Wick Hill Group, River Court, Albert Drive, Woking, Surrey, GU21 5RP

Similar documents
Improving digital infrastructure for a better connected Thailand

Third Annual Green IT & Sustainability Survey: U.S. Results and Services Implications

CISCO IP PHONE 7970G NEW! CISCO IP PHONE 7905G AND 7912G XML

END-OF-SALE AND END-OF-LIFE ANNOUNCEMENT FOR THE CISCO MEDIA CONVERGENCE SERVER 7845H-2400

Customers want to transform their datacenter 80% 28% global IT budgets spent on maintenance. time spent on administrative tasks

Allianz SE Reinsurance Branch Asia Pacific Systems Requirements & Developments. Dr. Lutz Füllgraf

Server Virtualisation Assessment. Service Overview

E-Seminar. Voice over IP. Internet Technical Solution Seminar

Strategic IT Plan Improves NYCHA Resident Services While Reducing Costs US$150 Million

Traffic Offload. Cisco 7200/Cisco 7500 APPLICATION NOTE

Digital EAGLEs. Outlook and perspectives

Cisco CallManager 4.0-PBX Interoperability: Lucent/Avaya Definity G3 MV1.3 PBX using 6608-T1 PRI NI2 with MGCP

Technology Lifecycle Management Assessment. Know your network - achieve business agility

EventBuilder.com. International Audio Conferencing Access Guide. This guide contains: :: International Toll-Free Access Dialing Instructions

Cisco Aironet In-Building Wireless Solutions International Power Compliance Chart

THE CISCO SUCCESS BUILDER PROGRAM THE CISCO SMALL OFFICE COMMUNICATIONS CENTER: AFFORDABLE, PROVEN COMMUNICATIONS SOLUTIONS FOR SMALL ORGANIZATIONS

IP Communications for Small Offices Using Cisco CallManager Express and Cisco Unity Express

Cisco Voice Services Provisioning Tool 2.6(1)

Insights for Clubs

Software-defined Networking Development Model

THE POWER OF A STRONG PARTNERSHIP.

Cisco Extensible Provisioning and Operations Manager 4.5

ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL STUB ROUTER FUNCTIONALITY

Hybrid Wide-Area Network Application-centric, agile and end-to-end

E-Seminar. Wireless LAN. Internet Technical Solution Seminar

Global Entertainment & Media Outlook.

Purchasing. Operations 3% Marketing 3% HR. Production 1%

Digital Opportunity Index. Michael Minges Telecommunications Management Group, Inc.

Conducted by Vanson Bourne Research

Alternative phone number: Credit card/debit card number Expiry date: / / DD MM YYYY

Second International Barometer of Security in SMBs

NEW JERSEY S HIGHER EDUCATION NETWORK (NJEDGE.NET), AN IP-VPN CASE STUDY

Innovative Fastening Technologies

Cisco AVVID The Architecture for E-Business

Managed Network Services. Managing your network to enable your digital business

Cisco Optimization Services

Overcoming the Compliance Challenges of VAT Remittance. 12 April :55 to 16:30 (CEST)

iclass SE multiclass SE 125kHz, 13.56MHz 125kHz, 13.56MHz

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR ITALY

Introduction to the Export Services Branch Programmes and Services Ministry of International Trade

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR AMERICAS

CISCO FAX SERVER. Figure 1. Example Deployment Scenario. The Cisco Fax Server solution consists of the following components:

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR APJ

Digital Context Pacific Alliance

Transforming networks and services for communications service providers

High-Availability Solutions for SIP Enabled Voice-over-IP Networks

STANDARD BROADBAND & FIBRE BROADBAND PLANS

EMC GLOBAL DATA PROTECTION INDEX STUDY KEY RESULTS & FINDINGS FOR THE USA

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR UAE

NEW METHOD FOR ORDERING CISCO 1700 SERIES MODULAR ACCESS ROUTERS AND CISCO 1800 SERIES INTEGRATED SERVICES ROUTERS SOFTWARE SPARE IMAGES

