SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
Eight Steps to 
IT Security Success 
A practical guide for solution providers 
www.comptia.org/communities 
www.comptia.org/communities 
Q U I C K S TA R T G U I D E 
P OW E R E D B Y : 
www.comptia.org/communities
Eight Steps to 
IT Security Success 
Solution provider Jacob K. Braun prefers a reasoned approach when selling IT security 
to clients. Rather than trying to scare clients, Braun appeals to their sense of ethics. 
“I ask them: ‘What would your clients say if they knew you didn’t have security in 
place?’” says Braun, the president and chief operating officer of WakaDigital Media 
Corp., a managed services provider (MSP) based in Amherst, MA. 
“You can approach it from the fear factor, but the fear 
factor can backfire pretty quickly,” he says. Scare tactics 
put clients on the defensive, and that makes it much 
harder to sell them the solution they need, he adds. 
No one really questions the need for security, even if too 
many clients still don’t have a good grasp of everything it 
entails, say Braun and others in the IT channel. The onus, 
therefore, is on solution providers to educate clients on 
security risks, assess those risks, and address them in a 
comprehensive way. They also need to ensure their clients 
comply with a growing set of federal and state data-protection 
regulations. 
“Security is much more than perimeter firewalls and 
anti-virus protection. A truly secure approach must be 
multi-faceted and comprehensive,” says Jim Hamilton, 
senior director of member communities at the Computer 
Technology Industry Association (CompTIA). CompTIA is 
based in Downers Grove, IL, and is known as the largest 
nonprofit trade association in IT. 
A truly secure environment provides protection, 
prevention, and remediation. To achieve all that, say 
security experts, a security platform has to perform 
multiple functions in what is called a multi-layer 
approach: firewalls to control network access, tools that 
filter Web content and e-mail, encryption protocols, and 
intrusion prevention and detection. Security also entails 
policies and tools that control the use of passwords, 
www.comptia.org/communities 
2 www.comptia.comptioar.go/crogm/mcounmitiems unities 
mobile and VPN connections, which users access which 
data, and how to react when a data breach or leak occurs. 
The proliferation of cloud-based solutions and 
technologies such as social networking and virtualization, 
say security experts, make the already-complex endeavor 
of securing IT environments even more intricate. New 
challenges such as protocols for using social media and 
how to apply security policies to virtualized networks 
have to be addressed, says Tim Larocque, director 
of sales at Ottawa-based Interwork Technologies, a 
distributor of IT security solutions. 
“Those are significant challenges that I don’t think 
most solution providers are taking the time to address,” 
Larocque says. 
Step 1: Leverage compliance regulations 
for security growth 
Solution providers that take the time to understand 
security requirements stand to gain from a healthy, 
growing market. The need for security never goes away. 
It keeps increasing as hackers find new ways to break 
into networks. 
Market research firm Gartner predicts 4 percent growth 
in 2010 in security-related software sales and 3 percent 
in security services. Those are healthy enough numbers,
quick start guide 
P OW E R E D B Y : 
IT Security 
3 
especially on the heels of a major recession, but MSPs and 
providers of cloud-based services say they are seeing growth 
rates of 25 percent or more. 
“We’re seeing very, very healthy growth in the security 
market,” says Larocque. “It’s a very predictable and recession-proof 
market.” Interwork partners, he says, are enjoying growth 
rates of as much as 40 to 50 percent. 
One major driver, according to IT security experts, is the 
need for organizations large and small to comply with data 
protection laws. Businesses that handle sensitive data, be it 
financial information, medical records or legal documents, 
have to comply with a growing set of regulations, both at the 
state and federal levels, imposing strict requirements on how 
to handle the data. 
Federal laws enacted since 1996, such as the Sarbanes- 
Oxley Act, which applies to accounting practices, and HIPAA 
(Health Insurance Portability and Accountability Act), which 
addresses medical records, have created a cottage industry of 
compliance-focused solutions and services. 
Forty-five states and the District of Columbia also have passed 
regulations designed to prevent breaches and protect privacy. 
More laws are on the way, including a data breach-prevention 
bill now under consideration in Washington, D.C. 
Step 2: Don’t ignore the cloud, celebrate it 
Next to compliance, the increasing popularity of cloud 
computing is the biggest driver of the IT security business, say 
security experts. Gartner predicts cloud-related business will 
grow to $150 billion in 2013, more than triple what it was two 
years ago at $46 billion. 
Interestingly enough, security and the cloud have a paradoxical 
relationship, says Earle Humphreys, chief executive officer 
of ITEEX, a channel development company with a strong 
focus on security. Many end-user organizations, accustomed 
to having all their hardware and software on premise, where 
they can keep a close eye on them, have reservations about 
tapping the cloud for business-critical applications. They worry 
about whether their applications and data are secure enough 
in the cloud. As a result, says Humphreys, some put off cloud 
computing plans. 
“If you take a look at the top reason not to adopt the cloud, it 
is security,” he says. 
Still, and here is the paradox, while security may hamper the 
adoption of cloud computing, the business of security receives 
a significant boost once end users decide to go ahead with 
cloud-based implementations. For one thing, the cloud makes 
it possible to centralize management of entire IT environments. 
On Patrol With the CompTIA IT Security Community 
To help solution providers stay abreast of developments in IT 
security, both at the regulatory and business level, CompTIA 
recently created a collaborative group to foster discussion among 
peers and share resources. 
The CompTIA IT Security community, which developed the CompTIA 
Security Trustmark business credential, keeps members informed 
of IT security developments through a regularly updated blog. The 
community also encourages members to share best practices, help 
solve collective problems, and build relationships that can lead to 
valuable partnerships. Members include VARs, managed services 
providers, distributors, vendors, and other industry experts. 
Through the community blog, members have been able to keep 
track of significant industry discussions, such as the national data-breach 
legislation proposed in Washington D.C. While different 
states are addressing specific actions when a data breach occurs, 
no Federal law has yet been established. Though Congress has 
discussed the legislation, it’s unlikely that anything will be passed 
until late 2011. CompTIA is lobbying for passage of the bill on behalf 
of the industry and will continue to provide frequent updates to the 
IT Security Community. 
The group is also working to establish a code of conduct, a one-page 
document intended to help members meet their obligations 
to the industry and their constituents. These responsibilities include 
the protection of customers and their IT environments, reliable 
service, and the advancement of community and CompTIA goals. A 
draft of the code has been distributed to the group, and members 
are expected to ratify it in short order. 
Other activities the group is currently engaged in include creating end 
user education for compliance and regulations, identifying security 
issues related to new technologies, developing security education 
tracks for solution providers, and developing an industry awareness 
campaign for the CompTIA Security Trustmark business credential. 
Find out more about the CompTIA IT Security community at 
www.comptia.org/communities
www.comptia.org/communities 
4 www.comptia.comptioar.go/crogm/mcounmitiems unities 
As a result, security is at least as good or better than in 
strictly on-premise environments. 
In addition, the cloud eliminates most upfront on-premise 
software and hardware investments, which makes it 
irresistible to organizations under constant pressure to 
maximize their IT dollars without adding staff or expensive 
equipment. 
Making the cloud even more attractive from an economic 
standpoint is that as cloud-based solutions proliferate, the 
cost of the solutions decreases, says Scott Barlow, vice 
president of sales and marketing at Reflexion Networks, a 
vendor of hosted e-mail services based in Woburn, MA. 
The cloud is changing the security business, and 
solution providers are cashing in. The technology itself, 
be it e-mail filtering, intrusion detection, or anti-virus, 
often is sold at cost or even at a loss, says Interwork’s 
Larocque. Providers make up for the upfront loss 
by packaging the technology with monitoring and 
management services that they perform remotely and 
charge users for on a subscription basis. 
Step 3: Weave security into every 
opportunity 
For solution providers, security is both a requirement 
and an opportunity. It’s a requirement because of clients’ 
regulation compliance needs and an opportunity because 
of those needs and the expansion of the cloud. 
So while security traditionally has been considered a 
specialty in the IT channel, the market dynamics now require 
at least a basic level of security competency. “Security must 
be an element of every solution implemented and managed 
by solution providers,” says Hamilton. 
Especially if you’re delivering managed services or hosted 
solutions, there is simply no way of skirting client security 
needs. “Security should be sold as part of every MSP 
sale because security touches everything in a customer’s 
enterprise,” says Todd Jones, general manager of 
Watchman Computer Services, a security-focused MSP in 
Denver, CO. 
When taking over part or all of a client’s IT environment 
remotely through a managed services arrangement or 
delivering applications over the cloud, solution providers 
Master the CompTIA Security Trustmark 
Since its launch in 2008, the CompTIA Security Trustmark business 
credential has become the industry standard for solution providers 
wanting to assure customers they have the experience and know-how 
to secure their IT environments. 
The vendor-neutral, business-level credential identifies solution 
