- Telefonica Business Solutions

Transcription

- Telefonica Business Solutions
A Telefonica Global Solutions White Paper
Protecting the future_
Understanding the value of security in a digital world.
September 2014
Introduction
“In 2013, organizations
faced many high-profile
and very significant data
breaches, public
disclosures and advanced,
targeted attacks. These
targeted attacks have
evolved beyond traditional
defensive controls;
consequently, security
technologies must evolve
along with the threats.”
Lawrence Pingree, Gartner Agenda Overview
for TSP Security Solutions, January 2014
Enterprise businesses are
increasingly under attack from
hackers and cyber-criminals, intent
on gaining access to valuable secure
and sensitive information or simply
seeking to test and verify security
protection, sometimes only for fun.
New threats emerge regularly as the
battle continues. As recently as
August 2014 the US Homeland
Security office published a warning
about the new “Point Of Sale”
malware dubbed “BackOff”, an
example of the never-ending cycle
of attack and counter-attack.
Gartner, a world leading research
company forecast that in 2013
Enterprises have spent approximately
$67 billion on information security
to thwart this threat.†
Innovative approaches to executing
security crime are not new.
Legendary computer programmer,
John Thomas Draper, (AKA ‘Captain
Crunch’) used a whistle from a box of
‘Cap’n Crunch’ cereal to emit a
2600Hz-tone that allowed him to
illegally access phone landlines and
make calls for free. Often, what
starts as a hobby can evolve into
something far more sinister. Once
motivated by curiosity and an
interest in technology, along with the
subsequent fame for ‘beating the
system’, hacking has now become a
cyber-crime; an industry in itself
seeking financial gain and posing a
terrorist threat.
Terrorists and information thieves
are now highly advanced. Organised
groups and individuals are capable
of bringing down online retailers,
accessing and selling personal data
and infiltrating IT systems. In the
battle to prevent this, governments,
security agencies and Telco
operators are constantly developing,
implementing and reviewing ways
to limit and ultimately eradicate the
effects of this cyber war.
There are tough challenges to face:
how do we physically protect
ourselves from an invisible threat?
Where should we construct our
defences?
Security threats and breaches impact us all in every business sector and we are
having to learn from the experiences. This table demonstrates some of the real
breaches to have recently affected some highly recognisable and respected brands.
2013
Who
Industry Sector
Impact
February
March
September
October
December
Federal
Reserve
Evernote
Win7 Vista
Forum
Adobe
Target
Central Bank
Software
Software
Software
Retail
4,000
accounts
Up to
50m users
200,000
users
Up to
3m users
Up to 40m
customers
2014
January
Who
Industry Sector
Impact
February
April
Yahoo
Snapchat
WPT
Amateur
Poker
League
Forbes
UN Internet
Governance
Forum
Michaels
Business
Acumen
Magazine
IT
Communication
Online
Media
Government
initiative
Retail
Media
81m users
4.6m users
175,000
accounts
Up to
1m users
Up to 40m
customers
Up to 3m
customers
Up to
26,000 users
†Gartner Symposium/ITxpo 2013, Q&A: How is the Digital World Impacting Security? September 2013
2.
1.
Defining
the security
perimeter
When any Chief Information
Security Officer (CISO) considers the
security of their company, they face
the same standard questions:
• What do I have to protect?
• Where is that information?
• W
here do I have to place
the perimeter?
Defining where a company places
its defences and deciding on the
approach to protect important data
is not easy. These tasks have
become so critical and challenging
that increasing numbers of
companies are delegating them
to an experienced security partner.
In fact, telecommunication
companies are seen as the most
trusted organisations to manage
mobile security by 51% of
companies according to Yankee
Group. (Data courtesy of TDIG.)
“As advancing threats, mobility and blurring network
borders continue to plague organizations globally,
requirements for security products, services and
incident response continue to evolve. Organizations
are looking to recraft their core security technology
and service requirements to fill new gaps that have
been identified.”
Lawrence Pingree, Gartner Agenda Overview for TSP Security Solutions, January 2014
3.
In the past, defining the security
perimeter of a company was
relatively simple: a couple of firewalls
with some additional equipment to
protect the servers. Today, however,
this is far from sufficient. Consider
when an employee goes on a
business trip, connects to an open
wireless network and begins a VPN
session. Their credentials, passwords
and even personal documents are
potentially easily retrievable by the
network administrator. This is a very
simple and common example, yet
many more sophisticated attacks
are taking place daily across the globe.
