Evolve Your Security Operations Strategy To Account For Cloud

Similar documents
Mastering The Endpoint

Vulnerability Management Trends In APAC

Modern Database Architectures Demand Modern Data Security Measures

Digital Transformation Drives Distributed Store Networks To The Breaking Point

Build Your Zero Trust Security Strategy With Microsegmentation

Business Success Through Embedded Communication Technology

Modern Compute Is The Foundation For Your IT Transformation

Operationalize Security To Secure Your Data Perimeter

Converged Infrastructure Matures And Proves Its Value

Supporting The Zero Trust Model Of Information Security: The Important Role Of Today s Intrusion Prevention Systems

Evolving Threats Call For Integrated Endpoint Security Solutions With Holistic Visibility

Unlock The Value Of Cloud: A Spotlight On IT Executives

Unlock The Value Of Cloud

Innovation Leaders Need IT Services To Drive Transformative Outcomes

Red Hat Virtualization Increases Efficiency And Cost Effectiveness Of Virtualization

Rethink Enterprise Endpoint Security In The Cloud Computing Era

Fact Or Fiction: The State Of GDPR Compliance

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services

Enabling Hybrid Cloud Transformation

THE STATE OF IT TRANSFORMATION FOR RETAIL

Enterprise Private Cloud. Fully managed private cloud as a service in your data centre or ours.

Best Practices in Securing a Multicloud World

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

SD-WAN Networks Enable Modern Digital Business Ecosystems

Oracle bakes security into its DNA

THE STATE OF IT TRANSFORMATION FOR TELECOMMUNICATIONS

Securing Your Digital Transformation

SD-WAN. Enabling the Enterprise to Overcome Barriers to Digital Transformation. An IDC InfoBrief Sponsored by Comcast

Enabling Zero Trust Security Through Network Virtualization And Micro- Segmentation

Why Enterprises Need to Optimize Their Data Centers

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach

Emergence of Business Continuity to Ensure Business and IT Operations. Solutions to successfully meet the requirements of business continuity.

Securing The Enterprise With Machine Identity Protection

Cognizant Cloud Security Solution

TechValidate Survey Report: SaaS Application Trends and Challenges

The State of Cloud Monitoring

Cloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION

MULTI-CLOUD REQUIRES NEW MANAGEMENT STRATEGIES AND A FORWARD-LOOKING APPROACH

A Forrester Total Economic Impact Study Commissioned by ServiceNow January 2018

Cloud for Government: A Transformative Digital Tool to Better Serve Communities

Center Security On Advanced Technology

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

IDC MarketScape: Worldwide Cloud Professional Services 2014 Vendor Analysis

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Overcoming IT Challenges in the Education Segment Leveraging Cloud and On-Premise Resources for Maximum Impact

Multicloud is the New Normal Cloud enables Digital Transformation (DX), but more clouds bring more challenges

Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation

Australian Hybrid IT Adoption

Cybersecurity. Securely enabling transformation and change

Cloud Computing: Making the Right Choice for Your Organization

THE IMPACT OF SECURITY ON APPLICATION DEVELOPMENT. August prevoty.com. August 2015

Cloud Services. Infrastructure-as-a-Service

CenturyLink for Microsoft

SDN HAS ARRIVED, BUT NEEDS COMPLEMENTARY MANAGEMENT TOOLS

WHITE PAPER HYBRID CLOUD: FLEXIBLE, SCALABLE, AND COST-EFFICIENT UK: US: HK:

Mobile Security: Move Beyond The Basics And Overcome Mobile Paralysis

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

IDC MarketScape: Worldwide Network Consulting Services 2017 Vendor Assessment

J U L Y Title of Document. Here is the subtitle of the document

Hybrid IT for SMBs. HPE addressing SMB and channel partner Hybrid IT demands ANALYST ANURAG AGRAWAL REPORT : HPE. October 2018

Survey: Global Efficiency Held Back by Infrastructure Spend in Pharmaceutical Industry

Incident Response Services

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

CenturyLink IQ Networking: MPLS

2018 Report The State of Securing Cloud Workloads

Toward an Automated Future

Why Converged Infrastructure?

ProDeploy Suite. Accelerate enterprise technology adoption with expert deployment designed for you

Abstract: Data Protection Cloud Strategies

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Government IT Modernization and the Adoption of Hybrid Cloud

PLAYBOOK. How Do You Plan to Grow? Evaluating Your Critical Infrastructure Can Help Uncover the Right Strategy

The Total Economic Impact Of Salesforce Studio

ENABLING SECURE CLOUD CONNECTIVITY. Create a Successful Cloud Strategy with Reliable Connectivity Solutions

IDC FutureScape: Worldwide Security Products and Services 2017 Predictions

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

SOC 2 examinations and SOC for Cybersecurity examinations: Understanding the key distinctions

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

HOW BUSINESS FUNCTIONS ARE DRIVING PUBLIC CLOUD ADOPTION ACROSS THE TECHNOLOGY, MEDIA & ENTERTAINMENT INDUSTRY

Total Cost of Ownership: Benefits of ECM in the OpenText Cloud

SIEMLESS THREAT MANAGEMENT

THREAT HUNTING REPORT

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES

10 Cloud Myths Demystified

IT People has been offering end-to-end IT outsourcing & staffing solutions to companies since two decades.

