security on edge...real world application: travel site secures access to the future. 11. real world...

14
frost.com The contents of these pages are copyright © Frost & Sullivan. All rights reserved. SECURITY ON EDGE Surviving and Thriving Against the Wave of Cyber Threats FROST & SULLIVAN EBOOK

Upload: others

Post on 07-Oct-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SECURITY ON EDGE...Real World Application: Travel Site Secures Access to the Future. 11. Real World Application: Be Proactive, Mitigate Downtime, Save Money, Secure your Future. 12

frost.comThe contents of these pages are copyright © Frost & Sullivan. All rights reserved.

SECURITY ON EDGESurviving and Thriving Against the Wave of Cyber ThreatsFROS T & SULLIVAN EBOOK

Page 2: SECURITY ON EDGE...Real World Application: Travel Site Secures Access to the Future. 11. Real World Application: Be Proactive, Mitigate Downtime, Save Money, Secure your Future. 12

2Security On Edge

CONTENTS

3 Cybervigilance is Always On

4 Every Facet of Life is Online

5 Massive Breaches are Alarmingly Frequent

6 Vulnerabilities are Everywhere

7 Ensure You Have the Right Solution Provider

8 Edge Delivery Services Protects From the Edge

9 Real World Examples: Are You Really Mitigating Risk?

10 Real World Application: Travel Site Secures Access to the Future

11 Real World Application: Be Proactive, Mitigate Downtime, Save Money, Secure your Future

12 VendorProfile:IBM’sAdvancedSolutions

13 Your Customers, Employees, and Value Chain Partners Rely on Your Online Systems

Page 3: SECURITY ON EDGE...Real World Application: Travel Site Secures Access to the Future. 11. Real World Application: Be Proactive, Mitigate Downtime, Save Money, Secure your Future. 12

3Security On Edge

Online food deliveryis getting popular

Increased vehiclepurchasing online

2017, about 300k vehicles had been purchased online. That will surpass 1 million in 2020 and over 6 million by 2025.

Websites arecritical to business

More in-storemobile views

Industrygrowth

Onlinevehicle

purchasesOnline

sales

$200 B

$82 B

$25 B

$525 B

$300 K$1 M

$6 M

2018 2025 2000 20182017 2020 2025

15%

In-store,mobilewere up

in 2019

views

CY BERVIGILANCE IS ALWAYS ONAs the world is becoming increasingly digital, growing cyber threats and other vulnerabilities are magnifiedFrost & Sullivan research estimates the total number of IoT devices will grow to over 45 billion devices by 2023, from about 12 billionin2016.TrendssuchasConnectedRetailmeansdigitalsolutionsarenecessaryformanagingeverythingfromsupplychainstooperationalefficiencytocustomerexperience.Consumersconsumeon-lineandviatheircellphones.Mobiletrafficisoverhalfofglobalwebtraffic. People need and expect a seamless experience. This means more data stress on data centers, leveragingofmulti-cloudenvironments,andagreaterneedforedgesecurity.

Source: Frost & Sullivan, unless otherwise noted; online sales: https://www.census.gov/retail/index.html; mobile views: https://www.broadbandsearch.net/blog/mobile-desktop-internet-usage-statistics.

Page 4: SECURITY ON EDGE...Real World Application: Travel Site Secures Access to the Future. 11. Real World Application: Be Proactive, Mitigate Downtime, Save Money, Secure your Future. 12

4Security On Edge

All this online activity means vast volumes of personal and business data are being accessed through online interfaces, such as customer-facing websites, internal sites, and dashboards

EVERY FACET OF LIFE IS ONLINE

Source: Frost & Sullivan, unless otherwise noted.

