security consolidation and optimisation: gaining the most from your it assets

3
SECURITY OPTIMISATION May 2009 Computer Fraud & Security 15 Security consolidation and optimisation: Gaining the most from your IT assets Downturn compounds costs of tactical security measures With the economic climate continuing to drive cuts in IT budgets, organisa- tions are being forced to do more with less to preserve the integrity of their network. Compliance requirements, mobility and remote access and the malware threat all require robust secu- rity implementations. And these prob- lems don’t disappear just because there’s a recession happening. Conversely, as market conditions become more severe, security requirements tend to intensify. Staff layoffs increase the “insider threat” from disgruntled employees, the global financial meltdown will undoubtedly increase regulatory scrutiny generally, and with more people and organisations struggling financially, the levels of com- puter crime will rise. Now more than ever organisations should address their current security architecture to assess the potential in each security applica- tion, and in turn discover new ways to reduce CAPEX and OPEX in line with budget revisions. Typically, organisations have taken an organic approach to their security infrastructure. In response to emerging threats, point products are deployed against point threats. Whilst this ensures immediate threats are managed, it leads in many cases to infrastructures that are multi-vendor, fragmented and inef- ficient. It is this fragmented approach to security management that leads to high licensing, support and operational management costs, which are often eas- ily avoidable through IT assessments. In addition, the configurations of many security devices have also evolved organi- cally rather than strategically. Security policies evolve and grow incrementally and often leave in their wake a mish- mash of configuration clutter that slows devices down and increases the adminis- trative overhead in terms of operational and change management. For example, according to a recent survey by the ISSA Journal, the aver- age number of rules in a typical fire- wall has increased dramatically over the last seven years, possibly by as much as 500%. In Dimension Data’s own assessments, we have found that in many cases, up to 50% of the rules in a typical firewall are not used. The result is a sub-optimal firewall estate with higher than necessary utilisation rates. Five years ago many organisa- tions didn’t even have anti-virus soft- ware installed on the desktop. Today, the desktop is cluttered with a plethora of security software including personal firewall, VPN, anti-spyware, anti-virus and host-based intrusion detection/ prevention - and the list goes on. Unsurprisingly, this results in high license and support costs, problems with cross-vendor incompatibilities and high software maintenance costs. Why now? There is clearly an opportunity and a need to rationalise, consolidate and optimise the security infrastructure. The opportunity has been present for some time, but with budgets continu- ing to be squeezed, there is now, more than ever, a compelling need to get the most out of the investment in IT security. So what steps can be taken to ensure that the security investment is fully exploited and future investment is optimised, whilst maintaining and improving existing security levels? Security consolidation and optimisation methods Unify the desktop End-point security solutions have increased dramatically over the past few years as vendors have introduced new products in response to new threats and changing security requirements. Personal firewalls, VPN clients, host- based intrusion prevention, anti-virus Alastair Broom, line of business manager – security, Dimension Data With the proliferation of security applications designed to combat specific IT breaches, many organisations are finding management of their security systems unnecessarily complicated, time consuming and costly. Desktops are littered with a wide range of applications for everything from anti-virus to encryption. And in today’s economic climate, it is more important than ever for businesses to ensure they are gaining the most value out of their current IT assets rather than reac- tively deploying new services, which are often proven superfluous following an IT assessment. This article explores methods to reduce costs and streamline security deployments through consolidation and optimisation solutions.

Upload: alastair-broom

Post on 19-Sep-2016

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Security consolidation and optimisation: Gaining the most from your IT assets

SECURITY OPTIMISATION

May 2009 Computer Fraud & Security15

Security consolidation and optimisation: Gaining the most from your IT assets

Downturn compounds costs of tactical security measuresWith the economic climate continuing to drive cuts in IT budgets, organisa-tions are being forced to do more with less to preserve the integrity of their network. Compliance requirements, mobility and remote access and the malware threat all require robust secu-rity implementations. And these prob-lems don’t disappear just because there’s a recession happening. Conversely, as market conditions become more severe, security requirements tend to intensify. Staff layoffs increase the “insider threat” from disgruntled employees, the global financial meltdown will undoubtedly increase regulatory scrutiny generally, and with more people and organisations struggling financially, the levels of com-puter crime will rise. Now more than ever organisations should address their current security architecture to assess the potential in each security applica-tion, and in turn discover new ways to reduce CAPEX and OPEX in line with budget revisions.

Typically, organisations have taken an organic approach to their security

infrastructure. In response to emerging threats, point products are deployed against point threats. Whilst this ensures immediate threats are managed, it leads in many cases to infrastructures that are multi-vendor, fragmented and inef-ficient. It is this fragmented approach to security management that leads to high licensing, support and operational management costs, which are often eas-ily avoidable through IT assessments. In addition, the configurations of many security devices have also evolved organi-cally rather than strategically. Security policies evolve and grow incrementally and often leave in their wake a mish-mash of configuration clutter that slows devices down and increases the adminis-trative overhead in terms of operational and change management.