There are three core IT areas where
company security is paramount:
1.1 Network Security
Issues: Complexity, costs
and expertise
Companies storing customer
information must adapt their
security infrastructure to protect
the important data. Currently, almost
70% of companies rely on hardware
equipment alone, following a
traditional security strategy;
shared and virtualised infrastructure
are becoming an option. The formula
is well understood: install as much
equipment as needed on the
premises. NGFWs, UTMs, IDSs, IPSs,
etc, are acronyms that network
administrators and security teams
are all too familiar with. However
when a multinational company is
required to manage expansive and
expensive security infrastructure,
they are faced with a multifaceted
and intricate challenge. The most
important and immediate issues
include complexity, costs and
knowledge (expertise).
1.2 Cloud Security
Issues: Control, sharing
and trust
Multinational companies have
thousands of employees worldwide,
many needing to travel as part of
their role, while sending and receiving
emails and processing confidential
information on the move. They may
be working from an airport or hotel
room by tethering a connection from
their mobile, or in a car park using
free WiFi. These employees are
outside of the company’s traditional
security perimeter and are certainly
facing a security risk.
After all, it doesn’t take much to
become unknowingly infected by
malware, before returning to the
office and potentially infecting the
company’s network.
1.3 Mobile Security
Issues: Privacy, technology
and mobility
‘Bring your own device (BYOD)’
is here to stay. Any device not
managed by the central IT team
poses a risk to a company’s security.
Employees want to use one device
for both personal and professional
use. They may use the same device
to send an internal memorandum
and then to update their Facebook
status. So, what controls are in place
to stop them accidentally sending
confidential documentation to a
person outside the company, or
accidently leaking a new product
on Twitter? The mobile market is
constantly evolving, introducing
new devices every week, discovering
bugs every day, and updating apps
every hour. Therefore protecting the
privacy of the employee, company
data and their personal information
is fundamental.
“On average, 15% of employees are accessing sensitive
data such as customer information, nonpublic financial
data, intellectual property, and corporate strategy from
devices other than work laptops and desktops. So it’s
now far less important to focus on protecting individual
devices the organization no longer owns, or attempting
to lock down the devices that connect to the network,
and far more important to protect the organization’s
sensitive data regardless of device type or location.”
The Future Of Data Security: A Zero Trust Approach
Forrester Research Inc. John Kindervag, Heidi Shey, and Kelley Mak, June 2014
4.
2.
The elements
of security
2.1 Network Security
Network security is a mature market,
based on the capabilities of a SOC
(Security Operation Centre)
that handles all operational work
to ensure effective security
management. Having more than one
SOC can clearly be an advantage,
enabling coverage of different
geographies whilst working in a
federated mode.
Early detection is the key to
keeping network security in good
shape. Using Security Information
Events Management (SIEM) engines,
the SOCs gather and correlate
information from all the devices of
the security infrastructure to draw
a picture of the status of the service,
in real-time. Advanced correlation
engines can handle thousands of
5.
events per second and detect
advanced threats that the devices
cannot detect on their own.
To face the challenges of complexity
and costs, customers should rely on
a MSSP (Managed Security Service
Provider) to manage their security
infrastructure which, via their own
SOCs, can remotely supervise and
oversee all company devices.
This allows companies to benefit
from an efficient network, expertly
managed by a dedicated security
team for a fixed and predictable cost.
2.2 Cloud Security
Cloud-hosted security services are
growing in both use and importance.
Advantages such as not requiring
Capex investment, ease of
equipment deployment and the
ability to instantaneously protect
any device in any location are
making these solutions highly
appealing to customers of all sizes.
Importantly, there are three major
risk factors to consider:
•Web-related threats affect web
browsing, applications use and
social network information sharing.
•Spam represents more than 95%
of the total amount of emails and
can harm employee productivity.
•Distributed Denial of Service
(DDoS) attacks can seriously
damage the infrastructure of an
organisation, often causing major
disruption to business activity.
However, there is now a wide
range of online tools to combat
these threats. Email cleaners are
available to manage spam,
whilst web navigation gateways
control the Internet sites employees
can access without limiting the
information sharing.
2.3 Mobile Security
This is a relatively new threat vector
that is increasing rapidly and there
are a multitude of niche companies
focusing on different aspects and
solutions. Current solutions are most
often an evolution of Mobile Device
Management (MDM) rather than new,
horizontal mobile security solutions.
However, we anticipate that with the
increase in popularity of BYOD, this
trend is likely to change in the very
near future, with highly customised
mobile security services coming to
market. What is clear is that
managing mobile security in the long
term will remain an ongoing challenge.
The mobile market is evolving
incredibly quickly with thousands of
new devices using millions of
combinations of hardware and
software. Protecting all variations of
devices is a huge challenge. Often
more than one solution is needed to
efficiently protect the user from
external risks. Due to limitations on
the operating systems, the four
major platforms (Android, iOS,
Windows Phone and BlackBerry)
often don’t provide the same level of
protection. At present, web
navigation filtering and application
control are two of the most common
solutions allowing enterprises to
keep control of their devices without
harming user experience or violating
employee privacy.
