SlideShare a Scribd company logo
SMB Security Opportunity –
Use and Plans for Solutions and Profile
of "Security Intensives"
Agenda
• SMB definition
• The “Four Pillars” and security implications for SMBs
• Technology spend priorities – Security importance
• SMB “Security intensives” profile – Technology use,
share of different SMB verticals
• Current and planned security capabilities – SB vs. MB
• Security intensives vs. total SMBs -- Current and
planned security capabilities
• Essential Guidance
2
Midsize Business (100–999)
102 thousand
Small Business
(1-99 emp)
Consumer
Households
6.2 million
22.4 million
115 million
Large Business (1,000+) 9 thousand
U.S. Market Pyramid for Year-End 2012
– Company Counts
Home business/
Zero empl
IT spending increases
with size, number of
firms decreases
Source: US Dept of Commerce BLS, IDC, 2013
3
Four Pillars For SMB Success –
Security Key for Mobility and Cloud
Down from Enterprise:
Cloud and Big Data
Up from Consumer:
Social and Mobile
SMB Productivity
Remote/Mobile Worker Dynamics
+ Changing Employee/Employer Roles
Social Mobile Big DataCloud
4
US SMB Top Technology Spending
Priorities: “Keep Lights On,” Then Expand
Total SMB
Small Bus
(<100 emp)
Mid-Sized Bus
(100-999 emp)
Large Bus
1000-4999 emp
Upgrade PCs 45.4% 38.8% 37.0%
Enhance servers/network infrastructure 11.4% 33.1% 39.4%
Increase storage capacity/Improve
storage management
11.3% 24.3% 36.9%
Improve network security/Security mgt 17.3% 31.4% 38.0%
Support for employee-owned
devices/BYOD
4.3% 15.1% 22.7%
Expand use of GoogleApps/Free
resources
10.3% 4.2% 7.9%
Increase use of online/off-prem resources 9.0% 22.8% 39.3%
Off prem interest similar for infrastructure, pers productivity, collab
Source: IDC’s SMB Survey, 2012
5
Share of “Security Intensive” SMBs by
Vertical (Percent Citing Security as Top Priority)
Total: 17.4% for all SMBs Share of SMBs
Agriculture/Mining/Construction 17.3%
Manufacturing 16.2%
Communications 43.5%
Banking/Finance/Securities 20.1%
Architecture/Engineering 71.7%
Legal Services 24.8%
Healthcare 42.1%
Wholesale Trade 32.8%
Retail Trade 9.0%
Other Consumer Svcs/Entertainment/Accommodation 16.3%
Other Prof/Tech/Scientific services 28.1%
Other Business Services 6.1%
Real estate & Insur <10%
Source: IDC’s SMB Survey, 2012
6
Technology Use and IT Resources:
Total SB & MB vs. “Security Intensives”
Total
SBs
SB Security
Intensives
Total
MBs
MB Security
Intensives
Have Full time IT Staff 11.9% 24.9% 85.8% 92.1%
Local Area Network Use 51.3% 70.9% 75.1% 90.1%
Mean Number of Servers 2.2 3.0 16.7 13.1
Use Server Virtualization 32.0% 39.6% 71.1% 68.2%
Use Cloud-Based
Services
12.6% 15.8% 48.1% 55.3%
SB Security intensives show much higher tech use than SB Total, but
MBs don’t show as much difference (except in LAN penetration)
Source: IDC’s SMB Survey, 2012
77
Top Security Capabilities Used by SMBs
Small Bus Mid-Sized Bus
Network antimalware (anti-virus, anti-spoof etc 62.8% 57.6%
Endpoint/PC desktop/notebook antimalware 45.1% 43.5%
Network firewall 53.5% 57.3%
Anti-spam gateway (block unsolicited email) 44.4% 46.3%
Internet site blocking – URL Filtering 21.1% 33.6%
Network intrusion detection/prevention 19.6% 39.3%
Email based Data loss prevention – DLP 10.6% 25.9%
Network based DLP 3.5% 20.0%
Email scanning for viruses/other malware 53.3% 51.8%
SSL for secure ecommerce transactions 11.4% 25.1%
Email encryption 11.6% 23.0%
Multiple response, of courseSource: IDC’s SMB Survey, 2012
8
Top Security Capabilities Planned for
Purchase by SMBs in Next 12 Months
Small Bus Mid-Sized Bus
Network antimalware (anti-virus, anti-spoof etc 11.3% 16.6%
Endpoint/PC desktop/notebook antimalware 5.7% 15.6%
Network firewall 4.4% 16.5%
Anti-spam gateway (block unsolicited email) 6.0% 15.7%
Internet site blocking – URL Filtering 2.8% 16.5%
Network intrusion detection/prevention 6.9% 22.2%
Email based Data loss prevention – DLP 4.7% 15.9%
Network based DLP 3.5% 11.2%
Email scanning for viruses/other malware 5.0% 15.0%
SSL for secure ecommerce transactions 4.8% 11.9%
Email encryption 6.4% 13.7%
Source: IDC’s SMB Survey, 2012 Double digit for MBs for all!