providers that follow best practices, established protocols, and 
documentation methods in delivering security solutions to clients. 
For solution providers, there is no better way to stand out from the 
crowd when delivering security services and technology to clients, 
says Todd Jones, general manager at Watchman Computer Services, 
a Denver-based managed services provider. 
“Security touches just about everything,” he says. “It’s really 
important in the marketplace to have a standard of security best 
practices.” 
Earle Humphreys, chief executive officer of Information Technology 
Executive Exchange (ITEEX), a security-focused channel 
development organization, says the Security Trustmark program 
solved a problem in the IT channel. End users often were reluctant 
to engage solution providers because they had doubts about the 
providers’ level of expertise in security. 
“There was a credibility issue that was hurting vendor sales,” says 
Humphreys, who worked on contract with CompTIA to help develop 
the Security Trustmark credential. Now, he says, end-user clients 
have a reliable way to vet IT security services providers, while the 
providers stand to get more businesses by achieving a business 
credential. 
To earn the Security Trustmark credential, solution providers have 
to complete a comprehensive review process that includes an online 
assessment and the submission of various documents detailing 
company processes and practices. Security Trustmark applicants 
also are subject to unannounced audits, and once they receive the 
credential, they have to undergo an annual review process. 
The Security Trustmark business credential differs from the various 
CompTIA certifications, such as CompTIA A+, CompTIA Network+ 
and CompTIA Security+, in that it covers an entire organization, 
versus validating individual competency. 
Find out more about the CompTIA Security Trustmark at 
www.comptia.org/securitytrustmark
quick start guide 
P OW E R E D B Y : 
IT Security 
5 
accept a level of liability that didn’t exist in the old break/ 
fix, project-based client engagements. “If you don’t do some 
basic security for your client, you’re putting your business at 
risk,” says Humphreys. 
“Security is a discipline. It is part of the fabric, the expertise 
that you are selling your customer,” says Jones. “Any provider 
that approaches this as anything else is on the verge of 
doing a disservice to their customers and short-changing 
themselves. It is not a ‘bolt-on, set-it and forget it’ product 
that can be sold, installed, and then you’re on to the next sale.” 
To help solution providers meet their security requirements, 
CompTIA in 2008 launched a business credential, the 
CompTIA Security Trustmark. The vendor-neutral, business-level 
credential identifies solution providers that have proven 
they follow security best practices in accordance with 
CompTIA standards (see sidebar on page 6). The Security 
Trustmark gives solution providers credibility, says Humphreys, 
who worked under contract for CompTIA to develop the 
Security Trustmark credential. 
Step 4: Embrace best practices 
Much like their clients’ networks, solution providers are 
handling a heavy load when it comes to security. To ensure 
they do right by their clients, security experts recommend that 
solution providers adopt certain practices. 
Achieving a Security Trustmark credential, say experts, goes 
a long way to show clients you have the proper expertise and 
employ the best practices to protect their IT environments. In 
addition, solution providers should do the following: 
• Educate customers 
• Perform vulnerability assessments 
• Make sure tools from different vendors work together 
• Set policies for clients on safe computing practices 
• Know security regulations 
• Partner with other solution providers for expertise 
• Maintain communication with clients 
Subscription-based IT Security Services Gain Traction 
More and more solution providers are giving up on trying to 
squeeze profits out of IT security technology. But they don’t mind, 
so long as they get to charge the customer monthly or quarterly 
fees to deliver security as a service. 
Tim Larocque, director of sales at Interwork Technologies, an 
Ottawa-based distributor of IT security solutions, says deals in 
which solution providers sacrifice profits upfront in the expectation 
of future recurring revenue are increasingly common. Over time, 
the recurring revenue more than makes up for the upfront profit 
loss, he asserts. 
Whether they lump security with an overall managed services 
package or sell security as separate hosted services as part of a 
SaaS contract, the primary goal is to establish a recurring revenue 
stream from the customer. Clients in recent years have warmed up 
to the idea of paying subscription fees for cloud-based services 
that would cost a lot more if they had to deploy and maintain the 
technology on premise. 
In addition, handing over to a solution provider that can handle 
remotely the burdens of updating anti-virus and spam-filtering 
subscriptions, maintaining firewalls and managing patch manage-ment 
keeps in-house IT staffing budgets down and allows compa-nies 
to better focus on their core business. To be sure, the cloud-based 
security model is gaining traction, say security providers, but 
education is still necessary for clients who fear that cloud-based 
solutions are less secure. 
Larocque says Interwork’s most successful partners have concluded 
that their security focus needs to be on service, not technology. 
As a result, they are enjoying security business growth rates of as 
much as 40 to 50 percent, he says. 
Scott Barlow, vice president of sales and marketing at Reflexion 
Networks, a Woburn, MA,-based vendor of hosted e-mail security, 
is seeing similar trends. Reflexion partners, he says, are enjoying 
growth rates of 25 percent or more. “We’ve seen significant growth 
in the past 12 to 18 months,” Barlow says. 
Like Larocque, Barlow says he is seeing solution providers bundle 
their security services into managed services packages that also 
include remote monitoring and management of PCs, servers, 
network devices, and applications. Embedding security into man-aged 
services contracts, says Barlow, makes it easier to address the 
client’s security needs.
Step 5: Re-educate customers 
Especially among small and medium-sized business 
(SMB), network and data security requirements often 
are only partly addressed, and in the worst cases, almost 
completely ignored. Business owners, for the most part, 
understand threats such as viruses and spam, but they 
lack a comprehensive approach to protect their data, 
prevent intrusion, and implement policies on how to react 
to breaches. 
“Small businesses are too trusting,” says Jones. “They’re 
not as a concerned as they need to be. They don’t 
understand the risk unless you continuously hammer it 
away at them.” 
“Customers need to understand that security is not 
a technical solution you purchase,” says CompTIA’s 
Hamilton. “Security is a complex problem that requires a 
holistic approach to be effective.” 
In their role as educators, solution providers also need to 
point out the economics of security—that breaches can 
incur high remediation costs and in the worst cases put a 
company’s future at risk. 
“You’re essentially selling insurance,” says Barlow. 
Awareness is key, says Larocque. Business owners may 
lull themselves into thinking their data is safe if a breach 
hasn’t already happened to them, and as a result, not 
make the necessary investment. But they don’t realize, for 
instance, that malware is released every five seconds and 
an attack on their network could be only a matter of time. 
Solution providers must impress on clients that security 
threats are real, relentless, and constantly evolving, 
Larocque says. 
In fact, breaches take place practically daily, as attested 
by the Web site DatalossDB.org, which lists and 
documents all reported incidents and the number of 
records, from zero to the millions, exposed in each case. 
“Breaches are a regular occurrence,” says Hamilton. 
“Customers cannot afford to be blasé about the 
potential risks.” 
www.comptia.org/communities 
6 www.comptia.comptioar.go/crogm/mcounmitiems unities 
Step 6: Promote regular assessments 
Security has to be part of the conversation whenever a 
solution provider is pitching its offerings to a prospective 
customer, says Hamilton. “It can’t be sidestepped anymore.” 
As such, it’s a good practice to conduct an assessment of 
the customer’s security environment, including desktops 
and mobile devices, before deploying any technology. 
Assessments typically include checking the subscription 
status of anti-virus and anti-spyware tools and testing 
existing firewalls for effectiveness. 
“It probably wouldn’t take your average VAR more than 
a day or two to do a basic security assessment for their 
clients,” says Humphreys. 
Depending on the size of the client’s IT environment, 
an assessment may include vulnerability scanning to 
identify holes in the network and potential risks related 
to applications and Web services. Penetration testing to 
see how easy it is to break into the network may also be 
advisable. 
Assessments should look beyond technology to also 
cover policies, say security experts. Solution providers 
may find that a client has no policies in place covering 
how to react to data breaches or that an organization 
has never instructed its users not to share their individual 
network-access information. 
Assessment findings should be compiled in a report 
to share with the client to demonstrate current 
vulnerabilities and formulate a strategy to eliminate the 
vulnerabilities and build a solid security environment. 
Harmony in security 
Humphreys counsels due diligence in deciding which 
security products solution providers should use for their 
clients. Solution providers may prefer a firewall from one 
vendor and anti-virus software from another, but they 
need to make sure the different pieces work together. 
Otherwise, the result is unwanted complexity or, even 
worse, an environment that adds to the vulnerabilities 
it is supposed to be addressing. The history of IT is 
littered with cases of applications that were supposed
quick start guide 
P OW E R E D B Y : 
IT Security 
7 
to be compatible but failed to communicate, as well as 
environments with different sets of hardware and user 
interfaces that turn into real nightmares for administrators. 
Hamilton says solution providers must think about the 
overall security landscape and how their solution fits into the 
bigger picture. 
For solution providers delivering security as part of their 