For example, according to a recent survey by the ISSA Journal, the aver-age number of rules in a typical fire-wall has increased dramatically over the last seven years, possibly by as much as 500%. In Dimension Data’s own assessments, we have found that in many cases, up to 50% of the rules in a typical firewall are not used. The result is a sub-optimal firewall estate with higher than necessary utilisation

rates. Five years ago many organisa-tions didn’t even have anti-virus soft-ware installed on the desktop. Today, the desktop is cluttered with a plethora of security software including personal firewall, VPN, anti-spyware, anti-virus and host-based intrusion detection/prevention - and the list goes on. Unsurprisingly, this results in high license and support costs, problems with cross-vendor incompatibilities and high software maintenance costs.

Why now?

There is clearly an opportunity and a need to rationalise, consolidate and optimise the security infrastructure. The opportunity has been present for some time, but with budgets continu-ing to be squeezed, there is now, more than ever, a compelling need to get the most out of the investment in IT security. So what steps can be taken to ensure that the security investment is fully exploited and future investment is optimised, whilst maintaining and improving existing security levels?

Security consolidation and optimisation methodsUnify the desktop

End-point security solutions have increased dramatically over the past few years as vendors have introduced new products in response to new threats and changing security requirements. Personal firewalls, VPN clients, host-based intrusion prevention, anti-virus

Alastair Broom, line of business manager – security, Dimension Data

With the proliferation of security applications designed to combat specific IT breaches, many organisations are finding management of their security systems unnecessarily complicated, time consuming and costly. Desktops are littered with a wide range of applications for everything from anti-virus to encryption. And in today’s economic climate, it is more important than ever for businesses to ensure they are gaining the most value out of their current IT assets rather than reac-tively deploying new services, which are often proven superfluous following an IT assessment. This article explores methods to reduce costs and streamline security deployments through consolidation and optimisation solutions.

Page 2: Security consolidation and optimisation: Gaining the most from your IT assets

SECURITY OPTIMISATION

Computer Fraud & Security May 200916

and anti-spyware (to name a few) all proliferate on our desktops, result-ing in the current situation that many organisations experience today of a multi-vendor, multi-agent platform. This environment leads to a number of issues all of which scale proportionally in relation to the number of users:

-nent of the desktop TCO (total cost of ownership) and increase linearly in proportion to the number of agents.

increase the complexity and risk of incompatibility at the desktop and therefore increase the number of Help Desk calls. Help Desk calls typically cost organisations $10–$30 per call and the average user will make 1.5 calls per month to the Help Desk. For a 500-user company, this equates to a startling $180 000 per year.

on the user, requiring user input and machine rebooting and/or resulting in reduced performance while the soft-ware is updating. This has an impact on productivity and can also increase the level of Help Desk calls.

Results like these often shock IT and security professionals. Without undergo-ing this level of assessment organisations remain ignorant of the unnecessary costs incurred as a result of a multi-vendor, multi-agent platform. Moving to a single, unified client for the end-point can dramatically decrease IT costs and improve productivity in all three areas. Many vendors now offer a single secu-rity client providing protection against malware infection, personal firewalling and intrusion prevention. This simplifies licensing and software updates, removes the potential for software incompatibility and consequently reduces the number of help desk calls.

UTM and XTM platforms

As with the desktop, security compo-nents within the network can be con-

solidated onto fewer appliances reducing licensing and support costs and improv-ing operational management. Unified Threat Management (UTM) devices are now mature and have been developed not only for the SME market but also for medium to large enterprises and service providers. Putting “all your eggs in one basket” does not work for every organisation, but UTM devices can now be configured to be highly resilient with built-in redundancy and failover such that they are suitable for mission critical, high-availability environments.

Migrating to a UTM environment requires upfront investment. However the return on investment (ROI) can be rapid through reductions in licens-ing and support costs with streamlined change and configuration management leading to reduced operational manage-ment costs.

“Server consolidation often goes hand in hand with the overall process of data man-agement and unsurprisingly consolidating servers allows easier and more secure man-agement of data transfer”

The UTM concept can also be extended to consolidate networking and security components. For example, it is now possible to deliver firewalls and intrusion detection/prevention integrated into LAN switches and routers, to deliver secure DNS and DHCP services within a router, and network access control and authenti-cation into the core LAN and WAN infrastructure. A new breed of UTM products is emerging - Extensible Threat Management (XTM) prod-ucts - that provide a broader range of security capabilities and integrated net-working functionality. Consolidation of networking and security provides additional cost saving opportunities and the support of major vendors means security doesn’t have to be com-promised.