9
Top Security Capabilities Used by
SMBs – Part 2
Small Bus
Mid-Sized
Bus
EV (Extended Validation) SSL certificate 5.0% 15.2%
Identity and access management (IAM) 6.1% 14.6%
Patch management 4.6% 16.7%
Device vulnerability assessment 5.9% 12.0%
Web application vulerability assessment 5.6% 15.0%
Laptop encryption (full disk encryption) 6.0% 17.7%
Mobile device management 7.1% 17.9%
Single sign on (easier access to multiple
resources)
5.0% 13.7%
Two factor authentication 3.1% 7.9%
Mid Size use 2-3X SB use
Source: IDC’s SMB Survey, 2012
10
Security Capabilities Planned for
Purchase by SMBs – Part 2
Small Bus Mid-Sized Bus
EV (Extended Validation) SSL certificate 2.3% 11.3%
Identity and access management (IAM) 3.6% 8.5%
Patch management 2.2% 13.1%
Device vulnerability assessment 1.8% 7.4%
Web application vulerability assessment 2.8% 6.0%
Laptop encryption (full disk encryption) 4.4% 11.9%
Mobile device management 7.7% 17.9%
Single sign on (easier access to multiple
resources)
2.1% 5.7%
Two factor authentication 1.8% 7.8%
Source: IDC’s SMB Survey, 2012
11
Share of SMB Security Spending by Type
SBs MBs
Hardware 24.8% 27.1%
Software 54.2% 38.9%
SaaS 5.1% 14.8%
Services 16.0% 19.1%
Software key for all, but note SaaS use by MBs,
Services too
Source: IDC’s SMB Survey, 2012
1212
Share of SMB Security Spending by
Type – Total vs. “Security Intensives”
Total
SBs
SB Security
Intensives
Total
MBs
MB Security
Intensives
Hardware 24.8% 24.2% 27.1% 26.7%
Software 54.2% 49.8% 38.9% 36.1%
SaaS 5.1% 9.2% 14.8% 16.8%
Services 16.0% 16.9% 19.1% 20.5%
Security intensives cite “Improve Network Security/Security
Management” as a top IT spending priority for next 12 months:
17.3% SBs
31.4% MBs
Source: IDC’s SMB Survey, 2012
1313
Security Products Planned for Purchase by
SMBs vs SMB “Security Intensives” Pt 1
Planned for Acquire in Next
12 Months
Total
SB
SB Security
Intensives
Total
MB
MB Security
Intensives
Network antimalware (anti-virus,
anti-spoof etc
11.3% 18.4% 16.6% 25.1%
Endpoint/PC desktop/notebook
antimalware
5.7% 7.6% 15.6% 11.7%
Network firewall 4.4% 6.4% 16.5% 20.0%
Anti-spam gateway (block
unsolicited email)
6.0% 4.9% 15.7% 17.1%
Internet site blocking – URL
Filtering
2.8% 6.1% 16.5% 19.0%
Network intrusion
detection/prevention
6.9% 17.8% 22.2% 30.5%
Email based Data loss prevention
– DLP
4.7% 6.5% 15.9% 21.4%
Double digit for MBs for all!Source: IDC’s SMB Survey, 2012
14
Security Products Planned for Purchase by
SMBs vs SMB “Security Intensives” Pt 2
Planned for Acquire in Next
12 Months
Total
SB
SB Security
Intensive
Total
MB
MB Security
Intensive
Network based DLP 3.5% 6.7% 11.2% 13.0%
Email scanning for viruses/other
malware
5.0% 9.7% 15.0% 17.2%
SSL for secure ecommerce
transactions
4.8% 6.9% 11.9% 23.7%
Email encryption 6.4% 11.3% 13.7% 19.2%
EV (Extended Validation) SSL
certificate
2.3% 6.0% 11.3% 17.2%
Identity and access management
(IAM)
3.6% 5.8% 8.5% 8.1%
Patch management 2.2% 6.5% 13.1% 16.8%
Double digit for MBs for all but IAM
Source: IDC’s SMB Survey, 2012
15
Security Products Planned for Purchase by
SMBs vs SMB “Security Intensives” Pt 3
Planned for Acquire in Next
12 Months
Total
SB
SB Security
Intensive
Total
MB
MB Security
Intensive
Device vulnerability assessment 1.8% 4.0% 7.4% 8.3%
Web application vulerability
assessment
2.8% 4.9% 6.0% 8.4%
Laptop encryption (full disk
encryption)
4.4% 10.3% 11.9% 17.9%
Mobile device management 7.7% 15.9% 17.9% 24.0%
Single sign on (easier access to
multiple resources)
2.1% 4.1% 5.7% 2.9%
Two factor authentication 1.8% 5.0% 7.8% 9.8%
Source: IDC’s SMB Survey, 2012
16
Essential Guidance: Key Takeaways
for SMB Security Providers
• Great SMB interest in harnessing
technology better – but question of
best ways how? Security shifting from
defense to enabler.
• Online security resource access will
be of increasing interest – Shifting
share of security spending with SaaS
share on the rise.
• Multidimensional aspect of security
risks makes comprehensive coverage
more of a challenge. Mobility
(endpoint) as well as network
coverage will be key as SMB refine
company security strategy.
17

