accelerate your ambition Chris Jenkins
Changing landscape of the Security Industry Chris Jenkins European GM Security Dimension Data
Business relationships Geographic footprint Revenue USD 700+m 1 NTT security company Client trust number #1 partner Cisco, Blue Coat, Checkpoint 31/32 > 550 skilled security resources Services-led with product pull-through Growth CAGR 5 years 31% Business outcomes
Today s business environment
Lower cost Improve agility and performance Reduce risk Improve experience for our customers Economically sustainable Increase competitiveness and grow revenue Compliance Keeping pace with the bad guys Managing complexity User demands/ mobility Aging Security platforms Existing Security not delivering
Transform Innovation Dis-intermediate Change Reputation Strategic Collaboration Disruption Cloud Intelligent Elastic networks Trust Bendable traffic Design Platform Data diplomacy Consolidation
The changing IT landscape From Corporate owned Email / Web Data centres Applications To BYOD Social media Cloud Mobile apps 79% Companies recorded a breach, 112% Growth in mobile malware 2013-2014 14% of organisations had malware enter the corporate network through social media/web apps 5-10 times more cloud services being used than are known by IT Outcome security controls need to change 92% of top 500 Android apps carry security/privacy risks
Incidents will happen How will you respond?
FY15 Security evolves
1 Incident prevention evolves to incident remediation From a no trust model to trust the ecosystem model Companies will conduct regular IT security fire drills, employees will become an extra layer of security protection Single panel management of Security platforms to identify, protect and remediate incidents
2 Managed security services move front and centre From adhoc vulnerability tests to proactive attack vector identification Reactive response to a 24/7 continuous monitoring and managed security environment MSS market will continue to consolidate as the client looks for a full lifecycle approach to security
3 Security gets cloudy From CAPEX to OPEX through to Utility models drive the need for new consumption models for security Commodity security controls have already moved to the cloud content security Security will follow the user, the application and the data this will drive security to the cloud
4 Clients drive the move to Security platforms 2015 From point products onsite to a virtualised hybrid (public / private cloud) model platform security controls move to software Provides scalability for controls security becomes part of everything a client does Market will consolidate BUT the startup market will become more active
5 Endpoint security back in vogue Moving from anti-virus and MDM to a workspace for Tomorrow a fully integrated trusted environment regardless of where the user and device are. Applications provide continuous security monitoring of the ecosystem
Delivering intelligence! 16 Security Operation Centres and 7 R&D centres 250,000 detection rules 1,300 security experts and researchers working globally 6,898 customers worldwide Security 150m attacks detected and defended each year 139,963 devices monitored, managed, secured 3.5 trn logs analysed annually
Global research and development capability Global threat intelligence report and threat intelligent feed Packaged together with RTA and managed MSSP service Sold together with IT outsourcing contracts as threat intelligence feeds
Christopher.Jenkins@dimensiondata.com END