managed services offerings, the easiest way go about this 
is to pick a managed services vendor that bundles security 
tools such as anti-virus, e-mail filtering, and firewalls, into its 
remote monitoring and management (RMM) tool. “That way 
you know they picked the friendly products and you know 
they work,” Humphreys says. 
Step 7: Stick with clear policies 
Security transcends technology in that breaches and leaks 
often result from human error. A company may have the 
best technology available to secure its networks, but if 
users are sharing passwords, accessing Web sites that may 
contain virus, or e-mailing unencrypted documents with 
sensitive information, the technology won’t help them. 
Aside from day-to-day safe computing practices, policies 
also must address how to react when a threat is detected, 
a virus gets through or an application malfunctions and 
creates a point of exposure. Watchman Computer Services’ 
Todd Jones says the discipline of security entails three main 
elements: protection, detection, and response. 
“Without response you do not have security,” he says. “Every 
door can be kicked in, every safe can be cracked, every 
fortress can be breached, and every treasure can be stolen 
if there is no response. It’s no different with computer and 
network security. You can bolt in all the latest and greatest 
products, but installed without response, you do not have 
security.” 
Protocols need to be in place so that users and 
administrators know what to do when they receive an 
alert, says Jones, who believes that is where security as a 
managed service really makes a difference. 
For solution providers monitoring their clients’ environments 
remotely, that means having a policy in place prescribing 
action when an alert comes through. Be it a remediation 
Names and Organizations to Know 
Solution providers looking for tips about how to deliver 
security solutions to their clients face no shortage of sources 
of information. Following are some suggestions on where to 
get information tailored specifically to solution provider needs. 
Find information about the CompTIA Security Trustmark here: 
www.comptia.org/securitytrustmark 
For updates on the CompTIA public advocacy efforts, 
including lobbying for security regulations, check out the 
public advocacy section of the association’s web site: 
www.comptia.org/publicpolicy.aspx 
The CompTIA IT security blog keeps updated on the 
association’s IT security community, whose work includes 
development of the Security Trustmark business credential 
and collaboration with the CompTIA Public Advocacy Office: 
blog.comptia.org/category/subtopics/it-security 
CompTIA IT Security Community 
www.comptia.org/communities 
Noel Eberline, director of the CompTIA IT security community, 
publishes a blog in which he addresses myriad security-related 
topics. Access the blog here: 
blog.networkwatchman.com 
The Open Security Foundation keeps tabs on security 
breaches across the world and publishes a database of all 
known incidents causing data losses. The database is updated 
just about daily and accessible here: 
datalossdb.org 
ITEEX, founded in 2002 as a peer-to-peer organization, is a 
security-focused channel development company. ITEEX chief 
executive officer, Earle Humphreys, worked with CompTIA 
on developing the Security Trustmark credential. Access the 
company website here: 
www.iteex-channel.com 
And the ITEEX blog here: 
www.iteex-channel.com/blog
cleanup, file quarantine, or a patch application, specific 
rules should be in place for response and escalation. 
Step 8: Study up on regulations 
Knowing the regulations that affect IT security business is 
easier said than done, considering that federal standards 
are still evolving and there isn’t yet a national regulation 
that covers breach notifications. However, a number 
of states have enacted regulations addressing data 
breaches, with Massachusetts boasting the most stringent 
laws on the books. 
But, as the saying goes, ignorance of the law is no excuse. 
“It’s important for the solution provider to know what 
the regulations are all about, what they apply to,” says 
Reflexion’s Barlow. 
Even though solution providers need to become de 
facto experts on the law, achieving that status isn’t easy. 
Solution providers operating in multiple states have to 
contend with regulations that differ from state to state. 
Massachusetts mandates that organizations handling 
sensitive data, such as finance and medical records, 
implement data leak prevention. New Jersey has a 
regulation that many in the industry consider bizarre: 
When a leak occurs, the affected company is required to 
notify the state police before even its clients or partners. 
What’s needed is a national standard covering data leaks, 
say security experts. CompTIA has been lobbying congress 
to pass data-leak legislation now under consideration, and 
while there is a chance a bill could be approved this year, 
most likely passage will occur next year. 
Barlow suggests that solution providers uncertain about 
which regulations affect their clients should leverage their 
vendor partners. Security vendors have people in their 
staffs (with knowledge about regulations and compliance 
requirements) who can help solution providers make the 
right decisions for their clients, he says. 
Partner for expertise 
In delivering security solutions and services, solution 
providers in some cases should seek partners that have 
www.comptia.org/communities 
8 www.comptia.comptioar.go/crogm/mcounmitiems unities 
the expertise they lack, says WakaDigital’s Braun. A 
partner that specializes in security, such as WakaDigital, 
can train, assess, and set policies for the client, he says. 
In cases where it makes sense, the security partner can 
stay in the picture in a consultative role, either as a silent 
partner in the background or in a more visible way in 
front of the partner, Braun says. 
Humphreys believes there are several advantages 
to working with a partner. Those include avoiding 
infrastructure costs and making up for lack of expertise 
in building solutions. A security partner bringing in a 
solution already has tested the technology so you don’t 
have to and already has experience with issues that you 
may never have encountered, Humphreys says. 
Of course partnering carries some risks, so it’s important 
to ensure a prospective partner “doesn’t have a history 
of working to come between you and your clients,” he 
says. Humphreys recommends doing your homework by 
checking with other companies that have worked with the 
prospective partner. 
In addition, says Humphreys, though a solution provider 
would partner with another to add expertise, the provider 
still needs to know enough about the technology. You 
want to make sure the solution the partner is bringing 
works, or that it isn’t a new, unproven release with bugs 
that haven’t been worked out.
quick start guide 
P OW E R E D B Y : 
IT Security 
9 
Keep Talking 
Barlow advises solution providers meet with customers monthly 
or quarterly to review the work the provider does to protect 
clients’ IT environment. Especially for solution providers 
delivering security as a managed or hosted service, periodic 
meetings can be key. 
MSPs say clients tend to forget the work that goes on behind 
the scenes to keep their IT environments in shape and, at 
invoice time, question what they are getting for what they are 
paying. During the meetings, for instance, solution providers 
should go over how they prevented a network attack by 
responding to system alerts or how they stopped unsafe Web 
surfing by detecting it and alerting the client about it. 
Communication with the client should keep business value at 
the forefront. Barlow suggests using security arguments to 
implement business process improvements, such as replacing 
tax and financial forms with electronic files. 
Braun agrees with the need for communication. Remind the 
client, he says, of how security helps protects their business 
investments by talking to them about how much it costs to 
remediate breaches that could have been prevented with right 
technology and security policies in place. 
“At the end of the day,” he says, “you’re not providing IT, you’re 
providing business-process management.” 
About CompTIA 
CompTIA is the voice of the world’s information technology 
(IT) industry. 
As a non-profit trade association advancing the global interests 
of IT professionals and companies, we focus our programs 
on four main areas: education, certification, advocacy and 
philanthropy. We: 
• Educate the IT channel: Our educational resources, 
comprising instructor-led courses, online guides, webinars, 
market research, business mentoring, open forums and 
networking events, help our members advance their level of 
professionalism and grow their businesses. 
• Certify the IT workforce: We are the leading provider of 
technology-neutral and vendor-neutral IT certifications, with 
more than 1.4 million certification holders worldwide. 
• Advocate on behalf of the IT industry: In Washington, D.C., 
we bring the power of small- and medium-sized IT businesses 
to bear as a united voice and help our members navigate 
regulations that may affect their businesses. 
• Give back through philanthropy: Our foundation enables 
disadvantaged populations to gain the skills they need for 
employment in the IT industry. 
Our vision of the IT landscape is informed by more than 25 
years of global perspective and more than 2,800 members 
and 1,000 business partners that span the entire IT channel. 
We are driven by our members and led by an elected board 
of industry professionals. 
All proceeds are directly reinvested in programs that 
benefit our valued members and the industry as a whole. 
Headquartered outside of Chicago, we have offices across 
the United States and in Australia, Canada, China, Germany, 
India, Japan, South Africa and the United Kingdom. For more 
information, visit comptia.org.
www.comptia.org/communities 
www.comptia.org 
© 2011 CompTIA Properties, LLC, used under license by CompTIA Member Services, LLC. All rights reserved. All membership activities and offerings to members of CompTIA, Inc. are 
operated exclusively by CompTIA Member Services, LLC. CompTIA, A+, Authorized Service Center, Breakaway, Network+, Security+, and Security Trustmark are registered trademarks 
of CompTIA Properties, LLC in the U.S. and internationally. Other brands and company names mentioned herein may be trademarks or service marks of CompTIA Properties, LLC or of their 
respective owners. Reproduction or dissemination prohibited without written consent of CompTIA Properties, LLC. Printed in the U.S. Feb 2011 1721-US 
www.comptia.org/communities

