SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Security Consolidation Survey 2014
Web | Mail | Endpoint | Server | Data Encryption | DLP
If you are facing an increasing volume of logs
from multiple sources, you are managing a flood
of information. Not only that, you still need to
analyze that data in order to find evidence of
security incidents, and make sure you stay
compliant with industry regulations.
To help our clients learn more about their
security environment we put together a tool that
examined how many security tools our clients
really used, and offered some recommendations
from our experts based on the results.
WHY WE DID IT
» Endpoint buyers
» ProSuite buyers
» Security buyers in retail verticals
» Security buyers in legal verticals
» IT managers
» Security decision makers
» PC and client software buyers
» Security buyers in education
» Security buyers in finance
» Security buyers in healthcare
» Networking buyers
TARGET AUDIENCE
Gross responses were reviewed and scrubbed if:
A. Answers for questions 1 through 9 were the same
B. All questions had the same answer
C. The same result was received for each completed
survey in rapid succession
D. A response for a required question was missing
DATA HANDLING
The Results
What are you using for endpoint virus?
We often encounter clients using Microsoft Forefront to
maximize their Enterprise Agreement. However, its
possible to realize a more robust endpoint security and
overall security posture by utilizing a comprehensive
solution from Trend Micro, Symantec, McAfee or
Sophos.
21%
39%
21%
5%
13%
1%
Endpoint Virus
Trend Micro Symantec McAfee
Sophos Other Nothing
0
2
4
6
8
If other, please specify
What are you using for mail gateway?
As Microsoft discontinued the TMG (Threat
Management Gateway) we are seeing significant
changes in this area. We anticipate continued changes
in the future, as more organizations adopt Office 365.
Our clients that have been using TMG are often looking
to existing security providers as well as networking
technologies to protect their messaging technologies.
Building upon the investment with the current endpoint
security solution provider is a strategic opportunity to
minimize costs and overhead.
0
2
4
6
8
10
If other, please specify
19%27%
17%
3% 26%
8%
Mail gateway
Trend Micro Symantec McAfee
Sophos Other Nothing
What are you using for WEB gateway?
Our clients that have been using TMG are often looking
to existing security providers as well as networking
technologies to protect their messaging technologies.
Building upon the investment with the current endpoint
security solution provider is a strategic opportunity to
minimize costs and overhead.
22%
21%
13%
5%
27%
12%
Web Gateway
Trend Micro Symantec McAfee
Sophos Other Nothing
0
2
4
6
8
If other, please specify
What technology are you using for intrusion prevention?
Intrusion Prevention services are being integrated
into UTM (Universal Threat Management) devices
as well as NGFW (Next Generation Firewall)
technologies.
16%
29%
13%
5%
21%
16%
Intrusion prevention
Trend Micro Symantec McAfee
Sophos Other Nothing
0
2
4
6
If other, please specify
What technology are you using for firewall?
We are seeing a significant movement from
legacy “layer 3’ firewalls to NGFW (Next
Generation Firewalls).
17%
21%13%
7%
37% 5%
FIREWALL