LIFE

Social Media

Calendar/Email

Traffic anddirections

Online paymentsand accountmanagement

Weather

Product/service search

News andinformation

Text andmessaging

Check stock

INSTAGRAM

WORK

MARKETAGGREGATOR

GOOGLENEWSPAPER

NATIONALWEATHERSERVICE

VENDOR

MOBILEPROVIDER

FINANCIALINSTITUTION

AMAZON Banking

Page 5: SECURITY ON EDGE...Real World Application: Travel Site Secures Access to the Future. 11. Real World Application: Be Proactive, Mitigate Downtime, Save Money, Secure your Future. 12

5Security On Edge

Process more than

More than

billioncyber events

every day

US Bank’s Cyber Defense Center

undetected, from March through

December, 2019

stores compromised

million records exposed

Facebook’s 3rd party app on AWS servers

million people

Georgia Tech personnel and

family data

million exposed

EquiFax’s 2017 breach

companies state they’ve been victims

of cyber attacks

Companies in Canada

WAWA’s customercredit information

850

5401.3 147 4

1 5in

the average time forbreaches to be detected

279 days

It’sincrediblycostlyanddamagingtocompanieswhenthesesitesgodownorthedataflowinginandoutofthemgetscorruptedor exposed. Frost & Sullivan estimates the market to defend against distributed denial of service (DDoS) attacks doubled from $499 million in 2014 to over $1 Billion in 2018 and is anticipated to grow to $1.8 in 2021. A typical breach can affect over 25 thousand records and cost $150 per record.

MASSIVE BREACHES ARE ALARMINGLY FREQUENT

Source: Frost & Sullivan, unless otherwise noted; breach detection: 2019 Cost of a Data Breach Report by IBM Security and Ponemon Institute; cyber events: https://www.usbank.com/newsroom/stories/how-us-bank-protects-customers-from-cyber-threats.html; victims of

cyber attacks: https://www.theglobeandmail.com/business/article-businesses-spent-14-billion-on-cybersecurity-in-2017-statistics/

Page 6: SECURITY ON EDGE...Real World Application: Travel Site Secures Access to the Future. 11. Real World Application: Be Proactive, Mitigate Downtime, Save Money, Secure your Future. 12

6Security On Edge

GONE PHISHING…Phishing is a criminal, fraudulent mechanism which uses the Internet to acquire susceptible personal information, such as usernames, passwords, or credit card details by masquerading as a reliable business website or electronic communication.

VULNER ABILITIES ARE EVERY WHERE

Intentional website and data breaches steal information and can disrupt personal, business, or government activities. Phishing attacks lure victims in through email, social media, and mobile devices, on their own or as part of more complex attack. Unintentional downtime can occur as well.

• Black Friday and Cyber Monday are also hot times for threat actors when billions are spent by hundreds of millions of people online.

Intentional

Source: Frost & Sullivan, unless otherwise noted.

49%of breaches occur due tohuman error orinfrastructuremalfunctions

Source: 2019 Cost of a Data Breach Report by IBM Security and Ponemon Institute

of cybersecurity incidents involved phishing activities

32%Source: Verizon’s2019databreachreport.

Page 7: SECURITY ON EDGE...Real World Application: Travel Site Secures Access to the Future. 11. Real World Application: Be Proactive, Mitigate Downtime, Save Money, Secure your Future. 12

7Security On Edge

ENSURE YOU HAVE THE RIGHT SOLUTION PROVIDERCompaniesneedsuperiorsolutionstokeepcustomerinformationsafe.Frost&Sullivanhasidentifiedfivecriticalelementstogettingtherightsupplierandensuringbothahighdegreeofsecurityandtherightfitforyourorganization:

Source: Frost & Sullivan, unless otherwise noted.

PROTECTION SHOULD NOT BE CONTINGENT ON YOUR SITUATION, NOW OR IN THE FUTURE

Make sure your supplier can secure both hardware and software

GO BEYOND THE BASICS

Detection is great, prevention is better. 24/7monitoringandprotection is critical, but only the start. Find a provider who is leading in advanced analytics and AI to help identify patterns and vulnerabilities before they turn into events.

FIND INNOVATIVE SOLUTIONS THAT PROVIDE MORE SECURIT Y LAYERS

Cloud can be safer than locally stored information, hence explore a provider with its own secure cloud system.

