View
1.577
Download
1
Category
Tags:
Preview:
DESCRIPTION
Frost & Sullivan analysis on Facebook Status: Expanding Customer Relations or Increased Security Threats?
Citation preview
Facebook Status: Expanded Customer
Relations or Increased Security Threats?
Martha VazquezResearch Analyst, Network Security
Frost & Sullivan February 23, 2010
2
Focus Points
• Overview of the Challenging Threat Landscape
• The Shift to Using Social Networking
• The Threats of Social Networking
• Solving the Problem
• Vendors in the Market
• Conclusions
3
Overview of the Challenging Threat Landscape
• Cybercrime has changed dramatically in the past 5 years
Teens, hackers looking to
create chaos and to “show off”
Loss of intellectual property
Loss of revenue
Identity theft
High profile attacks
Mass mailers
Cybercriminals/ organized
crime rings located globally
focused on gaining profit
Targeted attacks – spyware,
phishing, botnets,
vulnerabilities
Loss of productivity by bloating
resources and causing network
issues
4
• In the past, using sites such as Facebook and MySpace were
seen as fun applications with very little business purpose.
• Business is now being conducted via social networking sites and through mobile devices.
• According to Cisco’s 2009 annual security report, social media proves to be impacting the enterprise. Of over 4,000 of Cisco’s
web security customers, 2 percent of all web traffic is being
accessed through social network sites such as Facebook,
MySpace, and LinkedIn.
The shift to using social networking
5
The Threats of Social Networking
• According to a Sophos survey conducted in December 2009,
60% of respondents believe that Facebook presents the biggest security risk of the social networking sites, significantly ahead of
MySpace, Twitter, and LinkedIn
6
Solving the Problem
• The growth of social networking sites continues as well as the
number of users, and is a strong marketing tool used by many businesses.
• Businesses cannot simply stop employees from having access to
these sites.
• Blogging on these sites is no longer seen as wasted time, but as
a means to having employees advertise, communicate benefits,
and build rapport customers.
7
Solving the Problem
• A unified, comprehensive approach to security
• No single solution will work
• A layer approach is critical
Web and Email Gateway Solutions
Endpoint Security
Managed Security Solutions
8
Content Filtering Market
• Frost & Sullivan uses the term content filtering to refer to a trusted subsystem which enforces a security policy on the data that passes through it, or a program or section of code designed to examine each input or output request for certain qualifying criteria, which then processes or forwards the request accordingly.
• These solutions will basically block or allow content that is acceptable based on set policies.
• Most commonly used for email and Internet websites.
• Inappropriate access to websites and content can be monitored and protected from malicious web sites.
9
Content Filtering Market
• Pros
• It can be placed in the network and can offer a first line of defense in protecting data loss and malware
• A great way to restrict what websites or emails that can be accessed
• Cons
• Employees may feel that they are being micromanaged and only allowed to visit certain websites
• Additional privacy concerns from employees may become a concern as they are being closely monitored
10
Content Filtering Market
Benefits
Key Features
•Protect from malware at the gateway
•URL and email filtering
•Zero-day Web protection
•Added layer of defense for enterprises
•Protect from loss of intellectual property and
identity theft
•Zero-day Web protection
•Preserve bandwidth
11
Endpoint Security
Frost & Sullivan defines endpoint security as security software that is implemented into devices such as mobile devices laptops, PCs, netbooks, email servers, or file servers. The product is usually offeredas a bundled solution for clients and servers or as a standalone product for only a server or client. Technologies include those that prevent and/or recover malware from being launched on a device. A variety of security technologies used by endpoint security providers include:
• Anti-virus/anti-malware (signature detection)
• Anti-spyware
• Personal firewall
• Host IDS/IPS
• Encryption
• Behavior blocking such as heuristics
• Whitelisting/blacklisting
Source: Dataplex Systems
12
Endpoint Security
• Pros • Extend protection to the desktop, laptop, server and mobile
devices
• Able to control and manage all endpoints that are accessing the network
• Cons • Finding the right solution can be confusing
• Threats are becoming more complex and malware writers are becoming more skillful in their attacks
13
Endpoint Security
Benefits
Key Features
•Protect from malware at the desktop/server
•Protection from known and unknown threats
•Protection from losing data
•First layer of defense for enterprises
•Protect from losing intellectual property and
identity theft
•Ability to manage and do centralized reporting
14
Managed Security Service Providers
• Managed Security Service Provider monitor and manage client’s electronic infrastructure from their Secure Operating Centers (SOC) in order to protect client data and communications from anomalies and attacks.