More Related Content

What's hot

Actionable insights
Actionable insightsActionable insights
Actionable insights
Tim Youm
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
RapidValue
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
IBM Security
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
IBM Security
 
Securing Office 365
Securing Office 365Securing Office 365
Securing Office 365
Symantec
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the Mouse
IBM Security
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
Bjørn Sloth
 
IBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References GuideIBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References Guide
Francisco González Jiménez
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks
 
The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014
Symantec
 
Tachyon_Flyer
Tachyon_FlyerTachyon_Flyer
Tachyon_Flyer
Peter Laitin
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
IBM Security
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security
 
Secure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsSecure Mobility from GGR Communications
Secure Mobility from GGR Communications
GGR Communications
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
John Rhoton
 
2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging Threats2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging Threats
Lumension
 
Thinking of choosing Sophos?
Thinking of choosing Sophos?Thinking of choosing Sophos?
Thinking of choosing Sophos?
Symantec
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
IBM Security
 
Top 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSOTop 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSO
SecureAuth
 
BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
BlackHat USA 2013 - Practical Attacks against Mobile Device Management SolutionsBlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
Lacoon Mobile Security
 

What's hot (20)

Actionable insights
Actionable insightsActionable insights
Actionable insights
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
Securing Office 365
Securing Office 365Securing Office 365
Securing Office 365
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the Mouse
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
 
IBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References GuideIBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References Guide
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
 
The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014
 
Tachyon_Flyer
Tachyon_FlyerTachyon_Flyer
Tachyon_Flyer
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
 
Secure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsSecure Mobility from GGR Communications
Secure Mobility from GGR Communications
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging Threats2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging Threats
 
Thinking of choosing Sophos?
Thinking of choosing Sophos?Thinking of choosing Sophos?
Thinking of choosing Sophos?
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
 
Top 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSOTop 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSO
 
BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
BlackHat USA 2013 - Practical Attacks against Mobile Device Management SolutionsBlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions
 

Viewers also liked

Winning the war against data- Strategies to beat your arch nemesis: files - G...
Winning the war against data- Strategies to beat your arch nemesis: files - G...Winning the war against data- Strategies to beat your arch nemesis: files - G...
Winning the war against data- Strategies to beat your arch nemesis: files - G...
Spiceworks
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
Distil Networks
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
Yiannis Verginadis
 
Keynote Address at 2013 CloudCon: A day in the life of the SMB by Michael To...
Keynote Address at 2013 CloudCon: A day in the life of the SMB  by Michael To...Keynote Address at 2013 CloudCon: A day in the life of the SMB  by Michael To...
Keynote Address at 2013 CloudCon: A day in the life of the SMB by Michael To...
exponential-inc
 
Enterprise 2.0: What it is and why it matters
Enterprise 2.0: What it is and why it mattersEnterprise 2.0: What it is and why it matters
Enterprise 2.0: What it is and why it matters
digitallibrary
 
Box.net overview
Box.net overviewBox.net overview
Box.net overview
Eric McDuffee
 
Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...
Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...
Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...
Spiceworks
 
Building a database security program
Building a database security programBuilding a database security program
Building a database security program
matt_presson
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
Infopulse
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
Sophos Benelux
 
