softchoice security consolidation survey results

18
Security Consolidation Survey 2014 Web | Mail | Endpoint | Server | Data Encryption | DLP

Upload: softchoice-corporation

Post on 18-May-2015

1.208 views

Category:

Technology


0 download

DESCRIPTION

To help our clients learn more about their security environment we put together a tool that examined how many security tools our clients really used, and offered some recommendations from our experts based on the results.

TRANSCRIPT

Page 1: Softchoice Security Consolidation Survey Results

Security Consolidation Survey 2014Web | Mail | Endpoint | Server | Data Encryption | DLP

Page 2: Softchoice Security Consolidation Survey Results

If you are facing an increasing volume of logs

from multiple sources, you are managing a flood

of information. Not only that, you still need to

analyze that data in order to find evidence of

security incidents, and make sure you stay

compliant with industry regulations.

To help our clients learn more about their

security environment we put together a tool that

examined how many security tools our clients

really used, and offered some recommendations

from our experts based on the results.

WHY WE DID IT

Page 3: Softchoice Security Consolidation Survey Results

» Endpoint buyers» ProSuite buyers» Security buyers in retail verticals» Security buyers in legal verticals» IT managers» Security decision makers

» PC and client software buyers» Security buyers in education» Security buyers in finance» Security buyers in healthcare» Networking buyers

TARGET AUDIENCE

Page 4: Softchoice Security Consolidation Survey Results

Gross responses were reviewed and scrubbed if:

A. Answers for questions 1 through 9 were the same

B. All questions had the same answer

C. The same result was received for each completed survey in rapid succession

D. A response for a required question was missing

DATA HANDLING

Page 5: Softchoice Security Consolidation Survey Results

The Results

Page 6: Softchoice Security Consolidation Survey Results

What are you using for endpoint virus?

We often encounter clients using Microsoft Forefront to maximize their Enterprise Agreement. However, its possible to realize a more robust endpoint security and overall security posture by utilizing a comprehensive solution from Trend Micro, Symantec, McAfee or Sophos.

21%

40%

21%

5%

13%

1%

Endpoint Virus

Trend Micro Symantec McAfee SophosOther Nothing

Avast

AVGES

ET

Kaspers

ky

Microso

ft Foref

ront

Syste

m Center

Thirt

yseve

n4

Untabngle

VIPRE0

2

4

6

8

If other, please specify

Page 7: Softchoice Security Consolidation Survey Results

What are you using for mail gateway?

As Microsoft discontinued the TMG (Threat Management Gateway) we are seeing significant changes in this area. We anticipate continued changes in the future, as more organizations adopt Office 365.

Our clients that have been using TMG are often looking to existing security providers as well as networking technologies to protect their messaging technologies. Building upon the investment with the current endpoint security solution provider is a strategic opportunity to minimize costs and overhead.

ASSP NoS

pam

Forti

net

Ironp

ort

Kaspe

rsky

Mai

lWat

ch

Micr

osof

t

Other

Racks

pace

XWal

l0

2

4

6

8

10

If other, please specify

19%

27%

17%

3%26%

8%

Mail gateway

Trend Micro Symantec McAfee Sophos

Other Nothing

Page 8: Softchoice Security Consolidation Survey Results

What are you using for WEB gateway?

Our clients that have been using TMG are often looking to existing security providers as well as networking technologies to protect their messaging technologies. Building upon the investment with the current endpoint security solution provider is a strategic opportunity to minimize costs and overhead. 21%

21%

13%5%

27%

12%

Web Gateway

Trend Micro Symantec McAfeeSophos Other Nothing

0

2

4

6

8

If other, please specify

Page 9: Softchoice Security Consolidation Survey Results

What technology are you using for intrusion prevention?

Intrusion Prevention services are being integrated into UTM (Universal Threat Management) devices as well as NGFW (Next Generation Firewall) technologies.

16%

29%

13%

5%

21%

16%

Intrusion prevention

Trend Micro Symantec McAfee SophosOther Nothing

0

2

4

6

If other, please specify

Page 10: Softchoice Security Consolidation Survey Results

What technology are you using for firewall?

We are seeing a significant movement from legacy “layer 3’ firewalls to NGFW (Next Generation Firewalls).