DATA APPENDIX. Real Exchange Rate Movements and the Relative Price of Nontraded Goods Caroline M. Betts and Timothy J. Kehoe

The Role of SANAS in Support of South African Regulatory Objectives. Mr. Mpho Phaloane South African National Accreditation System

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR BRAZIL

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR AUSTRALIA

Cisco ONS SDH 12-Port STM-1 Electrical Interface Card

Access Code and Phone Number

USING TREND SERVERPROTECT5 WITH CISCO CALLMANAGER

Instructions. (For 6180 Industrial Computers) Applications. Overview & Safety

How to measure the real ROI of virtualisation

EE Pay Monthly Add-Ons & Commitment Packs. Version

Cisco Systems Intelligent Storage Networking

Dataliner Message Displays Using DL50 Slaves with a DL40 Master

MANUAL VOICE/DATA SIMCARD CANADA

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR HONG KONG

Cisco CallManager Server Upgrade Program

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDIA


Cisco 2651XM Gateway - PBX Interoperability: Avaya Definity G3 PBX using Analog FXO Interfaces to an H.323 Gateway

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDONESIA

Global entertainment and media outlook Explore the content and tools

Spoka Meet Audio Calls Rates Dial-In UK

CONFIGURING EPOLICY ORCHESTRATOR 3.0 AND MCAFEE 8.0i WITH CISCO CALLMANAGER

NEW CISCO IOS SOFTWARE RELEASE 12.2(25)EY FOR CISCO CATALYST 3750 METRO SERIES SWITCHES

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Cisco 3745 Gateway - PBX Interoperability: Avaya Definity G3 PBX using Q.931 PRI Network Side Interfaces to an H.323 Gateway

Microsoft Dynamics 365 for Finance and Operations. Table of contents

CiscoWorks Security Information Management Solution 3.1

Using TAPS with +E.164 Directory Numbers

Instructions. (For 6180 Industrial Computers) Installing a Processor Upgrade

Microsoft Dynamics 365 for Finance and Operations, Enterprise edition. Table of contents

For: Ministry of Education From Date: 19 November 18-2 December 18 Venue: M1 Shops

ANNOUNCING NEW PRODUCT OFFERINGS FOR THE CISCO CATALYST 6500 SERIES

OPERATIONS MANUAL Audio Conferencing

CISCO 7304 SERIES ROUTER PORT ADAPTER CARRIER CARD

NETWORK ADMISSION CONTROL

State of Cloud Survey GERMANY FINDINGS

VOICE/DATA SIMCARD USA UNLIMITED

CISCO NETWORK CONNECTIVITY CENTER BUSINESS DASHBOARD

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR TURKEY

Cisco Unified CallManager Licensing Pricing Model

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR MEXICO

GW-WN150M 11b/g/n USB Wireless User Manual

STANDARD BROADBAND & FIBRE BROADBAND PLANS

END-OF-SALE AND END-OF-LIFE ANNOUNCEMENT FOR THE CISCO FLEXWAN MODULE FOR USE WITH THE CISCO 7600 SERIES ROUTERS AND CATALYST 6500 SERIES SWITCHES

EMC GLOBAL DATA PROTECTION INDEX STUDY KEY FINDINGS & RESULTS FOR THE NETHERLANDS

Deloitte Global Mobile Consumer Survey India data, 2015

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR SOUTH AFRICA

Step 1: New Portal User User ID Created Using IdentityIQ (IIQ)

Kaspersky for Business. On the Money: Growing IT Security Budgets to Protect Digital Transformation Initiatives. Kaspersky Lab

MULTI-VRF AND IP MULTICAST

Transcription:

2009, 2014 & 2015- Winner Finalist 2010, 2011, 2013 & 2016 2007, 2008, 2009, 2010 & 2015 WINNER 2007, 2008, 2009, 2010 2011, 2013, 2014, 2015 & 2016 2010, 2011, 2012, 2013, 2014 & 2015 Wick Hill Group, River Court, Albert Drive, Woking, Surrey, GU21 5RP 01483 227600 www.wickhill.com info@wickhill.com

SECURITY OF VIRTUAL INFRASTRUCTURE IT SECURITY RISKS SPECIAL REPORT SERIES Kaspersky Lab

2 Corporate IT Security Risks survey details: More than 5500 companies in 25+ countries around the world Top managers and IT pros answered questions about security, IT threats and infrastructure What we have found: x2: Businesses pay twice as much to recover from a security breach if virtual infrastructure was involved oo Average direct cost of recovery for SMBs is close to $60,000 per incident Enterprises Expected Total Impact (when virtualisation is involved) SMB Expected Total Impact (without virtualisation) oo Enterprises spend more than $800,000 on recovery. Enterprise Expected Total Impact (when virtualisation is involved) Enterprise Expected Total Impact (without virtualisation) 3 reasons for a cost increase: oo Security complexity: only 56% of companies are fully prepared to deal with security risks in a virtual environment oo Need to improve understanding of risks specific to virtual environments: just 52% of company representatives feel they fully understand the risks. oo 26553 405583 Expected Damages Extensive use of virtual infrastructure for mission-critical operations. 62% of businesses use virtualisation in some form Top 3 virtualisation platforms in use: VMWare (40%), Microsoft (36%) and Citrix (9%) 59517 7082 Expected Damages 823451 48902 Expected Reactive Costs 0 10000 20000 30000 40000 50000 60000 70000 80000 Expected Reactive Costs 0 100000 200000 300000 400000 500000 600000 700000 800000 900000 1000000 VMware (e.g. vsphere) Microsoft Hyper-V XenServer Others 13528 118465 40% 36% 9% 15% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 9% of businesses use open-source virtualization platforms: Xen (6%) and KVM (3%) 42% of businesses still think that virtual environments are safer than physical ones. Few companies are using specialised security solutions for virtual environments: o 73% of businesses are not using specialised IT security solutions o The adoption of agentless (35%) and light-agent approaches (13%) is significantly lower.

3 KEY FINDING: VIRTUAL INFRASTRUCTURE DOUBLES THE COST OF A SECURITY BREACH The most interesting result that was discovered during this survey is the comparison of financial losses reported by companies. If virtual infrastructure is affected, businesses have to pay a significant premium to recover from a security breach. For large companies (1500+ seats) the average cost of a security incident is more than $800K. If we include indirect expenses, such as staff training to mitigate future risks after the attack, the total cost comes close to one million USD. 1000000 900000 800000 700000 600000 500000 400000 300000 200000 100000 0 Expected Damages 48902 405583 Enterprise Expected Total Impact (without virtualisation) Expected Reactive Costs 118465 823451 Enterprise Expected Total Impact (when virtualisation is involved) Overall financial losses due to data breaches for enterprises in US dollars SMBs reported an average damage of more than $26,000 for an attack on their physical infrastructure. The involvement of virtual infrastructure in a security breach however, brings the cost closer to $60,000 (not including reactive spend). 80000 70000 60000 50000 40000 30000 20000 10000 0 Expected Damages 7082 26553 SMB Expected Total Impact (without virtualisation) Expected Reactive Costs 13528 59517 SMB Expected Total Impact (when virtualisation is involved) Overall financial losses due to data breaches for small and medium businesses in US dollars