Robbery Prevention for Small Businesses
Robbery Prevention for Small BusinessesRobbery Prevention for Small Businesses
Robbery Prevention for Small Businesses
Fundera
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
David J Rosenthal
 
Security Guide For Small Business
Security Guide For Small BusinessSecurity Guide For Small Business
Security Guide For Small Business
BrendanRose
 
Challenges Of Global Data Collection
Challenges Of Global Data Collection   Challenges Of Global Data Collection
Challenges Of Global Data Collection
ResearchShare
 
5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses
Wilkins Consulting, LLC
 
Big data security challenges and recommendations!
Big data security challenges and recommendations!Big data security challenges and recommendations!
Big data security challenges and recommendations!
cisoplatform
 
Small business data security
Small business data securitySmall business data security
Small business data security
David Usher
 
Big Data Security with Hadoop
Big Data Security with HadoopBig Data Security with Hadoop
Big Data Security with Hadoop
Cloudera, Inc.
 
Big data security
Big data securityBig data security
Big data security
Joey Echeverria
 
Infrastructure API Lightning Talk by Jeremy Pollard of box.com
Infrastructure API Lightning Talk by Jeremy Pollard of box.comInfrastructure API Lightning Talk by Jeremy Pollard of box.com
Infrastructure API Lightning Talk by Jeremy Pollard of box.com
DevOps4Networks
 

Viewers also liked (20)

Winning the war against data- Strategies to beat your arch nemesis: files - G...
Winning the war against data- Strategies to beat your arch nemesis: files - G...Winning the war against data- Strategies to beat your arch nemesis: files - G...
Winning the war against data- Strategies to beat your arch nemesis: files - G...
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
 
Keynote Address at 2013 CloudCon: A day in the life of the SMB by Michael To...
Keynote Address at 2013 CloudCon: A day in the life of the SMB  by Michael To...Keynote Address at 2013 CloudCon: A day in the life of the SMB  by Michael To...
Keynote Address at 2013 CloudCon: A day in the life of the SMB by Michael To...
 
Enterprise 2.0: What it is and why it matters
Enterprise 2.0: What it is and why it mattersEnterprise 2.0: What it is and why it matters
Enterprise 2.0: What it is and why it matters
 
Box.net overview
Box.net overviewBox.net overview
Box.net overview
 
Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...
Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...
Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...
 
Building a database security program
Building a database security programBuilding a database security program
Building a database security program
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
 
Robbery Prevention for Small Businesses
Robbery Prevention for Small BusinessesRobbery Prevention for Small Businesses
Robbery Prevention for Small Businesses
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
 
Security Guide For Small Business
Security Guide For Small BusinessSecurity Guide For Small Business
Security Guide For Small Business
 
Challenges Of Global Data Collection
Challenges Of Global Data Collection   Challenges Of Global Data Collection
Challenges Of Global Data Collection
 
5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses
 
Big data security challenges and recommendations!
Big data security challenges and recommendations!Big data security challenges and recommendations!
Big data security challenges and recommendations!
 
Small business data security
Small business data securitySmall business data security
Small business data security
 
Big Data Security with Hadoop
Big Data Security with HadoopBig Data Security with Hadoop
Big Data Security with Hadoop
 
Big data security
Big data securityBig data security
Big data security
 
Infrastructure API Lightning Talk by Jeremy Pollard of box.com
Infrastructure API Lightning Talk by Jeremy Pollard of box.comInfrastructure API Lightning Talk by Jeremy Pollard of box.com
Infrastructure API Lightning Talk by Jeremy Pollard of box.com
 

Similar to SMB Security Opportunity –Use and Plans for Solutions and Profile of "Security Intensives"

Get The Facts Comparing Windows Mobile And Blackberry 2003
Get The Facts  Comparing Windows Mobile And Blackberry 2003Get The Facts  Comparing Windows Mobile And Blackberry 2003
Get The Facts Comparing Windows Mobile And Blackberry 2003
jasonlan
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
NetworkCollaborators
 
Monetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless NetworksMonetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless Networks
Cisco Service Provider
 
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
NetworkCollaborators
 
Softchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey ResultsSoftchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey Results
Softchoice Corporation
 
Dell Software: An Opportunity For Channel Partners
Dell Software: An Opportunity For Channel PartnersDell Software: An Opportunity For Channel Partners
Dell Software: An Opportunity For Channel Partners
Dell World
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These Years
Adrian Sanabria
 
Enterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-PremEnterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-Prem
Dipesh Mukerji
 
BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
BhaktiKarale
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
IJERD Editor
 
3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)
Motorola Solutions
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud Journey
Cloudflare
 
IBM Mobile Quality Assurance - Open Beta Study Group Session 1
IBM Mobile Quality Assurance - Open Beta Study Group Session 1IBM Mobile Quality Assurance - Open Beta Study Group Session 1
IBM Mobile Quality Assurance - Open Beta Study Group Session 1
Roger Snook
 
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMICut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Sierraware
 
Top Application Security Trends of 2012
Top Application Security Trends of 2012Top Application Security Trends of 2012
Top Application Security Trends of 2012
DaveEdwards12
 
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity Trends
IRJET Journal
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
Arrow ECS UK
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
Chris Pepin
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
Symantec
 

Similar to SMB Security Opportunity –Use and Plans for Solutions and Profile of "Security Intensives" (20)

Get The Facts Comparing Windows Mobile And Blackberry 2003
Get The Facts  Comparing Windows Mobile And Blackberry 2003Get The Facts  Comparing Windows Mobile And Blackberry 2003
Get The Facts Comparing Windows Mobile And Blackberry 2003
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
 
Monetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless NetworksMonetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless Networks
 
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
 
Softchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey ResultsSoftchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey Results
 
Dell Software: An Opportunity For Channel Partners
Dell Software: An Opportunity For Channel PartnersDell Software: An Opportunity For Channel Partners
Dell Software: An Opportunity For Channel Partners
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These Years
 
Enterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-PremEnterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-Prem
 
BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT Expo
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
 
3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud Journey
 
IBM Mobile Quality Assurance - Open Beta Study Group Session 1
IBM Mobile Quality Assurance - Open Beta Study Group Session 1IBM Mobile Quality Assurance - Open Beta Study Group Session 1
IBM Mobile Quality Assurance - Open Beta Study Group Session 1
 
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMICut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
 
Top Application Security Trends of 2012
Top Application Security Trends of 2012Top Application Security Trends of 2012
Top Application Security Trends of 2012
 
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity Trends
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 

More from Motty Ben Atia

Microsoft azure platforms
Microsoft azure platformsMicrosoft azure platforms
Microsoft azure platforms
Motty Ben Atia
 
Windows Azure for IT
Windows Azure for ITWindows Azure for IT
Windows Azure for IT
Motty Ben Atia
 
CA ARCserve Solution Overview
CA ARCserve Solution OverviewCA ARCserve Solution Overview
CA ARCserve Solution Overview
Motty Ben Atia
 
Sonicwall wireless & sra
Sonicwall wireless & sraSonicwall wireless & sra
Sonicwall wireless & sra
Motty Ben Atia
 
Ngfw overview
Ngfw overviewNgfw overview
Ngfw overview
Motty Ben Atia
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
Motty Ben Atia
 
CA ARCserve D2D
CA ARCserve D2DCA ARCserve D2D
CA ARCserve D2D
Motty Ben Atia
 
CA ARCserve Replication
CA ARCserve ReplicationCA ARCserve Replication
CA ARCserve Replication
Motty Ben Atia
 
CA ARCserve High Availability
CA ARCserve High Availability CA ARCserve High Availability
CA ARCserve High Availability
Motty Ben Atia
 
CA ARCserve Backup
CA ARCserve BackupCA ARCserve Backup
CA ARCserve Backup
Motty Ben Atia
 
CA ARCserve d2d on demand overview updated
CA ARCserve d2d on demand overview updatedCA ARCserve d2d on demand overview updated
CA ARCserve d2d on demand overview updated
Motty Ben Atia
 
Adobe Acrobat XI Overview
Adobe Acrobat XI OverviewAdobe Acrobat XI Overview
Adobe Acrobat XI Overview
Motty Ben Atia
 
Adobe Creative Cloud Customer & Reseller Workflow
Adobe Creative Cloud Customer & Reseller WorkflowAdobe Creative Cloud Customer & Reseller Workflow
Adobe Creative Cloud Customer & Reseller Workflow
Motty Ben Atia
 
Adobe Creative Cloud For Teams
Adobe Creative Cloud For TeamsAdobe Creative Cloud For Teams
Adobe Creative Cloud For Teams
Motty Ben Atia
 
Scopia Management Solutions
Scopia Management SolutionsScopia Management Solutions
Scopia Management Solutions
Motty Ben Atia
 