Accelerate Your Enterprise Private Cloud Initiative

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers

Virtustream Managed Services Drive value from technology investments through IT management solutions. Tim Calahan, Manager Managed Services

Healthcare IT Modernization and the Adoption of Hybrid Cloud

Micro Focus Partner Program. For Resellers

Cloud Migration Strategies

2018 MANAGED SECURITY SERVICE PROVIDER (MSSP): BENCHMARK SURVEY Insights That Inform Decision-Making for Retail Industry Outsourcing

Sales Presentation Case 2018 Dell EMC

Three Key Challenges Facing ISPs and Their Enterprise Clients

A Practical Guide for Evaluating the Value of VCE Converged Infrastructure for Data Center Modernization

Get more out of technology starting day one. ProDeploy Enterprise Suite

Introduction Assess Your Own Requirements To Choose Your Next Platform... 3

Transcription:

Evolve Your Security Operations Strategy To Account For Cloud GET STARTED

The growth of cloud computing and proliferation of complex service delivery models continue to accelerate as companies recognize the business and technology benefits inherent in cloud adoption. Data from Forrester s Global Business Technographics Infrastructure Survey, 2015 shows that 46% of companies now use two or more cloud providers as part of their IT service delivery strategy. While the value of cloud for business and IT is widely recognized, new challenges are emerging. More than ever, companies require an agile security operations strategy to respond to changing infrastructure needs. In March 2016, Alert Logic commissioned Forrester Consulting to evaluate the impacts that cloud adoption has had on cloud security operations, and the related challenges and benefits that IT professionals experience. Demographics 100 US and UK IT professionals at the director level and above who have workloads in the public cloud and manage cloud security infrastructure Top five industries Financial services/insurance: 21% Retail: 19% Manufacturing: 19% Software: 14% Telecommunications: 9% Company size 100 to 499 employees: 18% 500 to 999 employees: 25% 1,000 to 4,999 employees: 43% 5,000 to 10,000 employees: 14% Responsibility for cloud security infrastructure Final decision-maker: 68% Part of team making decisions: 30% Influence decisions: 2%

1 2 Security Operations Teams Are Not Adjusting Their Strategy For Public Cloud Companies are adopting cloud infrastructure and computing in order to capitalize on business advantages such as rapid innovation and speed-to-market, but survey results show that security teams may not be adapting security operations to business demands. IT professionals report that cloud adoption has changed their companies' security operations strategies in the following ways: They are increasing investment in security operations (51%), instituting new cloud security policies and controls (49%), and re-evaluating their security operations and controls across all environments (46%). Yet while security teams recognize that cloud adoption as a whole requires a transformation in security operations, 75% of IT professionals surveyed in this study are using the same security across their public and on-premises workloads.

1 2 Increasingly Complex Environments Require Adjustments In Security Operations Strategy Fifty-three percent of companies have implemented or are expanding their in-house security operations center (SOC) capabilities, despite challenges. Forty-four percent of companies report the ability to manage security content and identify multivector attacks are the primary challenges of security operations. Further, security roles are often distributed across the organization, adding to the difficulty of centralizing security operations and managing costs. Companies also struggle with finding skilled talent to build their teams. Companies reported increased investment in security operations (51%), but find challenges in adjusting for cloud adoption.

1 2 Add Skills To Your Team To Meet Cloud Security Demands Companies need a combination of technical and business skills to support their SOC. On the technical side, security teams must be skilled in network, application, and infrastructure security, as well as virtualization and threat intelligence. Effective security teams also require complementary business skills, including risk management, compliance management, change management, and industry expertise.

1 2 Expand Your Security Operations Capabilities Companies require expanded security operations capabilities to respond to the demands of increasingly complex cloud service delivery models: Ninety-two percent of IT pros value the capability to quickly identify and remedy attacks, thus limiting their downtime and threat exposure. Ninety-one percent value 24x7 threat intelligence and monitoring and analysis to continuously protect and respond to attacks. Eighty-seven percent want an SOC with the capability to implement and manage security policies and controls in response to evolving threats.

IT Professionals Value Expertise From Security Partners IT professionals value a SOC that provides them with access to security experts to augment their internal security capabilities. They are interested in working with a security expert for a variety of reasons, including threat intelligence analysis (83%), public cloud security (80%), security operations (77%), network security (76%), and data privacy and compliance (76%). As a result of partnering with a security expert, companies recognize a range of valued benefits. Topping the list of benefits is greater security competency (47%). Seventy-nine percent consider access to external security experts as a valuable or very valuable component of their security operations.

Conclusions Increasing adoption of cloud and complex public, private, and hybrid cloud service delivery models presents opportunities and challenges for security teams. Companies recognize the need to adjust their security operations strategy in response, but building an in-house SOC with best-in-class expertise and capabilities is often difficult and cost prohibitive. The majority of IT professionals in this study reported that they are interested in working with a security expert to augment or outsource their security capabilities. A combination of internal and external capabilities enables companies to improve their security operations strategies. METHODOLOGY This Technology Adoption Profile was commissioned by Alert Logic. To create this profile, Forrester leveraged its existing research on cloud security infrastructure. Forrester Consulting supplemented this data with custom survey questions asked of US and UK IT decision-makers responsible for cloud security infrastructure. The auxiliary custom survey began and was completed in May 2016. For more information on Forrester s data panel and Tech Industry Consulting services, visit forrester.com ABOUT FORRESTER CONSULTING Forrester Consulting provides independent and objective research-based consulting to help leaders succeed in their organizations. Ranging in scope from a short strategy session to custom projects, Forrester s Consulting services connect you directly with research analysts who apply expert insight to your specific business challenges. For more information, visit forrester.com/consulting. 2016, Forrester Research, Inc. All rights reserved. Unauthorized reproduction is strictly prohibited. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change. Forrester, Technographics, Forrester Wave, RoleView, TechRadar, and Total Economic Impact are trademarks of Forrester Research, Inc. All other trademarks are the property of their respective companies. For additional information, go to forrester.com. [1-ZW6QGF] Project Director: Andia Vokshi Market Impact Consultant Contributing Research: Forrester s Security & Risk research group