3. Agenda
• Who is Bloxx
• How has the Landscape Changed
• Threats & Skills Shortage
• Best Practice and Guidance
• Moving to the Cloud
• Superior Cyber Security with Bloxx
4. Content Filtering Pioneer
Globally Patented Technology
Growing Market Share in UK/US/EMEA
Multiple Deployment Options
Stellar Service and Support
Cost Effective Licensing Model
Distribution Model and Support
Who is Bloxx?
5. How has the security landscape changed?
• The number of security breaches has increase & the scale and cost has nearly doubled
• Not as many organisations increased their spending in information security & fewer expected
to spend more in the future
• Nearly 9 out of 10 large organisations surveyed now suffer some form of security. Proving we
need to adopt a ‘Not If but When’ mantra
• Despite the increase in staff awareness training, people are just as likely to cause a breach
as viruses and other types of malicious software
• When looking at drivers for information security expenditure, ‘Protecting customer
information’ and ‘Protecting the organisation’s reputation’ account for over half of the
responses
• The trend in outsourcing certain security functions and the use of ‘Cloud computing and
storage’ continue to rise.
6. Security breaches levels rise again
Its not IF but When
• 90% of large organisations reported that they
had suffered a security breach, up from 81% in
2014.
• Almost three-quarters of SMB’s reported a
security breach - an increase on the 2014 and
2013 figures.
* 2015 INFORMATION SECURITY BREACHES SURVEY
8. The Source of the Breach
BYOD still poses significant risk
• Social Media related breaches
increase by 1%
• BYOD related breached up 7%
9. Sharp rise in ‘average’ cost of a breach
• £1.46m - £3.14m is the
average cost of a breach to a
large organisation
• £75k - £311k is the average
cost to a small business
10. What impacts the cost of a breach?
The average global cost of data breach per lost or stolen record is $154 - with costs varying by industry.
• Healthcare organisation has a breach the average cost could be as high as $363 per record
• Education the average cost could be as high as $300 per record
The purchase of insurance can reduce the cost of a data breach.
Insurance protection reduces the cost by $4.4 per record. Significant when we consider the size of some recent
breaches.
In the event of a breach, when the Board of Directors take a more active role the average costs can be reduced
by $5.5 per record.
11. How are you reacting…
• An increase across the board in
the adoption of security
awareness training
• Whilst insurance proves to reduce
the cost of a breach. A
significant decrease in coverage
has been reported from both
large and small business.
12. The Budget challenge remains…
Securing more with Less?
Security spend is forecast to decrease in
both subsets in comparison to last year.
Can this be attributed to a lack of Board
Level transparency?
13. Combatting insider threats
Insider threats are difficult to forecast, prepare for and guard
against, therefore a balance must be struck between security
and trust.
Split security into looking at both infrastructure and people. This
ensures that more rigorous measures can be implemented
without directly monitoring staff, which can be obtrusive.
Employees need to be aware of the potential risks associated
with data and understand the benefits of properly safeguarded
data.. Deliver training. Communicate transparently and often
Insider threats don’t only represent malicious attacks, mistakes
by staff, although accidental can be detrimental
14. Cyber Insurance
Manage Expectations and Choose Wisely
Know where you are today
Identify vulnerabilities, risk management practices and any
coverage of cyber attacks that general insurance might provide.
Chart the course forwards
With these risks in mind, consider what improvements can be
made to business structure and employee practices. Insurance
is not prevention!
Manage expectations
Identify the best policy (there are options…) and fully
understand the obligations under the selected premium.
15. Devise a robust 360 Policy
Here are out Top three essential security practices
Filter
Organisations of any size must actively monitor what data is being
accessed via the web in real-time. Anything less is ineffective and risky.
Protect
Be clear about what the security challenges of personal devices are for
the corporate network. These will differ for each company, department and
office.
Communicate
Employees are the greatest line of defence against hackers – be sure that
you engage with them regularly to deliver security training and detail the
potential ramifications of their actions.