Virtualisation

Migrating your security infrastructure to a virtualised environment is another way to significantly reduce the network security TCO. Although requiring upfront capital investment, virtualisa-tion of firewalls, intrusion detection/prevention systems and anti-virus gate-ways can significantly reduce licensing and hardware and software support costs. Environmental costs such as power, cooling and rack space are also reduced and these savings can be con-siderable for large organisations with extensive security estates. Assessments carried out by Dimension Data for large multi-national organisations have demonstrated savings in electricity costs alone of between $150 000–$1 million over a three year period, depending on the existing architecture. Distributed organisations with many sites such as major franchises and large branch networks can benefit from significant cost savings by collapsing per-site security appliances down to a centralised, virtual platform.

Server consolidation

Server consolidation often goes hand in hand with the overall process of data management and unsurprisingly consolidating servers allows easier and more secure management of data trans-fer. Dimension Data helped the ship-ping giant, Inchcape, to consolidate its server estate and replaced 200 widely used Microsoft servers with four mega servers in key locations around the world. Also, we worked with a large petrochemical organisation to remove 150 servers and replace them with seven mega data centres; simplify-ing their security strategy. With the removal of complex branch infrastruc-tures and simplifying the network and consolidating servers, organisations can benefit from cost savings on data cen-tre space and through better manage-ment of resources.

Page 3: Security consolidation and optimisation: Gaining the most from your IT assets

SECURITY OPTIMISATION

May 2009 Computer Fraud & Security17

Firewall assessmentFirewalls are the cornerstone of any robust security implementation and consequently constitute a significant cost in terms of maintenance and man-agement. Firewall estates grow quickly as new communication channels are opened up to the internet and third parties and firewall upgrades are often necessary to cope with increases in web traffic. However, many of these upgrades are unnecessary, driven by poor firewall performance as a result of complex, sub-optimal rule bases. Research by Dimension Data has shown that up to 50% of a typical fire-wall’s rule base is redundant. Unused rules often are not purged from the rule base, slowing the firewall down. Duplicate and overlapping rules also clog the rule base leading to a percep-tion that the firewall needs upgrading when, in actual fact, it just needs a bit of housekeeping. Undertaking an extensive firewall assessment provides opportunities to reduce the size and complexity of the rule bases leading to better performance, simplified man-agement and administration and an opportunity to reduce the overall size of the firewall estate.

Security as a Service (SaaS)

With the pressure on CAPEX increas-ing, many organisations are turning to managed security services as an alterna-tive. SaaS solutions provide cloud-based services in place of customer-owned CPE solutions. Email and web security, secu-rity event and log monitoring, vulner-ability management and denial of service protection all lend themselves well to SaaS solutions. Removing viruses, mal-ware and spam from email and web traf-fic in the cloud rather than on-premise

has the added advantage of freeing up significant internet bandwidth and may delay, or remove completely, the need for upgrades to internet connections. Analysts estimate that approximately 95% of all email today is unsolicited. Downloading this spam over costly internet connections and processing it on-site consumes precious bandwidth and gateway processing cycles. Handing this off to the cloud effectively removes 95% of email traffic before it reaches your site – immediately improving per-formance and reducing the requirement for high performance email filtering on-premise.

“As an alternative to SaaS, leasing can provide the same CAPEX reduction benefits while providing CPE-based, customer-managed security implementations”

Filtering in the cloud can also improve security by preventing malware from reaching the corporate network edge. Vulnerability management and the management of firewalls and intrusion detection/prevention devices is also often improved via SaaS solutions as a result of the 24x7 capabilities and highly skilled technical resources deployed by SaaS providers.

Leasing

As an alternative to SaaS, leasing can provide the same CAPEX reduction benefits while providing CPE-based, customer-managed security implemen-tations. Many security vendors now offer their own leasing options in addi-tion to the mainstream finance provid-ers, enabling companies to benefit from

the best technology for a fixed monthly, quarterly or annual fee. Several leas-ing schemes include technology refresh options, future-proofing the investment and providing long term budgeting vis-ibility and control.

Bandwidth optimisation

WAN optimisation technology and security functionality are converging and this new breed of secure bandwidth optimisation products enable band-width demands to be reduced while maintaining the security of the WAN. Implementing this technology can delay or obviate the need for bandwidth upgrades. It can also prioritise the per-formance of mission-critical applica-tions over less important ones such as web browsers, thereby offering further productivity gains.

Conclusion

Now is the time for action. Organisations are faced with main-taining higher levels of security in turbulent times whilst simultaneously conserving costs. Organisations need to re-assess their current security archi-tecture and adopt a strategic, rather than organic, approach to how their security infrastructure should evolve. With heightened visibility of security infrastructure, organisations can capi-talise on current assets and realise near immediate benefits through a range of security consolidation and opti-misation techniques. Whether it is a simple firewall assessment to remove redundant rules and improve perform-ance or investing in UTM devices to reduce licensing and support costs, real business benefits and savings are easily accessible to all organisations.