SUPPLIERS NEED EXPERTISE IN YOUR INDUSTRY

Each industry is unique, and thus Security providers should be well versedintheclient’sparticular industry vertical.

ENSURE YOU GET MARKET-VERIFIED SOLUTIONS

It’scriticaltoworkwith suppliers that can demonstrate having a strong track record securing major companies.

Page 8: SECURITY ON EDGE...Real World Application: Travel Site Secures Access to the Future. 11. Real World Application: Be Proactive, Mitigate Downtime, Save Money, Secure your Future. 12

8Security On Edge

LIFE

THREATS

THREATS

THREATS

Edge-basedprotection

INSTAGRAM

WORK

MARKETAGGREGATOR

GOOGLENEWSPAPER

NATIONALWEATHERSERVICE

VENDOR

MOBILEPROVIDER

FINANCIALINSTITUTION

AMAZON

EDGE DELIVERY SERVICES PROTECTS FROM THE EDGEUsers are closer to the data they interact with, while not overwhelming the data center.

Source: Frost & Sullivan, unless otherwise noted.

Page 9: SECURITY ON EDGE...Real World Application: Travel Site Secures Access to the Future. 11. Real World Application: Be Proactive, Mitigate Downtime, Save Money, Secure your Future. 12

9Security On Edge

REAL WORLD EX AMPLES: ARE YOU REALLY MITIGATING RISK ? Emails, usernames, passwords, and exploits are widely accessible

Email lists with user names and passwords are alarmingly easy to procure illegally on the darknet.

Criminals and other threat actors conduct credentialstuffing,usingbotsthatautomatically and effectively input these details across thousands of Internet sites, gaining unprecedented access to personal, financial,andinstitutionalinformation.

The US is the top target in the world, with, according to the FBI, over $12.5 billion in damagefromcredentialphishing scams.

Source: Frost & Sullivan, unless otherwise noted.

This was not a rare occurrenceEdge Delivery Services blocks over 1.2 million malicious access attempts across their customers every month.

Mitigate most of the risk by targeting the links embedded in phishing emails, malware, and dangerous sites.

One company was experiencing between

2,300-4,000phishing attacks per month.

FIRST ATTEMPTUsing a Leading Email Security SolutionOnly achieved 94% mitigation. The majority of the remaining 6% had dangerous embedded links. Focusing on email doesn’t stop malware or malicious website vulnerabilities.

SECOND ATTEMPTEdge Delivery Services

Page 10: SECURITY ON EDGE...Real World Application: Travel Site Secures Access to the Future. 11. Real World Application: Be Proactive, Mitigate Downtime, Save Money, Secure your Future. 12

10Security On Edge

REAL WORLD APPLICATION: TR AVEL SITE SECURES ACCESS TO THE FUTUREAsmissioncriticalapplicationsandworkflowsmovetothecloudit’simperativetocontinuetoenableworkerstofocusonwhatthey need to do while companies improve security tactics and simplifying user management—making Edge Delivery Services a clear improvement to legacy VPN approach for secure, zero trust access.

Source: Frost & Sullivan, unless otherwise noted.

Lower equipment costs through secure Internet access to just the data and apps employees need

Ensure data is secure at both the gateway and application levels. Give workers everything they need, and nothing they don’t

Move to a secure cloud that manages users through Active Directory groups

Each remote worker needed a $2,500 laptop outfitted with

security software

Unnecessary onus on workers to keep equipment and access secure

Had more physical services and overheads, every resource needed to

be set up on a unique DNS

Before Edge Delivery Services With Edge Delivery ServicesControlling DataControlling Users

Page 11: SECURITY ON EDGE...Real World Application: Travel Site Secures Access to the Future. 11. Real World Application: Be Proactive, Mitigate Downtime, Save Money, Secure your Future. 12

11Security On Edge

REAL WORLD APPLICATION: BE PROACTIVE , MITIGATE DOWNTIME , SAVE MONE Y, SECURE YOUR FUTUREWhensuccessfulcloud-basedstartupdiscoveredaDDoSattackdisruptedservices,itimmediatelybroughtinapartertosecurefurtherevents.Protectionisnotcontingentonyoursituation.Getmarket-verifiedsolutionsandgobeyondthebasics.

