SECURITY ON EDGE...Real World Application: Travel Site Secures Access to the Future. 11. Real World...
Transcript of SECURITY ON EDGE...Real World Application: Travel Site Secures Access to the Future. 11. Real World...
frost.comThe contents of these pages are copyright © Frost & Sullivan. All rights reserved.
SECURITY ON EDGESurviving and Thriving Against the Wave of Cyber ThreatsFROS T & SULLIVAN EBOOK
2Security On Edge
CONTENTS
3 Cybervigilance is Always On
4 Every Facet of Life is Online
5 Massive Breaches are Alarmingly Frequent
6 Vulnerabilities are Everywhere
7 Ensure You Have the Right Solution Provider
8 Edge Delivery Services Protects From the Edge
9 Real World Examples: Are You Really Mitigating Risk?
10 Real World Application: Travel Site Secures Access to the Future
11 Real World Application: Be Proactive, Mitigate Downtime, Save Money, Secure your Future
12 VendorProfile:IBM’sAdvancedSolutions
13 Your Customers, Employees, and Value Chain Partners Rely on Your Online Systems
3Security On Edge
Online food deliveryis getting popular
Increased vehiclepurchasing online
2017, about 300k vehicles had been purchased online. That will surpass 1 million in 2020 and over 6 million by 2025.
Websites arecritical to business
More in-storemobile views
Industrygrowth
Onlinevehicle
purchasesOnline
sales
$200 B
$82 B
$25 B
$525 B
$300 K$1 M
$6 M
2018 2025 2000 20182017 2020 2025
15%
In-store,mobilewere up
in 2019
views
CY BERVIGILANCE IS ALWAYS ONAs the world is becoming increasingly digital, growing cyber threats and other vulnerabilities are magnifiedFrost & Sullivan research estimates the total number of IoT devices will grow to over 45 billion devices by 2023, from about 12 billionin2016.TrendssuchasConnectedRetailmeansdigitalsolutionsarenecessaryformanagingeverythingfromsupplychainstooperationalefficiencytocustomerexperience.Consumersconsumeon-lineandviatheircellphones.Mobiletrafficisoverhalfofglobalwebtraffic. People need and expect a seamless experience. This means more data stress on data centers, leveragingofmulti-cloudenvironments,andagreaterneedforedgesecurity.
Source: Frost & Sullivan, unless otherwise noted; online sales: https://www.census.gov/retail/index.html; mobile views: https://www.broadbandsearch.net/blog/mobile-desktop-internet-usage-statistics.
4Security On Edge
All this online activity means vast volumes of personal and business data are being accessed through online interfaces, such as customer-facing websites, internal sites, and dashboards
EVERY FACET OF LIFE IS ONLINE
Source: Frost & Sullivan, unless otherwise noted.
LIFE
Social Media
Calendar/Email
Traffic anddirections
Online paymentsand accountmanagement
Weather
Product/service search
News andinformation
Text andmessaging
Check stock
WORK
MARKETAGGREGATOR
GOOGLENEWSPAPER
NATIONALWEATHERSERVICE
VENDOR
MOBILEPROVIDER
FINANCIALINSTITUTION
AMAZON Banking
5Security On Edge
Process more than
More than
billioncyber events
every day
US Bank’s Cyber Defense Center
undetected, from March through
December, 2019
stores compromised
million records exposed
Facebook’s 3rd party app on AWS servers
million people
Georgia Tech personnel and
family data
million exposed
EquiFax’s 2017 breach
companies state they’ve been victims
of cyber attacks
Companies in Canada
WAWA’s customercredit information
850
5401.3 147 4
1 5in
the average time forbreaches to be detected
279 days
It’sincrediblycostlyanddamagingtocompanieswhenthesesitesgodownorthedataflowinginandoutofthemgetscorruptedor exposed. Frost & Sullivan estimates the market to defend against distributed denial of service (DDoS) attacks doubled from $499 million in 2014 to over $1 Billion in 2018 and is anticipated to grow to $1.8 in 2021. A typical breach can affect over 25 thousand records and cost $150 per record.