Trend Micro Symantec McAfee
Sophos Other Nothing
0
0.5
1
1.5
2
2.5
3
3.5
4
4.5
AVG
CheckPoint
Cisco
Custom
FortiGate
Fortinet
Juniper
Kaspersky
Microsoft
PaloAlto
PhysicalDevice
Sentinel
Sonicwall
Squid
TMG
Untangle
WatchGuard
If other, please specify
What are you using to encrypt data?
We are seeing concerns around some encryption
technologies. Organizations implementing an
encryption solution should be aware of potential
limitations when using Truecrypt and Bitlocker.
15%
28%
7%5%
19%
26%
Encrypt Data
Trend Micro Symantec McAfee
Sophos Other Nothing
0
1
2
3
4
5
6
If other, please specify
What are you using for data loss prevention?
Data Loss Prevention (DLP) is a significant
concern for our clients working to adhere to
compliance mandates like Payment Card Industry
(PCI) and Health Insurance Portability and
Accountability Act (HIPAA) etc.21%
30%
6%
3%
13%
27%
Data Loss Prevention
Trend Micro Symantec McAfee
Sophos Other Nothing
0
0.5
1
1.5
2
2.5
If other, please specify
What are you doing to protect your servers?
Standard endpoint protection is not an complete
security solution for servers. Servers should
utilize technology designed specifically for server
protection.19%
44%
10%
7%
12%
8%
Server Protection
Trend Micro Symantec McAfee
Sophos Other Nothing
0
0.5
1
1.5
2
2.5
If other, please specify
How are you managing mobile data?
Mobile consumerization is driving our clients to
protect both mobile devices as well as the data
residing on those devices. You must consider the
planning and policies in place, as there will be
policy differences between Bring Your Own
Device (BYOD), and corporate-issue device
environments.
21%
20%
4%
5%
16%
34%
Mobile Data
Trend Micro Symantec McAfee
Sophos Other Nothing
0
0.5
1
1.5
2
2.5
3
3.5
4
4.5
If other, please specify
How do you manage the logs from all these tools?
Real time log management is a core component
for corporate security as well as compliance
requirements, specifically around incident
management and incident response processes.
Logs Management
SIEM Solution Managed Solution
Open Source Nothing
Are you happy with your main security vendor?
If it’s not broken, don’t fix it. Right? We encourage
our clients to test their security architectures to
ensure they are well-designed and effective.
More simply, keep in mind our goal is to prevent
security incidents before they happen!
Are you happy?
Yes No
SUMMARY
1. Understand business and compliance drivers, and integrate these
requirements in to the technical specs when considering a security
solution.
2. Deploying technology without understanding the risks and sensitive
data repositories is not an effective solution.
3. A robust security architecture requires continued testing and
improvement to assess risks to critical systems, identify threats,
remediate risks, and protect business assets.
4. We see value in consolidating security technologies to fewer vendors.
Both from a cost savings perspective, and a daily operations
management perspective.
Based on the results of this tool, here are the 4 most important
things our clients should remember:
THANK YOU
With over 40 locations across the U.S. and Canada,
Softchoice is one of North America’s largest providers of IT
solutions and services. Our holistic approach to
technology includes solution design, implementation,
and managed services.