16. Build the right team
There is a skills shortage – you need to
think and act outside the box!
Broaden your horizons
Think about potential candidates you may not usually consider
It is not necessary to have a computer sciences degree before
embarking on a career in the field. Skills are transferable, and
should be viewed as such
Look within
Look at the IT culture and systems you have in place.
Cybersecurity professionals are interested and passionate about
technology, so make sure that you are offering tools that they can
use effectively and are familiar with
17. Moving to the Cloud?
The proof is in the Planning
You can never plan too much - appreciate that the cloud will
add to your existing requirements and that as a result of a cloud
deployment, they could well be subject to change
Generate a helicopter view of your security landscape and
understand how moving to the cloud will tilt those on their axis
Have a firm grasp on the wider landscape and a ‘realistic’
view on what will and very may well need to change
Understand the security practises of your cloud solution
provider & question how often they are tested and by whom
Consider what internal changes need to be made to ensure
cloud is an effective and secure component of your IT
infrastructure
18. Agile businesses demand flexibility, mobility and speed!
All while delivering robust online protection and ensuring
compliance.
Tru-View Technology from Bloxx
Is the only technology that lets you keep pace with the
growth of the web! Our patented technology helps
secure 800 million devices across the globe.
Tru-View Technology from Bloxx
19. Deliver Superior Cyber Security with Bloxx?
Create safe, flexible and collaborative work environments regardless of location or
device
Why Bloxx?
• Real Time Content Analysis and Filtering
• Certificate-based SSL filtering
• Multi Layered email filtering
• Single Sign on for BYOD
• Multiple Authentication options
• Secure mobile workers – regardless of location
• Hardware, Virtual and Cloud Deployments
More than leading Security
• Ensure compliance with AUP management
• Enforce Access policies – across locations
• Gain control over bandwidth hungry websites
• Manage social media – to increase productivity
• Flexible time-based quotas – to manage browsing
20. Much more than Leading Technology
• All inclusive pricing for 1 & 3 years
• Flexible deployment options
• On site or remote installation
• Unlimited technical support
• POCs and Evaluations Fully Support
• Free product updates
• Online, on demand training portal
21. Safeguard Learning & bolster your eSafety?
Solutions designed with Education in mind
With Bloxx you can Safeguard students regardless of location or device and
centrally manage single or multi campus deployments
• Real Time Content Filtering & Analysis
• Simplify BYOD with Single Sign On
• Multiple Authentication options
• Superior Inspection of SSL/HTTPS Traffic
• Eliminates Anonymous Proxies
• Manage Social Media
• Granular Reporting
• Easy Access Teacher Portal
• Proactive Search Alerts
• Central Management
22. Client Focus| Aberdeenshire Council
The Bloxx web filtering solution is now used to secure online activity throughout schools,
public libraries and community facilities for:
• Over 48,000 staff and pupils
• 230,000 members of the public
Graeme Slapp, Education Project Officer, Aberdeenshire Council
“The difference between Bloxx and our previous solution is night and day. With a much more relevant
filtering policy, our schools now feel much more confident in being able to gain access and use online
resources.”
Chris Clelland, ICT Business Solutions Manager, Aberdeenshire Council
“Aberdeenshire ICT staff were able to move 165 locations onto Bloxx, giving a marked improvement to
the browsing and learning experience. The Tru-View Technology has meant that we do not need to
constantly monitor access and block potential holes in our filter lists.”
23. Introducing Tru-View Cloud
Tru-View Cloud from Bloxx delivers real-time web filtering that
minimises risk whilst increasing network protection in a cloud
environment.
• Real-time content analysis, categorisation and filtering
• Full inspection of SSL traffic
• Protection against malware, spyware and phishing attacks
• Wide range of authentication methods
• Secure filtering clients for Windows, OSX and any device with
proxy capability
• Logging and reporting data is automatically transferred to the
main appliance
• Connect branch offices & roaming users with no additional
hardware
• Centralised policy management