Weitere ähnliche Inhalte

Was ist angesagt?

Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 
CyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalCyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalRobertPike
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprisesTaranggg11
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 enKarel Van Isacker
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liabilityDFickett
 
Deloitte the case for disruptive technology in the legal profession 2017
Deloitte the case for disruptive technology in the legal profession 2017 Deloitte the case for disruptive technology in the legal profession 2017
Deloitte the case for disruptive technology in the legal profession 2017 Ian Beckett
 
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaAnalyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaEMC
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseReadWrite
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis
 
Cyber security basics for law firms
Cyber security basics for law firmsCyber security basics for law firms
Cyber security basics for law firmsRobert Westmacott
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
Kaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksKaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksConstantin Cocioaba
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To ConsiderSymantec
 
Tufin white paper v1 dcr final
Tufin white paper v1 dcr final Tufin white paper v1 dcr final
Tufin white paper v1 dcr final Clive Freedman
 
[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure ComplianceAIIM International
 
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...PortalGuard
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enoughEMC
 
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Creus Moreira Carlos
 

Was ist angesagt? (19)

Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
CyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalCyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) final
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
 
Deloitte the case for disruptive technology in the legal profession 2017
Deloitte the case for disruptive technology in the legal profession 2017 Deloitte the case for disruptive technology in the legal profession 2017
Deloitte the case for disruptive technology in the legal profession 2017
 
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaAnalyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - China
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective
 
Cyber security basics for law firms
Cyber security basics for law firmsCyber security basics for law firms
Cyber security basics for law firms
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
Kaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksKaspersky: Global IT Security Risks
Kaspersky: Global IT Security Risks
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To Consider
 
Tufin white paper v1 dcr final
Tufin white paper v1 dcr final Tufin white paper v1 dcr final
Tufin white paper v1 dcr final
 
[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance
 
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enough
 
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
 

Andere mochten auch

Creating Sustainable Careers in Information Technology
Creating Sustainable Careers in Information TechnologyCreating Sustainable Careers in Information Technology
Creating Sustainable Careers in Information TechnologyCompTIA
 
Gartner Unique Advantage Overview
Gartner Unique Advantage OverviewGartner Unique Advantage Overview
Gartner Unique Advantage OverviewJordyn McGrory
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
2017 IT Industry Outlook
2017 IT Industry Outlook 2017 IT Industry Outlook
2017 IT Industry Outlook CompTIA
 
Introduction to Gartner
Introduction to GartnerIntroduction to Gartner
Introduction to Gartnerjasoncreane
 
Seven building blocks for MDM
Seven building blocks for MDMSeven building blocks for MDM
Seven building blocks for MDMKousik Mukherjee
 

Andere mochten auch (9)

Creating Sustainable Careers in Information Technology
Creating Sustainable Careers in Information TechnologyCreating Sustainable Careers in Information Technology
Creating Sustainable Careers in Information Technology
 
Gartner Unique Advantage Overview
Gartner Unique Advantage OverviewGartner Unique Advantage Overview
Gartner Unique Advantage Overview
 
Why Gartner
Why GartnerWhy Gartner
Why Gartner
 
Gartner Overview
Gartner OverviewGartner Overview
Gartner Overview
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
2017 IT Industry Outlook
2017 IT Industry Outlook 2017 IT Industry Outlook
2017 IT Industry Outlook
 
Gartner Introduction
Gartner IntroductionGartner Introduction
Gartner Introduction
 
Introduction to Gartner
Introduction to GartnerIntroduction to Gartner
Introduction to Gartner
 
Seven building blocks for MDM
Seven building blocks for MDMSeven building blocks for MDM
Seven building blocks for MDM
 

Ähnlich wie Quick Start Guide to IT Security for Businesses

ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - WebFahd Khan
 
Top Technology Trends in Insurance Domain.pdf
Top Technology Trends in Insurance Domain.pdfTop Technology Trends in Insurance Domain.pdf
Top Technology Trends in Insurance Domain.pdfledumsd
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
What will be the Impact of GDPR Compliance in EU & UK?
What will be the Impact of GDPR Compliance in EU & UK?What will be the Impact of GDPR Compliance in EU & UK?
What will be the Impact of GDPR Compliance in EU & UK?Cigniti Technologies Ltd
 
Industrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the CloudIndustrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the CloudLockheed Martin
 
Trends in the IT Profession Annotated BibliographyAdemola Adeleke.docx
Trends in the IT Profession Annotated BibliographyAdemola Adeleke.docxTrends in the IT Profession Annotated BibliographyAdemola Adeleke.docx
Trends in the IT Profession Annotated BibliographyAdemola Adeleke.docxwillcoxjanay
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemBernard Marr
 
Networking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile WorkersNetworking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile WorkersEric Wong
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51Felipe Prado
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technologyEzraGray1
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONJohn Pinson
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOJim Romeo
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOJim Romeo
 
Virtual Data Room Industry Growth Statistics and Trends.pdf
Virtual Data Room Industry Growth Statistics and Trends.pdfVirtual Data Room Industry Growth Statistics and Trends.pdf
Virtual Data Room Industry Growth Statistics and Trends.pdfHokme
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_AdamsJulius Adams
 

Ähnlich wie Quick Start Guide to IT Security for Businesses (20)

ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
 
Top Technology Trends in Insurance Domain.pdf
Top Technology Trends in Insurance Domain.pdfTop Technology Trends in Insurance Domain.pdf
Top Technology Trends in Insurance Domain.pdf
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
What will be the Impact of GDPR Compliance in EU & UK?
What will be the Impact of GDPR Compliance in EU & UK?What will be the Impact of GDPR Compliance in EU & UK?
What will be the Impact of GDPR Compliance in EU & UK?
 
Industrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the CloudIndustrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the Cloud
 
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
 
Trends in the IT Profession Annotated BibliographyAdemola Adeleke.docx
Trends in the IT Profession Annotated BibliographyAdemola Adeleke.docxTrends in the IT Profession Annotated BibliographyAdemola Adeleke.docx
Trends in the IT Profession Annotated BibliographyAdemola Adeleke.docx
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data Problem
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
Networking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile WorkersNetworking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile Workers
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technology
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTION
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
 
Virtual Data Room Industry Growth Statistics and Trends.pdf
Virtual Data Room Industry Growth Statistics and Trends.pdfVirtual Data Room Industry Growth Statistics and Trends.pdf
Virtual Data Room Industry Growth Statistics and Trends.pdf
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_Adams
 
Protecting Mobile
Protecting MobileProtecting Mobile
Protecting Mobile
 
Qradar Business Case
Qradar Business CaseQradar Business Case
Qradar Business Case
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 

Mehr von CompTIA

CompTIA IT Employment Tracker – December 2021
CompTIA IT Employment Tracker –  December 2021CompTIA IT Employment Tracker –  December 2021
CompTIA IT Employment Tracker – December 2021CompTIA
 
CompTIA IT Employment Tracker – November 2021
CompTIA IT Employment Tracker –  November 2021CompTIA IT Employment Tracker –  November 2021
CompTIA IT Employment Tracker – November 2021CompTIA
 
CompTIA IT Employment Tracker – October 2021
CompTIA IT Employment Tracker –  October 2021CompTIA IT Employment Tracker –  October 2021
CompTIA IT Employment Tracker – October 2021CompTIA
 
CompTIA IT Employment Tracker – September 2021
CompTIA IT Employment Tracker –  September 2021CompTIA IT Employment Tracker –  September 2021
CompTIA IT Employment Tracker – September 2021CompTIA
 
CompTIA IT Employment Tracker – July 2021
CompTIA IT Employment Tracker –  July 2021CompTIA IT Employment Tracker –  July 2021
CompTIA IT Employment Tracker – July 2021CompTIA
 
CompTIA IT Employment Tracker – June 2021
CompTIA IT Employment Tracker –  June 2021CompTIA IT Employment Tracker –  June 2021
CompTIA IT Employment Tracker – June 2021CompTIA
 
Trends in Automation 2021
Trends in Automation 2021Trends in Automation 2021
Trends in Automation 2021CompTIA
 
CompTIA IT Employment Tracker – May 2021
CompTIA IT Employment Tracker –  May 2021CompTIA IT Employment Tracker –  May 2021
CompTIA IT Employment Tracker – May 2021CompTIA
 
CompTIA IT Employment Tracker – April 2021
CompTIA IT Employment Tracker –  April 2021CompTIA IT Employment Tracker –  April 2021
CompTIA IT Employment Tracker – April 2021CompTIA
 
IT Operations and Emerging Technology
IT Operations and Emerging TechnologyIT Operations and Emerging Technology
IT Operations and Emerging TechnologyCompTIA
 
CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021CompTIA
 
Help Desk Trends
Help Desk TrendsHelp Desk Trends
Help Desk TrendsCompTIA
 
CompTIA IT Employment Tracker – February 2021
CompTIA IT Employment Tracker –  February 2021CompTIA IT Employment Tracker –  February 2021
CompTIA IT Employment Tracker – February 2021CompTIA
 
CompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry OutlookCompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry OutlookCompTIA
 
CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021CompTIA
 
CompTIA IT Employment Tracker – November 2020
CompTIA IT Employment Tracker –  November 2020CompTIA IT Employment Tracker –  November 2020
CompTIA IT Employment Tracker – November 2020CompTIA
 
CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020CompTIA
 
CompTIA IT Employment Tracker – September 2020
CompTIA IT Employment Tracker –  September 2020CompTIA IT Employment Tracker –  September 2020
CompTIA IT Employment Tracker – September 2020CompTIA
 
CompTIA IT Employment Tracker – August 2020
CompTIA IT Employment Tracker –  August 2020CompTIA IT Employment Tracker –  August 2020
CompTIA IT Employment Tracker – August 2020CompTIA
 
CompTIA IT Employment Tracker – July 2020
CompTIA IT Employment Tracker –  July 2020CompTIA IT Employment Tracker –  July 2020
CompTIA IT Employment Tracker – July 2020CompTIA
 

Mehr von CompTIA (20)

CompTIA IT Employment Tracker – December 2021
CompTIA IT Employment Tracker –  December 2021CompTIA IT Employment Tracker –  December 2021
CompTIA IT Employment Tracker – December 2021
 
CompTIA IT Employment Tracker – November 2021
CompTIA IT Employment Tracker –  November 2021CompTIA IT Employment Tracker –  November 2021
CompTIA IT Employment Tracker – November 2021
 
CompTIA IT Employment Tracker – October 2021
CompTIA IT Employment Tracker –  October 2021CompTIA IT Employment Tracker –  October 2021
CompTIA IT Employment Tracker – October 2021
 
CompTIA IT Employment Tracker – September 2021
CompTIA IT Employment Tracker –  September 2021CompTIA IT Employment Tracker –  September 2021
CompTIA IT Employment Tracker – September 2021
 
CompTIA IT Employment Tracker – July 2021
CompTIA IT Employment Tracker –  July 2021CompTIA IT Employment Tracker –  July 2021
CompTIA IT Employment Tracker – July 2021
 
CompTIA IT Employment Tracker – June 2021
CompTIA IT Employment Tracker –  June 2021CompTIA IT Employment Tracker –  June 2021
CompTIA IT Employment Tracker – June 2021
 
Trends in Automation 2021
Trends in Automation 2021Trends in Automation 2021
Trends in Automation 2021
 
CompTIA IT Employment Tracker – May 2021
CompTIA IT Employment Tracker –  May 2021CompTIA IT Employment Tracker –  May 2021
CompTIA IT Employment Tracker – May 2021
 
CompTIA IT Employment Tracker – April 2021
CompTIA IT Employment Tracker –  April 2021CompTIA IT Employment Tracker –  April 2021
CompTIA IT Employment Tracker – April 2021
 
IT Operations and Emerging Technology
IT Operations and Emerging TechnologyIT Operations and Emerging Technology
IT Operations and Emerging Technology
 
CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021
 
Help Desk Trends
Help Desk TrendsHelp Desk Trends
Help Desk Trends
 
CompTIA IT Employment Tracker – February 2021
CompTIA IT Employment Tracker –  February 2021CompTIA IT Employment Tracker –  February 2021
CompTIA IT Employment Tracker – February 2021
 
CompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry OutlookCompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry Outlook
 
CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021
 
CompTIA IT Employment Tracker – November 2020
CompTIA IT Employment Tracker –  November 2020CompTIA IT Employment Tracker –  November 2020
CompTIA IT Employment Tracker – November 2020
 
CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020
 
CompTIA IT Employment Tracker – September 2020
CompTIA IT Employment Tracker –  September 2020CompTIA IT Employment Tracker –  September 2020
CompTIA IT Employment Tracker – September 2020
 
CompTIA IT Employment Tracker – August 2020
CompTIA IT Employment Tracker –  August 2020CompTIA IT Employment Tracker –  August 2020
CompTIA IT Employment Tracker – August 2020
 
CompTIA IT Employment Tracker – July 2020
CompTIA IT Employment Tracker –  July 2020CompTIA IT Employment Tracker –  July 2020
CompTIA IT Employment Tracker – July 2020
 