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Blair christie global editors conf 12.9.14 final
Blair christie global editors conf 12.9.14 finalBlair christie global editors conf 12.9.14 final
Blair christie global editors conf 12.9.14 final
 
Everyone's a Screenager. Now what? Five trends from the 2015 Digital Consumer...
Everyone's a Screenager. Now what? Five trends from the 2015 Digital Consumer...Everyone's a Screenager. Now what? Five trends from the 2015 Digital Consumer...
Everyone's a Screenager. Now what? Five trends from the 2015 Digital Consumer...
 
Guidewire PaaS
Guidewire PaaSGuidewire PaaS
Guidewire PaaS
 
What is the Social Graph?
What is the Social Graph?What is the Social Graph?
What is the Social Graph?
 
Journey to Cloud - Enabling the Digital Enterprise - Accenture
Journey to Cloud - Enabling the Digital Enterprise - AccentureJourney to Cloud - Enabling the Digital Enterprise - Accenture
Journey to Cloud - Enabling the Digital Enterprise - Accenture
 
HEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITYHEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITY
 
Unlocking the Power of RegTech
Unlocking the Power of RegTechUnlocking the Power of RegTech
Unlocking the Power of RegTech
 
The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...
The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...
The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...
 
Boost your AIQ: Transforming to an AI Business
Boost your AIQ: Transforming to an AI BusinessBoost your AIQ: Transforming to an AI Business
Boost your AIQ: Transforming to an AI Business
 
Data Driven Communities in the United States
Data Driven Communities in the United StatesData Driven Communities in the United States
Data Driven Communities in the United States
 
Security Posture Management Enters the Cloud
Security Posture Management Enters the CloudSecurity Posture Management Enters the Cloud
Security Posture Management Enters the Cloud
 
Marlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementMarlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk Management
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
 
Cybersecurity at a premium: The state of cyber resilience in insurance
Cybersecurity at a premium: The state of cyber resilience in insuranceCybersecurity at a premium: The state of cyber resilience in insurance
Cybersecurity at a premium: The state of cyber resilience in insurance
 
MongoDB World 2019: Data Digital Decoupling
MongoDB World 2019: Data Digital DecouplingMongoDB World 2019: Data Digital Decoupling
MongoDB World 2019: Data Digital Decoupling
 
TOP 10 Reasons to Make Peak 10 Your Cloud Provider of Choice
TOP 10 Reasons to Make Peak 10 Your Cloud Provider of ChoiceTOP 10 Reasons to Make Peak 10 Your Cloud Provider of Choice
TOP 10 Reasons to Make Peak 10 Your Cloud Provider of Choice
 
WHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of ThingsWHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of Things
 
Io t a_de_techgigwebinar_04nov2016
Io t a_de_techgigwebinar_04nov2016Io t a_de_techgigwebinar_04nov2016
Io t a_de_techgigwebinar_04nov2016
 
Technology Vision 2020: The Analytics Angle with SAS
Technology Vision 2020: The Analytics Angle with SASTechnology Vision 2020: The Analytics Angle with SAS
Technology Vision 2020: The Analytics Angle with SAS
 
Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020
 

Ähnlich wie Softchoice Security Consolidation Survey Results

Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
VictoriaChavesta
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
sucesuminas
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
wkyra78
 

Ähnlich wie Softchoice Security Consolidation Survey Results (20)

Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf
 
Ten Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureTen Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business Secure
 
Ten top tips on keeping your business secure
Ten top tips on keeping your business secureTen top tips on keeping your business secure
Ten top tips on keeping your business secure
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
Security Testing Trends for 2020
Security Testing Trends for 2020Security Testing Trends for 2020
Security Testing Trends for 2020
 
Securing Manufacturing: How we can improve speed and efficiency while protect...
Securing Manufacturing: How we can improve speed and efficiency while protect...Securing Manufacturing: How we can improve speed and efficiency while protect...
Securing Manufacturing: How we can improve speed and efficiency while protect...
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValue
 
G01.2012 magic quadrant for endpoint protection
G01.2012 magic quadrant for endpoint protectionG01.2012 magic quadrant for endpoint protection
G01.2012 magic quadrant for endpoint protection
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutions
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud services
 

Mehr von Softchoice Corporation

Mehr von Softchoice Corporation (20)

Benchmarking IT Agility Final Report
Benchmarking IT Agility Final ReportBenchmarking IT Agility Final Report
Benchmarking IT Agility Final Report
 
Leveraging Office 365 Through Modern Licensing
Leveraging Office 365 Through Modern LicensingLeveraging Office 365 Through Modern Licensing
Leveraging Office 365 Through Modern Licensing
 
Leveraging Azure Through Modern Licensing
Leveraging Azure Through Modern LicensingLeveraging Azure Through Modern Licensing
Leveraging Azure Through Modern Licensing
 
Webinar: Azure backup and disaster recovery
Webinar: Azure backup and disaster recoveryWebinar: Azure backup and disaster recovery
Webinar: Azure backup and disaster recovery
 
Etude Softchoice: la collaboration en action
Etude Softchoice:  la collaboration en actionEtude Softchoice:  la collaboration en action
Etude Softchoice: la collaboration en action
 
Collaboration Unleashed: Softchoice Research Study 2017
Collaboration Unleashed: Softchoice Research Study 2017Collaboration Unleashed: Softchoice Research Study 2017
Collaboration Unleashed: Softchoice Research Study 2017
 
Webinar | Cloud PBX and Skype
Webinar | Cloud PBX and Skype Webinar | Cloud PBX and Skype
Webinar | Cloud PBX and Skype
 
Softchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security WebinarSoftchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security Webinar
 
Unleashing the Power of Office 365
Unleashing the Power of Office 365Unleashing the Power of Office 365
Unleashing the Power of Office 365
 
Azure cloud governance deck
Azure cloud governance deckAzure cloud governance deck
Azure cloud governance deck
 
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...
 