2.4 Cyber Security
(and the new digital threats)
Until recently, DDoS attacks,
information theft and email
spamming were common methods
to damage and disrupt the operation
of a business. Today, criminal
organisations use the Internet as a
lucrative source of revenue. Phishing,
credential and identity theft and
counter-fitting are just a few of the
new threats facing companies, their
employees and their customers.
Whether engaging with a bank or a
retailer (online or high street),
customers expect to be protected
against security threats. In December
2013, credit and debit card details of
up to 40 million customers and
personal information of up to 70
million were hacked from a major
retailer in the US. Providing solutions
to address these real needs is a new
market, and one which is growing at
a fast rate to meet customer
demand. Security providers are
constantly evolving their products,
adding more functionality to protect
companies and their customers.
It is an ongoing race to anticipate,
address and secure customer security.
“Data is the lifeblood of today’s digital businesses, and
protecting it from theft, misuse, and abuse is the No. 1
responsibility of every S&R leader. Hacked customer
data can erase millions in profits within weeks, stolen
intellectual property can erase competitive advantage in
less than a year, and unnecessary privacy abuses can
bring unwanted scrutiny and fines from regulators while
inflicting reputational damage that can last months,
even years”
The Future Of Data Security: A Zero Trust Approach
Forrester Research Inc. John Kindervag, Heidi Shey, and Kelley Mak, June 2014
6.
3.
How can
we help?
We understand the global
complexity of these security dangers
and have the experience to ensure
that your business stays protected
whatever the threat. Our worldwide
solutions give you more than just
security. They provide peace of mind.
Our three families of Security
Services include:
Mobile
Services
Managed
Services
Cyber
Security
Mobile
Security
Vulnerabilities
Management
Cloud
Services
Cyber
Security
Clean
Email
Security Monitoring
Security Device Management
Managed Security Services:
Managed Security Services (MSS)
delegate the management of
security devices and security
incidents of your organisation to an
expert, global team. This team works
with you to identify critical business
assets, evaluate the risks to them,
and subsequently deploy customised
measures to improve your security.
This, in turn, allows you to focus on
your core business.
We have improved SIEM technology
with SAQQARA, a unique Telefónica
development. Using neuronal
7.
Anti
DDoS
networks, statistical analysis and
multiple algorithms, we can detect
periodical behaviours and, using
decision trees, respond in the best
way. SAQQARA feeds back into the
SIEM correlation engine to create an
ever-improving ecosystem.
Furthermore, SAQQARA is compatible
with other SAQQARA-powered
SIEMs, enabling the sharing of
knowledge and intelligence with
regard to new security patterns
which other SIEMs may not yet
detect as an attack.
Cyber Security:
Cyber Security Services act as your
eyes and ears on the Internet,
helping you to identify and manage
the increasing possibilities of digital
threats. Cyber Security gathers
information from different sources
(public, hacking and underground,
partners, etc.) across the Internet
and our own intelligence resources in
order to help protect you against
false information, ID theft, data
leakage, credit card theft and
“hacktivism”. Cyber Security also
provides a vision of the actual
security situation from an attacker’s
perspective of customer assets,
providing support to prioritise and fix
a customer’s security flaws.
Our Local Analysts continuously
engage with you to advise and help
identify potential security gaps that
need addressing.
Web Security Gateway:
The Web Security Gateway (WSG)
service provides a secure experience
to users navigating the Internet from
any location or device without the
need for any hardware, software or
connector. It analyses and blocks
traffic that does not comply
with the company’s security policy
and supports compliance by
imposing web browsing controls
at the internet perimeter.
Clean E-Mail:
Clean e-mail provides e-mail filtering
and e-mail policy enforcement to
help your organisation meet legal
and regulatory compliance
requirements. Features include
filtering, anti-virus/anti-malware and
anti-spam protection, directory
harvest attack protection, file
filtering, archiving and encryption.
Anti DDoS:
The Anti-DDoS Shield is a centrally
managed service that detects and
mitigates Distributed Denial of
Service (DDoS) attacks before they
reach your business infrastructure,
avoiding interruption and potential
harm to your business activities.
Mobile Security:
This combines features from
Managed Mobility, Web Security
Gateway and Cyber Security. Mobile
secure wipe, localisation, dual
persona, secure ID protection, web
and app navigation control are the
heroes of this service.
8.
4.
Contact us
9.
To find out how your business can benefit
from our Security Services, email us
at: [email protected] or visit
www.globalsolutions.telefonica.com/multinational
and complete the ‘Contact Us’ form.
This document is the property of Telefonica Global Solutions.
Any reproduction, distribution or public communication without the
express written consent of Telefonica Global Solutions is forbidden.