Kürzlich hochgeladen

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Kürzlich hochgeladen (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Quick Start Guide to IT Security for Businesses

  • 1. Eight Steps to IT Security Success A practical guide for solution providers www.comptia.org/communities www.comptia.org/communities Q U I C K S TA R T G U I D E P OW E R E D B Y : www.comptia.org/communities
  • 2. Eight Steps to IT Security Success Solution provider Jacob K. Braun prefers a reasoned approach when selling IT security to clients. Rather than trying to scare clients, Braun appeals to their sense of ethics. “I ask them: ‘What would your clients say if they knew you didn’t have security in place?’” says Braun, the president and chief operating officer of WakaDigital Media Corp., a managed services provider (MSP) based in Amherst, MA. “You can approach it from the fear factor, but the fear factor can backfire pretty quickly,” he says. Scare tactics put clients on the defensive, and that makes it much harder to sell them the solution they need, he adds. No one really questions the need for security, even if too many clients still don’t have a good grasp of everything it entails, say Braun and others in the IT channel. The onus, therefore, is on solution providers to educate clients on security risks, assess those risks, and address them in a comprehensive way. They also need to ensure their clients comply with a growing set of federal and state data-protection regulations. “Security is much more than perimeter firewalls and anti-virus protection. A truly secure approach must be multi-faceted and comprehensive,” says Jim Hamilton, senior director of member communities at the Computer Technology Industry Association (CompTIA). CompTIA is based in Downers Grove, IL, and is known as the largest nonprofit trade association in IT. A truly secure environment provides protection, prevention, and remediation. To achieve all that, say security experts, a security platform has to perform multiple functions in what is called a multi-layer approach: firewalls to control network access, tools that filter Web content and e-mail, encryption protocols, and intrusion prevention and detection. Security also entails policies and tools that control the use of passwords, www.comptia.org/communities 2 www.comptia.comptioar.go/crogm/mcounmitiems unities mobile and VPN connections, which users access which data, and how to react when a data breach or leak occurs. The proliferation of cloud-based solutions and technologies such as social networking and virtualization, say security experts, make the already-complex endeavor of securing IT environments even more intricate. New challenges such as protocols for using social media and how to apply security policies to virtualized networks have to be addressed, says Tim Larocque, director of sales at Ottawa-based Interwork Technologies, a distributor of IT security solutions. “Those are significant challenges that I don’t think most solution providers are taking the time to address,” Larocque says. Step 1: Leverage compliance regulations for security growth Solution providers that take the time to understand security requirements stand to gain from a healthy, growing market. The need for security never goes away. It keeps increasing as hackers find new ways to break into networks. Market research firm Gartner predicts 4 percent growth in 2010 in security-related software sales and 3 percent in security services. Those are healthy enough numbers,
  • 3. quick start guide P OW E R E D B Y : IT Security 3 especially on the heels of a major recession, but MSPs and providers of cloud-based services say they are seeing growth rates of 25 percent or more. “We’re seeing very, very healthy growth in the security market,” says Larocque. “It’s a very predictable and recession-proof market.” Interwork partners, he says, are enjoying growth rates of as much as 40 to 50 percent. One major driver, according to IT security experts, is the need for organizations large and small to comply with data protection laws. Businesses that handle sensitive data, be it financial information, medical records or legal documents, have to comply with a growing set of regulations, both at the state and federal levels, imposing strict requirements on how to handle the data. Federal laws enacted since 1996, such as the Sarbanes- Oxley Act, which applies to accounting practices, and HIPAA (Health Insurance Portability and Accountability Act), which addresses medical records, have created a cottage industry of compliance-focused solutions and services. Forty-five states and the District of Columbia also have passed regulations designed to prevent breaches and protect privacy. More laws are on the way, including a data breach-prevention bill now under consideration in Washington, D.C. Step 2: Don’t ignore the cloud, celebrate it Next to compliance, the increasing popularity of cloud computing is the biggest driver of the IT security business, say security experts. Gartner predicts cloud-related business will grow to $150 billion in 2013, more than triple what it was two years ago at $46 billion. Interestingly enough, security and the cloud have a paradoxical relationship, says Earle Humphreys, chief executive officer of ITEEX, a channel development company with a strong focus on security. Many end-user organizations, accustomed to having all their hardware and software on premise, where they can keep a close eye on them, have reservations about tapping the cloud for business-critical applications. They worry about whether their applications and data are secure enough in the cloud. As a result, says Humphreys, some put off cloud computing plans. “If you take a look at the top reason not to adopt the cloud, it is security,” he says. Still, and here is the paradox, while security may hamper the adoption of cloud computing, the business of security receives a significant boost once end users decide to go ahead with cloud-based implementations. For one thing, the cloud makes it possible to centralize management of entire IT environments. On Patrol With the CompTIA IT Security Community To help solution providers stay abreast of developments in IT security, both at the regulatory and business level, CompTIA recently created a collaborative group to foster discussion among peers and share resources. The CompTIA IT Security community, which developed the CompTIA Security Trustmark business credential, keeps members informed of IT security developments through a regularly updated blog. The community also encourages members to share best practices, help solve collective problems, and build relationships that can lead to valuable partnerships. Members include VARs, managed services providers, distributors, vendors, and other industry experts. Through the community blog, members have been able to keep track of significant industry discussions, such as the national data-breach legislation proposed in Washington D.C. While different states are addressing specific actions when a data breach occurs, no Federal law has yet been established. Though Congress has discussed the legislation, it’s unlikely that anything will be passed until late 2011. CompTIA is lobbying for passage of the bill on behalf of the industry and will continue to provide frequent updates to the IT Security Community. The group is also working to establish a code of conduct, a one-page document intended to help members meet their obligations to the industry and their constituents. These responsibilities include the protection of customers and their IT environments, reliable service, and the advancement of community and CompTIA goals. A draft of the code has been distributed to the group, and members are expected to ratify it in short order. Other activities the group is currently engaged in include creating end user education for compliance and regulations, identifying security issues related to new technologies, developing security education tracks for solution providers, and developing an industry awareness campaign for the CompTIA Security Trustmark business credential. Find out more about the CompTIA IT Security community at www.comptia.org/communities
  • 4. www.comptia.org/communities 4 www.comptia.comptioar.go/crogm/mcounmitiems unities As a result, security is at least as good or better than in strictly on-premise environments. In addition, the cloud eliminates most upfront on-premise software and hardware investments, which makes it irresistible to organizations under constant pressure to maximize their IT dollars without adding staff or expensive equipment. Making the cloud even more attractive from an economic standpoint is that as cloud-based solutions proliferate, the cost of the solutions decreases, says Scott Barlow, vice president of sales and marketing at Reflexion Networks, a vendor of hosted e-mail services based in Woburn, MA. The cloud is changing the security business, and solution providers are cashing in. The technology itself, be it e-mail filtering, intrusion detection, or anti-virus, often is sold at cost or even at a loss, says Interwork’s Larocque. Providers make up for the upfront loss by packaging the technology with monitoring and management services that they perform remotely and charge users for on a subscription basis. Step 3: Weave security into every opportunity For solution providers, security is both a requirement and an opportunity. It’s a requirement because of clients’ regulation compliance needs and an opportunity because of those needs and the expansion of the cloud. So while security traditionally has been considered a specialty in the IT channel, the market dynamics now require at least a basic level of security competency. “Security must be an element of every solution implemented and managed by solution providers,” says Hamilton. Especially if you’re delivering managed services or hosted solutions, there is simply no way of skirting client security needs. “Security should be sold as part of every MSP sale because security touches everything in a customer’s enterprise,” says Todd Jones, general manager of Watchman Computer Services, a security-focused MSP in Denver, CO. When taking over part or all of a client’s IT environment remotely through a managed services arrangement or delivering applications over the cloud, solution providers Master the CompTIA Security Trustmark Since its launch in 2008, the CompTIA Security Trustmark business credential has become the industry standard for solution providers wanting to assure customers they have the experience and know-how to secure