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud
 
Enabling Innovation: A 2017 Softchoice Research Study
Enabling Innovation: A 2017 Softchoice Research StudyEnabling Innovation: A 2017 Softchoice Research Study
Enabling Innovation: A 2017 Softchoice Research Study
 
Getting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMSGetting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMS
 
Effective Management of Azure through Operations Management Suite (OMS) Webinar
Effective Management of Azure through Operations Management Suite (OMS) WebinarEffective Management of Azure through Operations Management Suite (OMS) Webinar
Effective Management of Azure through Operations Management Suite (OMS) Webinar
 
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
 
Improving Application Security With Azure
Improving Application Security With AzureImproving Application Security With Azure
Improving Application Security With Azure
 
Softchoice | Encore des imprudences dans le nuage
Softchoice | Encore des imprudences dans le nuageSoftchoice | Encore des imprudences dans le nuage
Softchoice | Encore des imprudences dans le nuage
 
Softchoice Discovery Series: Cloud Cost Governance
Softchoice Discovery Series: Cloud Cost GovernanceSoftchoice Discovery Series: Cloud Cost Governance
Softchoice Discovery Series: Cloud Cost Governance
 
Still Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research StudyStill Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research Study
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Softchoice Security Consolidation Survey Results

  • 1. Security Consolidation Survey 2014 Web | Mail | Endpoint | Server | Data Encryption | DLP
  • 2. If you are facing an increasing volume of logs from multiple sources, you are managing a flood of information. Not only that, you still need to analyze that data in order to find evidence of security incidents, and make sure you stay compliant with industry regulations. To help our clients learn more about their security environment we put together a tool that examined how many security tools our clients really used, and offered some recommendations from our experts based on the results. WHY WE DID IT
  • 3. » Endpoint buyers » ProSuite buyers » Security buyers in retail verticals » Security buyers in legal verticals » IT managers » Security decision makers » PC and client software buyers » Security buyers in education » Security buyers in finance » Security buyers in healthcare » Networking buyers TARGET AUDIENCE
  • 4. Gross responses were reviewed and scrubbed if: A. Answers for questions 1 through 9 were the same B. All questions had the same answer C. The same result was received for each completed survey in rapid succession D. A response for a required question was missing DATA HANDLING
  • 6. What are you using for endpoint virus? We often encounter clients using Microsoft Forefront to maximize their Enterprise Agreement. However, its possible to realize a more robust endpoint security and overall security posture by utilizing a comprehensive solution from Trend Micro, Symantec, McAfee or Sophos. 21% 39% 21% 5% 13% 1% Endpoint Virus Trend Micro Symantec McAfee Sophos Other Nothing 0 2 4 6 8 If other, please specify
  • 7. What are you using for mail gateway? As Microsoft discontinued the TMG (Threat Management Gateway) we are seeing significant changes in this area. We anticipate continued changes in the future, as more organizations adopt Office 365. Our clients that have been using TMG are often looking to existing security providers as well as networking technologies to protect their messaging technologies. Building upon the investment with the current endpoint security solution provider is a strategic opportunity to minimize costs and overhead. 0 2 4 6 8 10 If other, please specify 19%27% 17% 3% 26% 8% Mail gateway Trend Micro Symantec McAfee Sophos Other Nothing
  • 8. What are you using for WEB gateway? Our clients that have been using TMG are often looking to existing security providers as well as networking technologies to protect their messaging technologies. Building upon the investment with the current endpoint security solution provider is a strategic opportunity to minimize costs and overhead. 22% 21% 13% 5% 27% 12% Web Gateway Trend Micro Symantec McAfee Sophos Other Nothing 0 2 4 6 8 If other, please specify