MASSIVE BREACHES ARE ALARMINGLY FREQUENT
Source: Frost & Sullivan, unless otherwise noted; breach detection: 2019 Cost of a Data Breach Report by IBM Security and Ponemon Institute; cyber events: https://www.usbank.com/newsroom/stories/how-us-bank-protects-customers-from-cyber-threats.html; victims of
cyber attacks: https://www.theglobeandmail.com/business/article-businesses-spent-14-billion-on-cybersecurity-in-2017-statistics/
6Security On Edge
GONE PHISHING…Phishing is a criminal, fraudulent mechanism which uses the Internet to acquire susceptible personal information, such as usernames, passwords, or credit card details by masquerading as a reliable business website or electronic communication.
VULNER ABILITIES ARE EVERY WHERE
Intentional website and data breaches steal information and can disrupt personal, business, or government activities. Phishing attacks lure victims in through email, social media, and mobile devices, on their own or as part of more complex attack. Unintentional downtime can occur as well.
• Black Friday and Cyber Monday are also hot times for threat actors when billions are spent by hundreds of millions of people online.
Intentional
Source: Frost & Sullivan, unless otherwise noted.
49%of breaches occur due tohuman error orinfrastructuremalfunctions
Source: 2019 Cost of a Data Breach Report by IBM Security and Ponemon Institute
of cybersecurity incidents involved phishing activities
32%Source: Verizon’s2019databreachreport.
7Security On Edge
ENSURE YOU HAVE THE RIGHT SOLUTION PROVIDERCompaniesneedsuperiorsolutionstokeepcustomerinformationsafe.Frost&Sullivanhasidentifiedfivecriticalelementstogettingtherightsupplierandensuringbothahighdegreeofsecurityandtherightfitforyourorganization:
Source: Frost & Sullivan, unless otherwise noted.
PROTECTION SHOULD NOT BE CONTINGENT ON YOUR SITUATION, NOW OR IN THE FUTURE
Make sure your supplier can secure both hardware and software
GO BEYOND THE BASICS
Detection is great, prevention is better. 24/7monitoringandprotection is critical, but only the start. Find a provider who is leading in advanced analytics and AI to help identify patterns and vulnerabilities before they turn into events.
FIND INNOVATIVE SOLUTIONS THAT PROVIDE MORE SECURIT Y LAYERS
Cloud can be safer than locally stored information, hence explore a provider with its own secure cloud system.
SUPPLIERS NEED EXPERTISE IN YOUR INDUSTRY
Each industry is unique, and thus Security providers should be well versedintheclient’sparticular industry vertical.
ENSURE YOU GET MARKET-VERIFIED SOLUTIONS
It’scriticaltoworkwith suppliers that can demonstrate having a strong track record securing major companies.
8Security On Edge
LIFE
THREATS
THREATS
THREATS
Edge-basedprotection
WORK
MARKETAGGREGATOR
GOOGLENEWSPAPER
NATIONALWEATHERSERVICE
VENDOR
MOBILEPROVIDER
FINANCIALINSTITUTION
AMAZON
EDGE DELIVERY SERVICES PROTECTS FROM THE EDGEUsers are closer to the data they interact with, while not overwhelming the data center.
Source: Frost & Sullivan, unless otherwise noted.
9Security On Edge
REAL WORLD EX AMPLES: ARE YOU REALLY MITIGATING RISK ? Emails, usernames, passwords, and exploits are widely accessible
Email lists with user names and passwords are alarmingly easy to procure illegally on the darknet.
Criminals and other threat actors conduct credentialstuffing,usingbotsthatautomatically and effectively input these details across thousands of Internet sites, gaining unprecedented access to personal, financial,andinstitutionalinformation.
The US is the top target in the world, with, according to the FBI, over $12.5 billion in damagefromcredentialphishing scams.
Source: Frost & Sullivan, unless otherwise noted.
This was not a rare occurrenceEdge Delivery Services blocks over 1.2 million malicious access attempts across their customers every month.
Mitigate most of the risk by targeting the links embedded in phishing emails, malware, and dangerous sites.
One company was experiencing between
2,300-4,000phishing attacks per month.
FIRST ATTEMPTUsing a Leading Email Security SolutionOnly achieved 94% mitigation. The majority of the remaining 6% had dangerous embedded links. Focusing on email doesn’t stop malware or malicious website vulnerabilities.
SECOND ATTEMPTEdge Delivery Services
10Security On Edge
REAL WORLD APPLICATION: TR AVEL SITE SECURES ACCESS TO THE FUTUREAsmissioncriticalapplicationsandworkflowsmovetothecloudit’simperativetocontinuetoenableworkerstofocusonwhatthey need to do while companies improve security tactics and simplifying user management—making Edge Delivery Services a clear improvement to legacy VPN approach for secure, zero trust access.