their IT environments. The vendor-neutral, business-level credential identifies solution providers that follow best practices, established protocols, and documentation methods in delivering security solutions to clients. For solution providers, there is no better way to stand out from the crowd when delivering security services and technology to clients, says Todd Jones, general manager at Watchman Computer Services, a Denver-based managed services provider. “Security touches just about everything,” he says. “It’s really important in the marketplace to have a standard of security best practices.” Earle Humphreys, chief executive officer of Information Technology Executive Exchange (ITEEX), a security-focused channel development organization, says the Security Trustmark program solved a problem in the IT channel. End users often were reluctant to engage solution providers because they had doubts about the providers’ level of expertise in security. “There was a credibility issue that was hurting vendor sales,” says Humphreys, who worked on contract with CompTIA to help develop the Security Trustmark credential. Now, he says, end-user clients have a reliable way to vet IT security services providers, while the providers stand to get more businesses by achieving a business credential. To earn the Security Trustmark credential, solution providers have to complete a comprehensive review process that includes an online assessment and the submission of various documents detailing company processes and practices. Security Trustmark applicants also are subject to unannounced audits, and once they receive the credential, they have to undergo an annual review process. The Security Trustmark business credential differs from the various CompTIA certifications, such as CompTIA A+, CompTIA Network+ and CompTIA Security+, in that it covers an entire organization, versus validating individual competency. Find out more about the CompTIA Security Trustmark at www.comptia.org/securitytrustmark
  • 5. quick start guide P OW E R E D B Y : IT Security 5 accept a level of liability that didn’t exist in the old break/ fix, project-based client engagements. “If you don’t do some basic security for your client, you’re putting your business at risk,” says Humphreys. “Security is a discipline. It is part of the fabric, the expertise that you are selling your customer,” says Jones. “Any provider that approaches this as anything else is on the verge of doing a disservice to their customers and short-changing themselves. It is not a ‘bolt-on, set-it and forget it’ product that can be sold, installed, and then you’re on to the next sale.” To help solution providers meet their security requirements, CompTIA in 2008 launched a business credential, the CompTIA Security Trustmark. The vendor-neutral, business-level credential identifies solution providers that have proven they follow security best practices in accordance with CompTIA standards (see sidebar on page 6). The Security Trustmark gives solution providers credibility, says Humphreys, who worked under contract for CompTIA to develop the Security Trustmark credential. Step 4: Embrace best practices Much like their clients’ networks, solution providers are handling a heavy load when it comes to security. To ensure they do right by their clients, security experts recommend that solution providers adopt certain practices. Achieving a Security Trustmark credential, say experts, goes a long way to show clients you have the proper expertise and employ the best practices to protect their IT environments. In addition, solution providers should do the following: • Educate customers • Perform vulnerability assessments • Make sure tools from different vendors work together • Set policies for clients on safe computing practices • Know security regulations • Partner with other solution providers for expertise • Maintain communication with clients Subscription-based IT Security Services Gain Traction More and more solution providers are giving up on trying to squeeze profits out of IT security technology. But they don’t mind, so long as they get to charge the customer monthly or quarterly fees to deliver security as a service. Tim Larocque, director of sales at Interwork Technologies, an Ottawa-based distributor of IT security solutions, says deals in which solution providers sacrifice profits upfront in the expectation of future recurring revenue are increasingly common. Over time, the recurring revenue more than makes up for the upfront profit loss, he asserts. Whether they lump security with an overall managed services package or sell security as separate hosted services as part of a SaaS contract, the primary goal is to establish a recurring revenue stream from the customer. Clients in recent years have warmed up to the idea of paying subscription fees for cloud-based services that would cost a lot more if they had to deploy and maintain the technology on premise. In addition, handing over to a solution provider that can handle remotely the burdens of updating anti-virus and spam-filtering subscriptions, maintaining firewalls and managing patch manage-ment keeps in-house IT staffing budgets down and allows compa-nies to better focus on their core business. To be sure, the cloud-based security model is gaining traction, say security providers, but education is still necessary for clients who fear that cloud-based solutions are less secure. Larocque says Interwork’s most successful partners have concluded that their security focus needs to be on service, not technology. As a result, they are enjoying security business growth rates of as much as 40 to 50 percent, he says. Scott Barlow, vice president of sales and marketing at Reflexion Networks, a Woburn, MA,-based vendor of hosted e-mail security, is seeing similar trends. Reflexion partners, he says, are enjoying growth rates of 25 percent or more. “We’ve seen significant growth in the past 12 to 18 months,” Barlow says. Like Larocque, Barlow says he is seeing solution providers bundle their security services into managed services packages that also include remote monitoring and management of PCs, servers, network devices, and applications. Embedding security into man-aged services contracts, says Barlow, makes it easier to address the client’s security needs.
  • 6. Step 5: Re-educate customers Especially among small and medium-sized business (SMB), network and data security requirements often are only partly addressed, and in the worst cases, almost completely ignored. Business owners, for the most part, understand threats such as viruses and spam, but they lack a comprehensive approach to protect their data, prevent intrusion, and implement policies on how to react to breaches. “Small businesses are too trusting,” says Jones. “They’re not as a concerned as they need to be. They don’t understand the risk unless you continuously hammer it away at them.” “Customers need to understand that security is not a technical solution you purchase,” says CompTIA’s Hamilton. “Security is a complex problem that requires a holistic approach to be effective.” In their role as educators, solution providers also need to point out the economics of security—that breaches can incur high remediation costs and in the worst cases put a company’s future at risk. “You’re essentially selling insurance,” says Barlow. Awareness is key, says Larocque. Business owners may lull themselves into thinking their data is safe if a breach hasn’t already happened to them, and as a result, not make the necessary investment. But they don’t realize, for instance, that malware is released every five seconds and an attack on their network could be only a matter of time. Solution providers must impress on clients that security threats are real, relentless, and constantly evolving, Larocque says. In fact, breaches take place practically daily, as attested by the Web site DatalossDB.org, which lists and documents all reported incidents and the number of records, from zero to the millions, exposed in each case. “Breaches are a regular occurrence,” says Hamilton. “Customers cannot afford to be blasé about the potential risks.” www.comptia.org/communities 6 www.comptia.comptioar.go/crogm/mcounmitiems unities Step 6: Promote regular assessments Security has to be part of the conversation whenever a solution provider is pitching its offerings to a prospective customer, says Hamilton. “It can’t be sidestepped anymore.” As such, it’s a good practice to conduct an assessment of the customer’s security environment, including desktops and mobile devices, before deploying any technology. Assessments typically include checking the subscription status of anti-virus and anti-spyware tools and testing existing firewalls for effectiveness. “It probably wouldn’t take your average VAR more than a day or two to do a basic security assessment for their clients,” says Humphreys. Depending on the size of the client’s IT environment, an assessment may include vulnerability scanning to identify holes in the network and potential risks related to applications and Web services. Penetration testing to see how easy it is to break into the network may also be advisable. Assessments should look beyond technology to also cover policies, say security experts. Solution providers may find that a client has no policies in place covering how to react to data breaches or that an organization has never instructed its users not to share their individual network-access information. Assessment findings should be compiled in a report to share with the client to demonstrate current vulnerabilities and formulate a strategy to eliminate the vulnerabilities and build a solid security environment. Harmony in security Humphreys counsels due diligence in deciding which security products solution providers should use for their clients. Solution providers may prefer a firewall from one vendor and anti-virus software from another, but they need to make sure the different pieces work together. Otherwise, the result is unwanted complexity or, even worse, an environment that adds to the vulnerabilities it is supposed to be addressing. The history of IT is littered with cases of applications that were supposed
