inherited many threats from their 3G and 4G forebears. Long-known weaknesses in security protocols and algorithms have been baked into new 5G systems. This creates a perfect storm for threat actors to target 5G security weaknesses using their old tricks.
Watch the webinar recording, where PT experts Paolo Emiliani, Head of Pre-Sales Engineering team, and Jun Kim, Managing Director, Korea, help you to navigate the tricky path to 5G deployment and:
explain new 5G trust and service delivery models
assess the evolving 5G threat landscape and privacy issues
explore realms of 5G protection with a focus on real-life cases
discuss new and emerging 5G threats affecting telecom infrastructure and end devices
explain why roaming protection in 5G is a game-changer
underline essential mitigation techniques for 5G security
Follow us on LinkedIn to keep up with our upcoming webinars and events: https://www.linkedin.com/company/positive-tech/
As cyber attacks and network hacks become increasingly sophisticated, not only do you have to set up security infrastructure complete with firewalls, anti-virus software, malware scanners and intrusion prevention, but you have to maintain all this stuff daily. It’s a moving target and you don’t have the time to do it full time! Enter managed security, also known as cloud-based or hosted security. See this slideshow snapshot of the presentation.
Pulse 2013 Mobile Build and Connect presentationLeigh Williamson
Presentation made at Pulse2013 about the new IBM MobileFirst brand and portfolio, especially focusing on our solutions to help clients build & connect their mobile apps.
This webinar will explore the less-discussed topics of a mobile security strategy that everyone should understand – before it’s too late. Watch on-demand here: https://symc.ly/2z6hUsM.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
Simon Wong and Chris Cram, Scalar security experts, discuss how Palo Alto Networks technology disrupts the entire malware kill chain. Attendees will also gain insight on flexible deployment options to better serve their mobile users, and how to get the most out of their Palo Alto Networks deployment.
Yamana is our mobile device management service by which it gets easy to ensure that the Company’s employees use their mobile devices within the bounds of corporate policies.
Similar to Net motion wireless-and_frost-sullivan_a-new-mobilty_ps (20)
2. Speakers
Sarah Howland, Editor‐In‐Chief
Field Technologies Magazine
Martha Vazquez, Industry Analyst
Frost & Sullivan
Andy Willett, Senior Vice President
NetMotion Wireless
2
4. Today’s Presenter
Functional Expertise
• Experience in market research, consulting sales and business development with expertise in the
Information Communications and Technology Network Security sector.
• Developing research and analysis in the Network Security industry in areas such as:
- Technology and Demand Trends
- Market Sizing
- Market Forecasting and Strategic Analysis
Industry Expertise
Experience base in the information communication technologies sector, leveraging long-standing
working relationships with leading industry participants’ Senior Executives
- Mobile Security
Martha Vazquez - Endpoint Security
Industry Analyst - Managed Security Service Providers (MSSPs)
- Content Filtering
Frost & Sullivan What I bring to the Team
North America Expertise in managing executive level relationships
San Antonio, TX In-depth understanding of the network security market
Experience in understanding market trends and forecasting
Career Highlights
Sales Consultant in several leading Wireless firms:
- AT&T
- Verizon Wireless
Education
• Master of Business Administration from Our Lady of the Lake University, San Antonio, Texas
• Bachelor of Science from Texas State University, San Marcos, Texas
4
5. Focus Points
• The rise in mobile field workers
• The needs and challenges for the remote worker
• The evolving security landscape
• Security solutions used to support the mobile field worker
• Defining a Mobile VPN
• The future outlook for the Mobile VPN market
• The Last Word
5
6. Poll Question
• What is the status of your mobile security strategy in place?
1. In place today
2. Don’t have one and are assessing what to do.
3. To be completed in 3 months
4. To be completed in 6 months
• Do you believe that remote workers threaten your corporate
environment?
1. Yes, we need to ensure employees securely access our
network
2. No, we don’t believe the threat is significant
6
7. The Rise in Mobile Field Workers
Proliferation of Wireless Devices
Source: Frost & Sullivan analysis
7
8. The needs and challenges for the remote worker
Mobile VPN Market: Key Market Drivers and Restraints Global, 2011-2020
Increase in advanced and complex threats drives 1-2 years 3-5 years 6-10 years
demand for Mobile VPN solutions to help manage security
on wireless devices
Market Drivers
Use of mobile or wireless devices within organizations
drives the demand for Mobile VPN solutions
Compliance regulations requires organizations to
implement products such as mobile VPNs
Need for remote accessibility drives the
need for secure and continuous access to
critical data
Budget Concerns due to the global 2011/12
economic slowdown impacts the purchase of
Market Restraints
mobile VPN solutions
The need to support multiple operating systems
slows down mobile VPN development and sales
Customer confusion about the importance of
mobile security solutions delays spending on
products including mobile VPNs
Impact: High Medium Low Source: Frost & Sullivan analysis.