Source: Frost & Sullivan, unless otherwise noted.
Lower equipment costs through secure Internet access to just the data and apps employees need
Ensure data is secure at both the gateway and application levels. Give workers everything they need, and nothing they don’t
Move to a secure cloud that manages users through Active Directory groups
Each remote worker needed a $2,500 laptop outfitted with
security software
Unnecessary onus on workers to keep equipment and access secure
Had more physical services and overheads, every resource needed to
be set up on a unique DNS
Before Edge Delivery Services With Edge Delivery ServicesControlling DataControlling Users
11Security On Edge
REAL WORLD APPLICATION: BE PROACTIVE , MITIGATE DOWNTIME , SAVE MONE Y, SECURE YOUR FUTUREWhensuccessfulcloud-basedstartupdiscoveredaDDoSattackdisruptedservices,itimmediatelybroughtinapartertosecurefurtherevents.Protectionisnotcontingentonyoursituation.Getmarket-verifiedsolutionsandgobeyondthebasics.
Source: Frost & Sullivan, unless otherwise noted; cost of lost business: 2019 Cost of a Data Breach Report by IBM Security and Ponemon Institute.
SITUATION
A DDoS attack crippled cloud-based operations and highlighted vulnerabilities. Any downtime interrupted client’s businesses.
SOLUTION
Engage a vendor with edge-based, global 24/7 monitoring that was more effective—and cost less—than the previous in-house solution
OUTCOME
0 incidents.0!
0 incidents.0!
Average cost of lost businessdue to system downtime
$1.4 More than
Million
The cost increasesfor heavily cloud-
or web-basedbusinesses
12Security On Edge
VENDOR PROFILE : IBM’S ADVANCED SOLUTIONS
Source: Frost & Sullivan, unless otherwise noted.
IBM has developed a solution at the edge: Threats are thwarted before even gettingtocustomersitesanddata.Thispreventsbottrafficandtheimpacton vulnerable web applications.
Protection at the edge means it can be implemented where it’s needed and will grow and evolve with businesses throughout their digital transformation
It’s applicable across industries as it protects at the point where people interact with the data
Shouldering security at the edge enables the customer site’s energy to be spent on business processes: allowing faster web traffic speed and higher app availability
100% platform availabilityDowntime reduced, productivity increases, bottlenecks decreased, and peak times become inconsequential
Edge Delivery Services are cloud-agnostic and protects multicloud environments
OUTCOME
13Security On Edge
YOUR CUSTOMERS, EMPLOY EES, AND VALUE CHAIN PARTNERS RELY ON YOUR ONLINE SYSTEMS
These Next Steps on your Security Journey are Key!
EVALUATE YOUR CURRENT SITUATION. Is your current supplier offering extra layers of security, understanding your industry, and doing enough?
PLAN FOR YOUR “FUTURE STATE.” Will your supplier enable your growth and evolve with you?
UNDERSTAND THE MARKET. Both your own industry and yourcustomers’.Whodoyourcompetitorsrelyon?Canstablecybersecurity give you the leg up?
THE COST OF NOT TAKING ACTION. Loss of customer trust and relationships. Financial losses. Giving competitors undue advantages.
Learn more about IBM Edge Delivery Services* https://www.edgedeliveryservices.com/
* IBM Edge Delivery Services is powered by Akamai Technologies, a market leader in Enterprise Security and Web Performance
14
Frost & Sullivan, the Growth Partnership Company, works in collaboration with clients to leverage visionary innovation that addresses the global challenges and related growth opportunities that will make or break today’smarketparticipants.Formore than50years,wehavebeendevelopinggrowthstrategies for theGlobal 1000, emerging businesses, the public sector and the investment community. Is your organization prepared for the next profound wave of industry convergence, disruptive technologies, increasing competitive intensity, Mega Trends, breakthrough best practices, changing customer dynamics and emerging economies?
For information regarding permission, write:Frost & Sullivan 3211 Scott BlvdSanta Clara, CA 95054
SILICON VALLEY3211 Scott Blvd Santa Clara, CA 95054 Tel+1650.475.4500
SAN ANTONIO7550WestInterstate10 Suite 400 SanAntonio,TX78229 Tel +1 210.348.1000
LONDON566ChiswickHighRoad London W4 5YF Tel+44(0)2089968500