Scopia Infrastructure Guide
Scopia Infrastructure GuideScopia Infrastructure Guide
Scopia Infrastructure Guide
Motty Ben Atia
 
Avaya Scopia Endpoint & Mobility
Avaya Scopia Endpoint & MobilityAvaya Scopia Endpoint & Mobility
Avaya Scopia Endpoint & Mobility
Motty Ben Atia
 
Avaya Scopia Series Overview
Avaya Scopia Series OverviewAvaya Scopia Series Overview
Avaya Scopia Series Overview
Motty Ben Atia
 
Avaya Network Management Overview
Avaya Network Management OverviewAvaya Network Management Overview
Avaya Network Management Overview
Motty Ben Atia
 
Avaya identity engines overview
Avaya identity engines overviewAvaya identity engines overview
Avaya identity engines overview
Motty Ben Atia
 

More from Motty Ben Atia (20)

Microsoft azure platforms
Microsoft azure platformsMicrosoft azure platforms
Microsoft azure platforms
 
Windows Azure for IT
Windows Azure for ITWindows Azure for IT
Windows Azure for IT
 
CA ARCserve Solution Overview
CA ARCserve Solution OverviewCA ARCserve Solution Overview
CA ARCserve Solution Overview
 
Sonicwall wireless & sra
Sonicwall wireless & sraSonicwall wireless & sra
Sonicwall wireless & sra
 
Ngfw overview
Ngfw overviewNgfw overview
Ngfw overview
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
CA ARCserve D2D
CA ARCserve D2DCA ARCserve D2D
CA ARCserve D2D
 
CA ARCserve Replication
CA ARCserve ReplicationCA ARCserve Replication
CA ARCserve Replication
 
CA ARCserve High Availability
CA ARCserve High Availability CA ARCserve High Availability
CA ARCserve High Availability
 
CA ARCserve Backup
CA ARCserve BackupCA ARCserve Backup
CA ARCserve Backup
 
CA ARCserve d2d on demand overview updated
CA ARCserve d2d on demand overview updatedCA ARCserve d2d on demand overview updated
CA ARCserve d2d on demand overview updated
 
Adobe Acrobat XI Overview
Adobe Acrobat XI OverviewAdobe Acrobat XI Overview
Adobe Acrobat XI Overview
 
Adobe Creative Cloud Customer & Reseller Workflow
Adobe Creative Cloud Customer & Reseller WorkflowAdobe Creative Cloud Customer & Reseller Workflow
Adobe Creative Cloud Customer & Reseller Workflow
 
Adobe Creative Cloud For Teams
Adobe Creative Cloud For TeamsAdobe Creative Cloud For Teams
Adobe Creative Cloud For Teams
 
Scopia Management Solutions
Scopia Management SolutionsScopia Management Solutions
Scopia Management Solutions
 
Scopia Infrastructure Guide
Scopia Infrastructure GuideScopia Infrastructure Guide
Scopia Infrastructure Guide
 
Avaya Scopia Endpoint & Mobility
Avaya Scopia Endpoint & MobilityAvaya Scopia Endpoint & Mobility
Avaya Scopia Endpoint & Mobility
 
Avaya Scopia Series Overview
Avaya Scopia Series OverviewAvaya Scopia Series Overview
Avaya Scopia Series Overview
 
Avaya Network Management Overview
Avaya Network Management OverviewAvaya Network Management Overview
Avaya Network Management Overview
 
Avaya identity engines overview
Avaya identity engines overviewAvaya identity engines overview
Avaya identity engines overview
 

Recently uploaded

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 

Recently uploaded (20)

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 

SMB Security Opportunity –Use and Plans for Solutions and Profile of "Security Intensives"