8
9. The Evolving Threat Landscape
*Malware-as-a-Service (MaaS)
Malware becomes more
sophisticated over time,
while malware tools
emerge as a popular
commodity.
APT & *MaaS
Mobile Malware
Trojans, Botnets, Root kits
(Zeus)
2006 2011 Beyond 2012
Source: Frost & Sullivan analysis
9
10. Security solutions that support the remote worker
Mobile VPN Anti-malware
Application and
Content Security
Device Control
Central
Management
Data Loss Network Access
Prevention Control
Complete Mobile Security Solution
Source: Frost & Sullivan analysis
10
11. Defining a Mobile VPN
• A Mobile VPN is defined as a specific type of VPN that is
based on security standards such as Mobile IP, IPSec or
SSL but us built for wireless or mobile coverage.
o Security
o Session Persistence
o Application Persistence
o Network Transparency
o Bandwidth Optimization
Source: Frost & Sullivan analysis
11
12. Global Mobile VPN Market
Key Takeaway: An increase in using wireless devices will fuel revenue growth
through 2016
Source: Frost & Sullivan analysis
12
13. Global Mobile VPN Market
Key Takeaway: The highest penetration rates are expected to come from Cisco,
Juniper, and NetMotion Wireless
Competitor Growth Analysis
Total Mobile VPN Products Market: Global, 2010
Growth rate 2009-2010
Juniper Cisco
Networks
NetMotion Wireless
IBM
Smith Micro
Software
Birdstep Radio IP
Technologies
Check Point Software
Technologies
Columbitech
Revenue ($ Million)
> 10% growth 10-20% Growth > 20% Growth
Note: Bubble size represents relative capitalization. The
base year is 2010. Source: Frost & Sullivan analysis.
<N9B3-74> 13
14. The Future Outlook for the Mobile VPN Market
As the need for mobile device security continues to increase, the mobile
1 VPN market will experience a healthy CAGR of 18.4 percent
The value of the mobile VPN market is expected to reach $522M by
2 2017.
Demand for mobile VPN technologies is increasing as businesses adopt
3 more mobile devices.
Mobile VPN will be integrated into security solutions suites and will not
4 remain a separate product.
Adoption in the mobile VPN market remains high for telecoms and
5 government markets.
Source: Frost & Sullivan analysis.
<N9B3-74> 14
15. For Additional Information
Mireya Espinoza Martha Vazquez
Global Director Industry Analyst
Corporate Communications Network Security- ICT
(210) 247-3870 (210) 247-3864
Mireya.espinoza@frost.com Martha.vazquez@frost.com
Jennifer Bates Craig Hays
Director of Consulting VP of Sales, North America
Information and Communication Information and Communications
Technologies Technologies
(940) 455-7475 (210)247-2460
Jennifer.bates@frost.com chays@frost.com
<N9B3-74> 15
17. Agenda
Background
Common Challenges to Mobile Deployments
Considerations for Mobile VPN Software
Q&A
17
18. Background
NetMotion Wireless
• Based in Seattle, WA
• Software provider focused
on challenges of mobile field
workers and wireless
Andy Willett
• 11 years at NetMotion
Wireless
• 11 years at AT&T Wireless
and Sprint Wireless
18
19. Common Challenges to Mobile Deployments
For Mobile Workers:
• Frequent log‐ins, coverage drops
hurts productivity
▪ Time taken away from project
▪ Drain on IT helpdesk Case Study:
Regional Public Utility
▪ Application crashes
The math added up:
• Complexity of technology leads to
• ~ 200 field workers
low adoption
• ~ 1 hour per day troubleshooting
▪ Field workers revert to old methods connectivity issues/re-logins
▪ Solution too complex • Multiplied by hourly rate
• Added to IT helpdesk requests
• Equaled large amounts of lost
productivity each day
7/23/2012 19
20. Common Challenges to Mobile Deployments
For IT Managers:
• Limited visibility, management and
control into mobile workforce
activities and devices
▪ Limited control of data access while
mobile
▪ Limited insight into bandwidth drains
▪ No application control
• Limited control over at‐risk data and
anti‐virus support
▪ Users and networks at greater risk
▪ Limited ability to enforce policies
▪ Limited control over device upgrades
7/23/2012 20
21. Considerations for Mobile VPN Software
Management
• Centralized web‐based console
• Granular view into all devices and usage
• Ability to generate historical reports
Security
• Advanced encryption and authentication
• Ability to quarantine, verify, and control
devices and applications
• Ability to create and enforce security policies
Productivity
• Low complexity, single sign‐on
• Application persistence through suspend
• Optimization of bandwidth and connections
22. Summary
Overcoming Common Challenges
• Dropped coverage, application freezes hurt productivity
• Limited visibility into workforce activities limits policy control
• Lack of application level data control creates security risks
Requirements you Need
• Create granular visibility into your mobile workforce
activities with Management tools
• Ensure seamless roaming coverage to increase Productivity
• Get complete application level control of data in transit
with stringent Security coverage
22
7/23/2012