• By utilizing MSSP services, organizations are often able to reduce expenditure on either customer-premise-equipment (CPE) or in-house security specialists while having sound security management.
• Security Services are delivered in various ways which include onpremise or hosted. Frost & Sullivan splits the MSSP market into three segments which include: Hosted/In the Cloud, CPE/Managed & Monitoring or through Professional/Assessment Services.
15
Managed Security Service Providers
• Pros • Lower costs while increasing security posture
• Increase security expertise that is lacking in-house
• Cons • Businesses worry about handing over confidential information to
a 3rd party outsourcing company
• Perceived loss of control
16
Managed Security Service Providers
Key Features
Benefits
•Protect from malware and threats at the perimeter
and at the endpoint
•Protection from known and unknown threats
•Protection from losing data
•Enhance security posture
•Reduce risk and cost
•Enhance security expertise
17
Vendors In the Market
18
• Total US Population : 302 Million
• Number of Households in the USA (2007) : 114 Million (estimate)
• 270+ million wireless subscribers in the US (2008)
• Total US Internet Users : 223 Million
• Over 10,000 simultaneous mobile marketing campaigns running
• Laptop PCs Sold in USA in 2007 : 30 Million
• Number of Households with Laptops: 48 Million
• Over 2.2 billion wireless devices sold globally (2008)
• Over 6 trillion mobile messages sent globally
• Over 3.2 billion wireless subscribers globally
• 670 million 3G subscribers
Future Growth of Social Networking
19
Mobile Social Networking and Move to Add Location and Presence
Mobile Social Networking
Presence + Location
Facebook, LinkedIn, YouTube
-100 Million active mobile Facebook users
- Facebook reports mobile Facebook users are 2-3x more
active than traditional Facebook users
- Over 200 Mobile Operators in 60 countries are working to
deploy Facebook Mobile
Loopt, meetmoi, m-Dating (a way to monetize social networking)
-Loopt is an innovative mobile “social-mapping” network
combining Facebook-like functionality with real time presence
and location.
-Many Web 2.0 dating services are taking advantage of social
networking and location.
20
Conclusions
From the Consumer Perspective • While social networks are great for shopping and news, consumers need to be
aware of outstanding threats.
• Education is key to understanding threats to the user.
• Integrated endpoint security products are available and “free” anti-malware products are available as well.
From a Business Perspective• Education and training employees in the proper use of these sites and
understanding the threats of displaying too much information.
• In addition, users need to be aware of threats in using wireless devices when traveling.
• All in all, education and strict policy enforcement along with protection at the endpoint will remain key in reducing the dangers in using these social networking sites.
21
Next Steps
� Request a proposal for a Growth Partnership Service to support you and your team to accelerate the growth of your company. (myfrost@frost.com)1-877-GoFrost (1-877-463-7678)
� Register for the next Chairman’s Series on Growth:
Marketing Excellence and the Art of Winning Customers,
March 2, 2010, 2 pm ET (http://www.frost.com/growth)
� Register for Frost & Sullivan’s Growth Opportunity Newsletters and keep abreast of innovative growth opportunities(www.frost.com/news)
22
Your Feedback is Important to Us
Growth Forecasts?
Competitive Structure?
Emerging Trends?
Strategic Recommendations?
Other?
Please inform us by taking our survey.
What would you like to see from Frost & Sullivan?
23
For Additional Information
Jake Wengroff
Director
Corporate Communications
(210) 247-3806
jake.wengroff@frost.com
Craig Hays
Sales Manager
Information & Communication Technologies
(210) 348-6420
chays@frost.com
Robert Ayoub
Global Manager
Network Security practice
(210) 247-3808
robert.ayoub@frost.com
Recommended