17%

21%13%

7%

37% 5%

FIREWALL

Trend Micro Symantec McAfee SophosOther Nothing

AVG

CheckPoint

Cisco

Custom

Forti

Gate

Forti

net

Juniper

Kaspers

ky

Microso

ft

Palo Alto

Physical

Device

Sentinel

Sonicw

allSq

uidTM

G

Untangle

Watc

hGuard0

0.5

1

1.5

2

2.5

3

3.5

4

4.5

If other, please specify

Page 11: Softchoice Security Consolidation Survey Results

What are you using to encrypt data?

We are seeing concerns around some encryption technologies. Organizations implementing an encryption solution should be aware of potential limitations when using Truecrypt and Bitlocker.

15%

28%

7%5%

19%

26%

Encrypt Data

Trend Micro Symantec McAfee SophosOther Nothing

BitLocke

r

CheckPoint

Cisco

Forti

gate

Guardian

/PGP

Juniper

Microso

ft

Mimeca

st

Others

Proofpoint

SSL

TrueC

rypt

Utimaco0

1

2

3

4

5

6

If other, please specify

Page 12: Softchoice Security Consolidation Survey Results

What are you using for data loss prevention?

Data Loss Prevention (DLP) is a significant concern for our clients working to adhere to compliance mandates like Payment Card Industry (PCI) and Health Insurance Portability and Accountability Act (HIPAA) etc.21%

30%

6%3%

13%

28%

Data Loss Prevention

Trend Micro Symantec McAfeeSophos Other Nothing

Acronis

Arcserv

e Back

up

Carbonite

Cisco

Cloud backup

CommVault

DdpeEv

ault

Forti

gate

Other

NovaBack

up

Source

One

Veeam

0

0.5

1

1.5

2

2.5

If other, please specify

Page 13: Softchoice Security Consolidation Survey Results

What are you doing to protect your servers?

Standard endpoint protection is not an complete security solution for servers. Servers should utilize technology designed specifically for server protection.

19%

44%

10%

7%

12%

8%

Server Protection

Trend Micro Symantec McAfeeSophos Other Nothing

Cloud backup

CommVault

ESET

Nod32

Evau

lt, VMW

are re

plication

Foref

ron En

dPoint Pro

tection

IPTables

, Hard

ware Fi

rewall

Kaspers

ky

Microso

ft Foref

ront

Other

Patching

Sonicw

all

Syste

m Center

Endpoint P

rotec

tion

Untangle

VIPRE0

0.5

1

1.5

2

2.5

If other, please specify

Page 14: Softchoice Security Consolidation Survey Results

How are you managing mobile data?

Mobile consumerization is driving our clients to protect both mobile devices as well as the data residing on those devices. You must consider the planning and policies in place, as there will be policy differences between Bring Your Own Device (BYOD), and corporate-issue device environments.

21%

20%

4%5%

16%

34%

Mobile Data

Trend Micro Symantec McAfee Sophos

Other Nothing abso

lute Man

age M

DM

Airwatc

h Bes

BlackB

erry

Casper

Cisco

Forti

net Fir

ewall

InTune/A

zure

Maas3

60

Meraki

MobileIro

n

Office365

Other

XenMobile

0

0.5

1

1.5

2

2.5

3

3.5

4

4.5

If other, please specify

Page 15: Softchoice Security Consolidation Survey Results

How do you manage the logs from all these tools?

Real time log management is a core component for corporate security as well as compliance requirements, specifically around incident management and incident response processes.

Logs Management

SIEM Solution Managed SolutionOpen Source Nothing

Page 16: Softchoice Security Consolidation Survey Results

Are you happy with your main security vendor?

If it’s not broken, don’t fix it. Right? We encourage our clients to test their security architectures to ensure they are well-designed and effective. More simply, keep in mind our goal is to prevent security incidents before they happen!

Are you happy?

Yes No

Page 17: Softchoice Security Consolidation Survey Results

SUMMARY

1. Understand business and compliance drivers, and integrate these requirements in to the technical specs when considering a security solution.

2. Deploying technology without understanding the risks and sensitive data repositories is not an effective solution.

3. A robust security architecture requires continued testing and improvement to assess risks to critical systems, identify threats, remediate risks, and protect business assets.

4. We see value in consolidating security technologies to fewer vendors. Both from a cost savings perspective, and a daily operations management perspective.

Based on the results of this tool, here are the 4 most important things our clients should remember:

Page 18: Softchoice Security Consolidation Survey Results

THANK YOU

With over 40 locations across the U.S. and Canada,

Softchoice is one of North America’s largest providers of IT

solutions and services. Our holistic approach to

technology includes solution design, implementation,

and managed services.