  • 1. SMB Security Opportunity – Use and Plans for Solutions and Profile of "Security Intensives"
  • 2. Agenda • SMB definition • The “Four Pillars” and security implications for SMBs • Technology spend priorities – Security importance • SMB “Security intensives” profile – Technology use, share of different SMB verticals • Current and planned security capabilities – SB vs. MB • Security intensives vs. total SMBs -- Current and planned security capabilities • Essential Guidance 2
  • 3. Midsize Business (100–999) 102 thousand Small Business (1-99 emp) Consumer Households 6.2 million 22.4 million 115 million Large Business (1,000+) 9 thousand U.S. Market Pyramid for Year-End 2012 – Company Counts Home business/ Zero empl IT spending increases with size, number of firms decreases Source: US Dept of Commerce BLS, IDC, 2013 3
  • 4. Four Pillars For SMB Success – Security Key for Mobility and Cloud Down from Enterprise: Cloud and Big Data Up from Consumer: Social and Mobile SMB Productivity Remote/Mobile Worker Dynamics + Changing Employee/Employer Roles Social Mobile Big DataCloud 4
  • 5. US SMB Top Technology Spending Priorities: “Keep Lights On,” Then Expand Total SMB Small Bus (<100 emp) Mid-Sized Bus (100-999 emp) Large Bus 1000-4999 emp Upgrade PCs 45.4% 38.8% 37.0% Enhance servers/network infrastructure 11.4% 33.1% 39.4% Increase storage capacity/Improve storage management 11.3% 24.3% 36.9% Improve network security/Security mgt 17.3% 31.4% 38.0% Support for employee-owned devices/BYOD 4.3% 15.1% 22.7% Expand use of GoogleApps/Free resources 10.3% 4.2% 7.9% Increase use of online/off-prem resources 9.0% 22.8% 39.3% Off prem interest similar for infrastructure, pers productivity, collab Source: IDC’s SMB Survey, 2012 5
  • 6. Share of “Security Intensive” SMBs by Vertical (Percent Citing Security as Top Priority) Total: 17.4% for all SMBs Share of SMBs Agriculture/Mining/Construction 17.3% Manufacturing 16.2% Communications 43.5% Banking/Finance/Securities 20.1% Architecture/Engineering 71.7% Legal Services 24.8% Healthcare 42.1% Wholesale Trade 32.8% Retail Trade 9.0% Other Consumer Svcs/Entertainment/Accommodation 16.3% Other Prof/Tech/Scientific services 28.1% Other Business Services 6.1% Real estate & Insur <10% Source: IDC’s SMB Survey, 2012 6
  • 7. Technology Use and IT Resources: Total SB & MB vs. “Security Intensives” Total SBs SB Security Intensives Total MBs MB Security Intensives Have Full time IT Staff 11.9% 24.9% 85.8% 92.1% Local Area Network Use 51.3% 70.9% 75.1% 90.1% Mean Number of Servers 2.2 3.0 16.7 13.1 Use Server Virtualization 32.0% 39.6% 71.1% 68.2% Use Cloud-Based Services 12.6% 15.8% 48.1% 55.3% SB Security intensives show much higher tech use than SB Total, but MBs don’t show as much difference (except in LAN penetration) Source: IDC’s SMB Survey, 2012 77
  • 8. Top Security Capabilities Used by SMBs Small Bus Mid-Sized Bus Network antimalware (anti-virus, anti-spoof etc 62.8% 57.6% Endpoint/PC desktop/notebook antimalware 45.1% 43.5% Network firewall 53.5% 57.3% Anti-spam gateway (block unsolicited email) 44.4% 46.3% Internet site blocking – URL Filtering 21.1% 33.6% Network intrusion detection/prevention 19.6% 39.3% Email based Data loss prevention – DLP 10.6% 25.9% Network based DLP 3.5% 20.0% Email scanning for viruses/other malware 53.3% 51.8% SSL for secure ecommerce transactions 11.4% 25.1% Email encryption 11.6% 23.0% Multiple response, of courseSource: IDC’s SMB Survey, 2012 8
  • 9. Top Security Capabilities Planned for Purchase by SMBs in Next 12 Months Small Bus Mid-Sized Bus Network antimalware (anti-virus, anti-spoof etc 11.3% 16.6% Endpoint/PC desktop/notebook antimalware 5.7% 15.6% Network firewall 4.4% 16.5% Anti-spam gateway (block unsolicited email) 6.0% 15.7% Internet site blocking – URL Filtering 2.8% 16.5% Network intrusion detection/prevention 6.9% 22.2% Email based Data loss prevention – DLP 4.7% 15.9% Network based DLP 3.5% 11.2% Email scanning for viruses/other malware 5.0% 15.0% SSL for secure ecommerce transactions 4.8% 11.9% Email encryption 6.4% 13.7% Source: IDC’s SMB Survey, 2012 Double digit for MBs for all! 9