Source: Frost & Sullivan, unless otherwise noted; cost of lost business: 2019 Cost of a Data Breach Report by IBM Security and Ponemon Institute.

SITUATION

A DDoS attack crippled cloud-based operations and highlighted vulnerabilities. Any downtime interrupted client’s businesses.

SOLUTION

Engage a vendor with edge-based, global 24/7 monitoring that was more effective—and cost less—than the previous in-house solution

OUTCOME

0 incidents.0!

0 incidents.0!

Average cost of lost businessdue to system downtime

$1.4 More than

Million

The cost increasesfor heavily cloud-

or web-basedbusinesses

Page 12: SECURITY ON EDGE...Real World Application: Travel Site Secures Access to the Future. 11. Real World Application: Be Proactive, Mitigate Downtime, Save Money, Secure your Future. 12

12Security On Edge

VENDOR PROFILE : IBM’S ADVANCED SOLUTIONS

Source: Frost & Sullivan, unless otherwise noted.

IBM has developed a solution at the edge: Threats are thwarted before even gettingtocustomersitesanddata.Thispreventsbottrafficandtheimpacton vulnerable web applications.

Protection at the edge means it can be implemented where it’s needed and will grow and evolve with businesses throughout their digital transformation

It’s applicable across industries as it protects at the point where people interact with the data

Shouldering security at the edge enables the customer site’s energy to be spent on business processes: allowing faster web traffic speed and higher app availability

100% platform availabilityDowntime reduced, productivity increases, bottlenecks decreased, and peak times become inconsequential

Edge Delivery Services are cloud-agnostic and protects multicloud environments

OUTCOME

Page 13: SECURITY ON EDGE...Real World Application: Travel Site Secures Access to the Future. 11. Real World Application: Be Proactive, Mitigate Downtime, Save Money, Secure your Future. 12

13Security On Edge

YOUR CUSTOMERS, EMPLOY EES, AND VALUE CHAIN PARTNERS RELY ON YOUR ONLINE SYSTEMS

These Next Steps on your Security Journey are Key!

EVALUATE YOUR CURRENT SITUATION. Is your current supplier offering extra layers of security, understanding your industry, and doing enough?

PLAN FOR YOUR “FUTURE STATE.” Will your supplier enable your growth and evolve with you?

UNDERSTAND THE MARKET. Both your own industry and yourcustomers’.Whodoyourcompetitorsrelyon?Canstablecybersecurity give you the leg up?

THE COST OF NOT TAKING ACTION. Loss of customer trust and relationships. Financial losses. Giving competitors undue advantages.

Learn more about IBM Edge Delivery Services* https://www.edgedeliveryservices.com/

* IBM Edge Delivery Services is powered by Akamai Technologies, a market leader in Enterprise Security and Web Performance

Page 14: SECURITY ON EDGE...Real World Application: Travel Site Secures Access to the Future. 11. Real World Application: Be Proactive, Mitigate Downtime, Save Money, Secure your Future. 12

14

Frost & Sullivan, the Growth Partnership Company, works in collaboration with clients to leverage visionary innovation that addresses the global challenges and related growth opportunities that will make or break today’smarketparticipants.Formore than50years,wehavebeendevelopinggrowthstrategies for theGlobal 1000, emerging businesses, the public sector and the investment community. Is your organization prepared for the next profound wave of industry convergence, disruptive technologies, increasing competitive intensity, Mega Trends, breakthrough best practices, changing customer dynamics and emerging economies?

For information regarding permission, write:Frost & Sullivan 3211 Scott BlvdSanta Clara, CA 95054

SILICON VALLEY3211 Scott Blvd Santa Clara, CA 95054 Tel+1650.475.4500

SAN ANTONIO7550WestInterstate10 Suite 400 SanAntonio,TX78229 Tel +1 210.348.1000

LONDON566ChiswickHighRoad London W4 5YF Tel+44(0)2089968500