  • 9. What technology are you using for intrusion prevention? Intrusion Prevention services are being integrated into UTM (Universal Threat Management) devices as well as NGFW (Next Generation Firewall) technologies. 16% 29% 13% 5% 21% 16% Intrusion prevention Trend Micro Symantec McAfee Sophos Other Nothing 0 2 4 6 If other, please specify
  • 10. What technology are you using for firewall? We are seeing a significant movement from legacy “layer 3’ firewalls to NGFW (Next Generation Firewalls). 17% 21%13% 7% 37% 5% FIREWALL Trend Micro Symantec McAfee Sophos Other Nothing 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 AVG CheckPoint Cisco Custom FortiGate Fortinet Juniper Kaspersky Microsoft PaloAlto PhysicalDevice Sentinel Sonicwall Squid TMG Untangle WatchGuard If other, please specify
  • 11. What are you using to encrypt data? We are seeing concerns around some encryption technologies. Organizations implementing an encryption solution should be aware of potential limitations when using Truecrypt and Bitlocker. 15% 28% 7%5% 19% 26% Encrypt Data Trend Micro Symantec McAfee Sophos Other Nothing 0 1 2 3 4 5 6 If other, please specify
  • 12. What are you using for data loss prevention? Data Loss Prevention (DLP) is a significant concern for our clients working to adhere to compliance mandates like Payment Card Industry (PCI) and Health Insurance Portability and Accountability Act (HIPAA) etc.21% 30% 6% 3% 13% 27% Data Loss Prevention Trend Micro Symantec McAfee Sophos Other Nothing 0 0.5 1 1.5 2 2.5 If other, please specify
  • 13. What are you doing to protect your servers? Standard endpoint protection is not an complete security solution for servers. Servers should utilize technology designed specifically for server protection.19% 44% 10% 7% 12% 8% Server Protection Trend Micro Symantec McAfee Sophos Other Nothing 0 0.5 1 1.5 2 2.5 If other, please specify
  • 14. How are you managing mobile data? Mobile consumerization is driving our clients to protect both mobile devices as well as the data residing on those devices. You must consider the planning and policies in place, as there will be policy differences between Bring Your Own Device (BYOD), and corporate-issue device environments. 21% 20% 4% 5% 16% 34% Mobile Data Trend Micro Symantec McAfee Sophos Other Nothing 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 If other, please specify
  • 15. How do you manage the logs from all these tools? Real time log management is a core component for corporate security as well as compliance requirements, specifically around incident management and incident response processes. Logs Management SIEM Solution Managed Solution Open Source Nothing
  • 16. Are you happy with your main security vendor? If it’s not broken, don’t fix it. Right? We encourage our clients to test their security architectures to ensure they are well-designed and effective. More simply, keep in mind our goal is to prevent security incidents before they happen! Are you happy? Yes No
  • 17. SUMMARY 1. Understand business and compliance drivers, and integrate these requirements in to the technical specs when considering a security solution. 2. Deploying technology without understanding the risks and sensitive data repositories is not an effective solution. 3. A robust security architecture requires continued testing and improvement to assess risks to critical systems, identify threats, remediate risks, and protect business assets. 4. We see value in consolidating security technologies to fewer vendors. Both from a cost savings perspective, and a daily operations management perspective. Based on the results of this tool, here are the 4 most important things our clients should remember:
  • 18. THANK YOU With over 40 locations across the U.S. and Canada, Softchoice is one of North America’s largest providers of IT solutions and services. Our holistic approach to technology includes solution design, implementation, and managed services.