  • 10. Top Security Capabilities Used by SMBs – Part 2 Small Bus Mid-Sized Bus EV (Extended Validation) SSL certificate 5.0% 15.2% Identity and access management (IAM) 6.1% 14.6% Patch management 4.6% 16.7% Device vulnerability assessment 5.9% 12.0% Web application vulerability assessment 5.6% 15.0% Laptop encryption (full disk encryption) 6.0% 17.7% Mobile device management 7.1% 17.9% Single sign on (easier access to multiple resources) 5.0% 13.7% Two factor authentication 3.1% 7.9% Mid Size use 2-3X SB use Source: IDC’s SMB Survey, 2012 10
  • 11. Security Capabilities Planned for Purchase by SMBs – Part 2 Small Bus Mid-Sized Bus EV (Extended Validation) SSL certificate 2.3% 11.3% Identity and access management (IAM) 3.6% 8.5% Patch management 2.2% 13.1% Device vulnerability assessment 1.8% 7.4% Web application vulerability assessment 2.8% 6.0% Laptop encryption (full disk encryption) 4.4% 11.9% Mobile device management 7.7% 17.9% Single sign on (easier access to multiple resources) 2.1% 5.7% Two factor authentication 1.8% 7.8% Source: IDC’s SMB Survey, 2012 11
  • 12. Share of SMB Security Spending by Type SBs MBs Hardware 24.8% 27.1% Software 54.2% 38.9% SaaS 5.1% 14.8% Services 16.0% 19.1% Software key for all, but note SaaS use by MBs, Services too Source: IDC’s SMB Survey, 2012 1212
  • 13. Share of SMB Security Spending by Type – Total vs. “Security Intensives” Total SBs SB Security Intensives Total MBs MB Security Intensives Hardware 24.8% 24.2% 27.1% 26.7% Software 54.2% 49.8% 38.9% 36.1% SaaS 5.1% 9.2% 14.8% 16.8% Services 16.0% 16.9% 19.1% 20.5% Security intensives cite “Improve Network Security/Security Management” as a top IT spending priority for next 12 months: 17.3% SBs 31.4% MBs Source: IDC’s SMB Survey, 2012 1313
  • 14. Security Products Planned for Purchase by SMBs vs SMB “Security Intensives” Pt 1 Planned for Acquire in Next 12 Months Total SB SB Security Intensives Total MB MB Security Intensives Network antimalware (anti-virus, anti-spoof etc 11.3% 18.4% 16.6% 25.1% Endpoint/PC desktop/notebook antimalware 5.7% 7.6% 15.6% 11.7% Network firewall 4.4% 6.4% 16.5% 20.0% Anti-spam gateway (block unsolicited email) 6.0% 4.9% 15.7% 17.1% Internet site blocking – URL Filtering 2.8% 6.1% 16.5% 19.0% Network intrusion detection/prevention 6.9% 17.8% 22.2% 30.5% Email based Data loss prevention – DLP 4.7% 6.5% 15.9% 21.4% Double digit for MBs for all!Source: IDC’s SMB Survey, 2012 14
  • 15. Security Products Planned for Purchase by SMBs vs SMB “Security Intensives” Pt 2 Planned for Acquire in Next 12 Months Total SB SB Security Intensive Total MB MB Security Intensive Network based DLP 3.5% 6.7% 11.2% 13.0% Email scanning for viruses/other malware 5.0% 9.7% 15.0% 17.2% SSL for secure ecommerce transactions 4.8% 6.9% 11.9% 23.7% Email encryption 6.4% 11.3% 13.7% 19.2% EV (Extended Validation) SSL certificate 2.3% 6.0% 11.3% 17.2% Identity and access management (IAM) 3.6% 5.8% 8.5% 8.1% Patch management 2.2% 6.5% 13.1% 16.8% Double digit for MBs for all but IAM Source: IDC’s SMB Survey, 2012 15
  • 16. Security Products Planned for Purchase by SMBs vs SMB “Security Intensives” Pt 3 Planned for Acquire in Next 12 Months Total SB SB Security Intensive Total MB MB Security Intensive Device vulnerability assessment 1.8% 4.0% 7.4% 8.3% Web application vulerability assessment 2.8% 4.9% 6.0% 8.4% Laptop encryption (full disk encryption) 4.4% 10.3% 11.9% 17.9% Mobile device management 7.7% 15.9% 17.9% 24.0% Single sign on (easier access to multiple resources) 2.1% 4.1% 5.7% 2.9% Two factor authentication 1.8% 5.0% 7.8% 9.8% Source: IDC’s SMB Survey, 2012 16
  • 17. Essential Guidance: Key Takeaways for SMB Security Providers • Great SMB interest in harnessing technology better – but question of best ways how? Security shifting from defense to enabler. • Online security resource access will be of increasing interest – Shifting share of security spending with SaaS share on the rise. • Multidimensional aspect of security risks makes comprehensive coverage more of a challenge. Mobility (endpoint) as well as network coverage will be key as SMB refine company security strategy. 17