22
Security As A Service By Jim Kaskade March, 2011 Confidential Cheyenne Mountain Operations Center

Next-Gen Security (using Cloud)

Embed Size (px)

DESCRIPTION

Some thoughts on how to leverage cloud infrastructure to deliver new (next-gen) security as a service.

Citation preview

Page 1: Next-Gen Security (using Cloud)

Security As A Service

By Jim Kaskade

March, 2011 Confidential

Cheyenne Mountain Operations Center

Page 2: Next-Gen Security (using Cloud)

Next Generation Managed, Real-Time

Cloud Security As A Service

Page 3: Next-Gen Security (using Cloud)
Page 4: Next-Gen Security (using Cloud)

2010 (per Symantec)

286M Malware Threats

93% Increase in Web Attacks

42% more mobile vulnerabilities

1M+ botnets

Page 5: Next-Gen Security (using Cloud)

2010 (per IBM)

13B events / day

49% of vulnerabilities from web apps

44% without a patch by year-end

APTs now targeted, sophisticated & complex

Page 6: Next-Gen Security (using Cloud)
Page 7: Next-Gen Security (using Cloud)

Symantec, 2010

Page 8: Next-Gen Security (using Cloud)

Advanced Persistent Threats

Page 9: Next-Gen Security (using Cloud)

Market Opportunity

$14.8

$16.5

$13.0

$14.0

$15.0

$16.0

$17.0

WW Security SW Revenue (TAM)

Ann

ual

Rev

enue

($

B)

2009

2010

11.3% CAGR

$1.6

$2.5

$0.0

$1.0

$2.0

$3.0

WW IDPS SW Revenue (SAM)

Ann

ual

Rev

enue

($

B)

2011

2014

16.5% CAGR

Gartner, 2010

IDC, 2010

$9.5B HW+SW

Page 10: Next-Gen Security (using Cloud)

Market Opportunity Managed Service Model

$6.0

$17.0

$0.0

$5.0

$10.0

$15.0

$20.0

SaaS, CPE, Cloud MSSP Revenue

Ann

ual

Rev

enue

($

B)

2010

2015

23% CAGR

Page 11: Next-Gen Security (using Cloud)

How Do Small-Medium Sized Businesses Deploy Cost-Effective Intrusion Detection & Prevention?

Page 12: Next-Gen Security (using Cloud)

Predictive Analytics Engine

(BotHunter)

Data Collector (WebSpy)

Real-Time Database

(uCirrus)

Data Warehouse

Administration

.

.

.

.

.

.

Internet Users

Intranet Users

Real-Time Security As A Service Cloud

Real-Time Reporting

Discovery

Raw Data Store

Knowledge Store

Page 13: Next-Gen Security (using Cloud)

Company A

Company B

Company C

Company D

Leveraging The Community

Original Event Data

Community Knowledge Repository

D

C

B

A

Page 14: Next-Gen Security (using Cloud)

Use-case

Enterprise

Security As A Service

Cloud

BU

Internet

Telecom

Sensor Data

Real-time Reporting

Real-time Status/Control

Page 15: Next-Gen Security (using Cloud)

Value Proposition

 Signature-less Real-time Network Detection / Protection

 Real-time Collection & Analysis of Information From Hosts, Security Devices, and Network Devices

 Real-time Reporting of Data & Discovery of Information

 No customization required

 Simple Cloud-based Deployment

 Cloud Economics

Page 16: Next-Gen Security (using Cloud)

Pricing / TCO Differentiators

$40,000

$0

$80,000

$0

$0

$75,000

$0

$20,000

$40,000

$60,000

$80,000

$100,000

$120,000

$140,000

Traditional On-Prem Security Managed Secruity As A Service

Ann

ual

Sec

urit

y C

osts

($

)

250-User Network (Annual Costs)

Subscription

Security Staff

Hardware/Software

$25/User/Mth

Page 17: Next-Gen Security (using Cloud)

Competitive Landscape Top Security Providers by Revenue: IDC, 2011

Legacy HW Appliance Model

Page 18: Next-Gen Security (using Cloud)

SIEM IDPS

Competitive Landscape

Page 19: Next-Gen Security (using Cloud)

Cloud-based Landscape

 Sumo Logic

 MetaFlows

 Alert Logic

  IPTrust

 Symantec.cloud

 Sourcefire Immunet/Razorback

 Zscaler

 Webroot

Page 20: Next-Gen Security (using Cloud)

Why Cloud?

  Light client applications – don’t have to burden having users constantly update end devices with heavy apps.

  End device performance does not become a concern – offload security software to cloud

  Uniform policy across the entire organization – single source for all security services = all devices must abide by a controlled set of consistent policies

  Centralized reporting platform for IT & Execs – a single view of the entire enterprise’s security state, which in many cases is half the battle.

  Zero latency in deployment – by having a global distribution network via cloud services, all organizations are covered quickly

Page 21: Next-Gen Security (using Cloud)

Thank You!

Page 22: Next-Gen Security (using Cloud)

Security Is Impacting Cloud Adoption

IDC, 2010