  • 7. quick start guide P OW E R E D B Y : IT Security 7 to be compatible but failed to communicate, as well as environments with different sets of hardware and user interfaces that turn into real nightmares for administrators. Hamilton says solution providers must think about the overall security landscape and how their solution fits into the bigger picture. For solution providers delivering security as part of their managed services offerings, the easiest way go about this is to pick a managed services vendor that bundles security tools such as anti-virus, e-mail filtering, and firewalls, into its remote monitoring and management (RMM) tool. “That way you know they picked the friendly products and you know they work,” Humphreys says. Step 7: Stick with clear policies Security transcends technology in that breaches and leaks often result from human error. A company may have the best technology available to secure its networks, but if users are sharing passwords, accessing Web sites that may contain virus, or e-mailing unencrypted documents with sensitive information, the technology won’t help them. Aside from day-to-day safe computing practices, policies also must address how to react when a threat is detected, a virus gets through or an application malfunctions and creates a point of exposure. Watchman Computer Services’ Todd Jones says the discipline of security entails three main elements: protection, detection, and response. “Without response you do not have security,” he says. “Every door can be kicked in, every safe can be cracked, every fortress can be breached, and every treasure can be stolen if there is no response. It’s no different with computer and network security. You can bolt in all the latest and greatest products, but installed without response, you do not have security.” Protocols need to be in place so that users and administrators know what to do when they receive an alert, says Jones, who believes that is where security as a managed service really makes a difference. For solution providers monitoring their clients’ environments remotely, that means having a policy in place prescribing action when an alert comes through. Be it a remediation Names and Organizations to Know Solution providers looking for tips about how to deliver security solutions to their clients face no shortage of sources of information. Following are some suggestions on where to get information tailored specifically to solution provider needs. Find information about the CompTIA Security Trustmark here: www.comptia.org/securitytrustmark For updates on the CompTIA public advocacy efforts, including lobbying for security regulations, check out the public advocacy section of the association’s web site: www.comptia.org/publicpolicy.aspx The CompTIA IT security blog keeps updated on the association’s IT security community, whose work includes development of the Security Trustmark business credential and collaboration with the CompTIA Public Advocacy Office: blog.comptia.org/category/subtopics/it-security CompTIA IT Security Community www.comptia.org/communities Noel Eberline, director of the CompTIA IT security community, publishes a blog in which he addresses myriad security-related topics. Access the blog here: blog.networkwatchman.com The Open Security Foundation keeps tabs on security breaches across the world and publishes a database of all known incidents causing data losses. The database is updated just about daily and accessible here: datalossdb.org ITEEX, founded in 2002 as a peer-to-peer organization, is a security-focused channel development company. ITEEX chief executive officer, Earle Humphreys, worked with CompTIA on developing the Security Trustmark credential. Access the company website here: www.iteex-channel.com And the ITEEX blog here: www.iteex-channel.com/blog
  • 8. cleanup, file quarantine, or a patch application, specific rules should be in place for response and escalation. Step 8: Study up on regulations Knowing the regulations that affect IT security business is easier said than done, considering that federal standards are still evolving and there isn’t yet a national regulation that covers breach notifications. However, a number of states have enacted regulations addressing data breaches, with Massachusetts boasting the most stringent laws on the books. But, as the saying goes, ignorance of the law is no excuse. “It’s important for the solution provider to know what the regulations are all about, what they apply to,” says Reflexion’s Barlow. Even though solution providers need to become de facto experts on the law, achieving that status isn’t easy. Solution providers operating in multiple states have to contend with regulations that differ from state to state. Massachusetts mandates that organizations handling sensitive data, such as finance and medical records, implement data leak prevention. New Jersey has a regulation that many in the industry consider bizarre: When a leak occurs, the affected company is required to notify the state police before even its clients or partners. What’s needed is a national standard covering data leaks, say security experts. CompTIA has been lobbying congress to pass data-leak legislation now under consideration, and while there is a chance a bill could be approved this year, most likely passage will occur next year. Barlow suggests that solution providers uncertain about which regulations affect their clients should leverage their vendor partners. Security vendors have people in their staffs (with knowledge about regulations and compliance requirements) who can help solution providers make the right decisions for their clients, he says. Partner for expertise In delivering security solutions and services, solution providers in some cases should seek partners that have www.comptia.org/communities 8 www.comptia.comptioar.go/crogm/mcounmitiems unities the expertise they lack, says WakaDigital’s Braun. A partner that specializes in security, such as WakaDigital, can train, assess, and set policies for the client, he says. In cases where it makes sense, the security partner can stay in the picture in a consultative role, either as a silent partner in the background or in a more visible way in front of the partner, Braun says. Humphreys believes there are several advantages to working with a partner. Those include avoiding infrastructure costs and making up for lack of expertise in building solutions. A security partner bringing in a solution already has tested the technology so you don’t have to and already has experience with issues that you may never have encountered, Humphreys says. Of course partnering carries some risks, so it’s important to ensure a prospective partner “doesn’t have a history of working to come between you and your clients,” he says. Humphreys recommends doing your homework by checking with other companies that have worked with the prospective partner. In addition, says Humphreys, though a solution provider would partner with another to add expertise, the provider still needs to know enough about the technology. You want to make sure the solution the partner is bringing works, or that it isn’t a new, unproven release with bugs that haven’t been worked out.
  • 9. quick start guide P OW E R E D B Y : IT Security 9 Keep Talking Barlow advises solution providers meet with customers monthly or quarterly to review the work the provider does to protect clients’ IT environment. Especially for solution providers delivering security as a managed or hosted service, periodic meetings can be key. MSPs say clients tend to forget the work that goes on behind the scenes to keep their IT environments in shape and, at invoice time, question what they are getting for what they are paying. During the meetings, for instance, solution providers should go over how they prevented a network attack by responding to system alerts or how they stopped unsafe Web surfing by detecting it and alerting the client about it. Communication with the client should keep business value at the forefront. Barlow suggests using security arguments to implement business process improvements, such as replacing tax and financial forms with electronic files. Braun agrees with the need for communication. Remind the client, he says, of how security helps protects their business investments by talking to them about how much it costs to remediate breaches that could have been prevented with right technology and security policies in place. “At the end of the day,” he says, “you’re not providing IT, you’re providing business-process management.” About CompTIA CompTIA is the voice of the world’s information technology (IT) industry. As a non-profit trade association advancing the global interests of IT professionals and companies, we focus our programs on four main areas: education, certification, advocacy and philanthropy. We: • Educate the IT channel: Our educational resources, comprising instructor-led courses, online guides, webinars, market research, business mentoring, open forums and networking events, help our members advance their level of professionalism and grow their businesses. • Certify the IT workforce: We are the leading provider of technology-neutral and vendor-neutral IT certifications, with more than 1.4 million certification holders worldwide. • Advocate on behalf of the IT industry: In Washington, D.C., we bring the power of small- and medium-sized IT businesses to bear as a united voice and help our members navigate regulations that may affect their businesses. • Give back through philanthropy: Our foundation enables disadvantaged populations to gain the skills they need for employment in the IT industry. Our vision of the IT landscape is informed by more than 25 years of global perspective and more than 2,800 members and 1,000 business partners that span the entire IT channel. We are driven by our members and led by an elected board of industry professionals. All proceeds are directly reinvested in programs that benefit our valued members and the industry as a whole. Headquartered outside of Chicago, we have offices across the United States and in Australia, Canada, China, Germany, India, Japan, South Africa and the United Kingdom. For more information, visit comptia.org.
  • 10.
  • 11.
  • 12. www.comptia.org/communities www.comptia.org © 2011 CompTIA Properties, LLC, used under license by CompTIA Member Services, LLC. All rights reserved. All membership activities and offerings to members of CompTIA, Inc. are operated exclusively by CompTIA Member Services, LLC. CompTIA, A+, Authorized Service Center, Breakaway, Network+, Security+, and Security Trustmark are registered trademarks of CompTIA Properties, LLC in the U.S. and internationally. Other brands and company names mentioned herein may be trademarks or service marks of CompTIA Properties, LLC or of their respective owners. Reproduction or dissemination prohibited without written consent of CompTIA Properties, LLC. Printed in the U.S. Feb 2011 1721-US www.comptia.org/communities