4 What could be the reason for this extra spend on recovery? Although we see clearly that IT security in the virtual environment is complicated topic for many businesses (more on that below), the main reason is that virtual infrastructure is more frequently used for missioncritical operations and/or to store highly sensitive data. The following breakdown of the consequences of a security breach involving/not involving virtual infrastructure provides proof: Affects physical infrastructure Affects virtual infrastructure Loss of contracts / business opportunities 21% 43% Loss of credibility / damage to company reputation 23% 48% Damage to credit rating 15% 39% Increased insurance premiums 18% 42% Temporary loss of ability to trade 22% 47% Temporary loss of access to business critical information 36% 66% 0% 10% 20% 30% 40% 50% 60% 70% Breakdown of the consequences of a security breach that affects virtual infrastructure (blue) and only physical infrastructure (red). Indicates the percentage of businesses reporting a certain type of a consequence of an attack. An attack on a company s virtual infrastructure is much more likely to result in the temporary loss of important data, an inability to operate core services and damage to reputation. We have also observed that businesses recovering from an attack on virtual infrastructure spend more on both IT consultants, and lawyers: Risk management consultants Affects physical infrastructure 33% Affects virtual infrastructure 58% PR/corporate image consultants 15% 38% Management consultants 23% 51% Physical security consultants 27% 48% IT security consultants 64% 79% Auditors/accountants 26% 49% Lawyers/solicitors 22% 56% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% Breakdown of recovery measures from a security breach that affects virtual infrastructure (blue) and only physical infrastructure (red). Indicates the percentage of businesses reporting a certain type of an expenses required to recover from an attack.

5 A significant increase of expenses on lawyers and IT security consultants at the same time indicates that accidents involving virtual infrastructure are more likely to be revealed to the public, clients and partners. SPECIFICS OF VIRTUAL INFRASTRUCTURE Going virtual is not a trend anymore, but a business practice. 62% of respondents claimed that their company is using virtualisation in some form. Virtualized servers 53% Storage arrays / SANs 30% Virtual desktops (VDI) 28% Any virtual infrastructure 62% 0% 10% 20% 30% 40% 50% 60% 70% Adoption of different types of virtualized infrastructure and the overall share of businesses using any type of virtual infrastructure. As a company grows, the need for virtual infrastructure increases. Among companies with over 1500 employees 77% of organizations have virtual infrastructure implemented in some form. KVM-based commercial platform (like RHEV), 6% KVM-based open source platform (like ovirt), 3% Xen, 6% XenServer, 9% VMware (e.g. vsphere), 40% Microsoft Hyper-V, 36%

6 IT SECURITY R According to virtualisation specialists (experts in the virtualisation solutions used in business), the most popular hypervisor platforms are VMware and Microsoft, however KVM is gaining traction. In the corporate wish list for virtual infrastructure, KVM (commercial implementation or open-source) is one of the most desired platforms. XenServer 17% Microsoft Hyper-V 16% KVM-based commercial platform (like RHEV) KVM-based open source platform (like overt) 14% 15% Vmware (e.g. vsphere) 13% Xen 12% 0% 2% 4% 6% 8% 10% 12% 14% 16% 18% virtualisation platforms companies are likely to adopt in the next two years Virtualisation platforms provided by Microsoft and VMware are being used by more than two thirds of respondents. Microsoft s Hyper-V is also number two in the list of platforms companies are likely to choose in the near future. And judging by this data, KVM looks to be the most promising competitor for current market leaders, especially if both commercial and freely available open-source versions of the platform are taken into account. The protection of physical endpoints and servers provides companies with a choice of a security software vendor, but before protecting virtual desktop or server a company has to choose an approach first. There are three major security approaches for virtualised environments: Agent-based: a security agent is installed on every virtual machine (this involves many security features and is a bit hungry on resources) Agentless: a separate virtual machine on a physical server protects all other virtual machines via a special virtualisation platform interface (this is light on resources, but offers limited functionality and platform support) Light agent: a best of both worlds approach (a better feature-set than agentless, whilst still having a low impact on performance) Read more on the different virtual security approaches here. The research shows that not many companies are actually aware of the difference between these approaches. In fact, only 27% of businesses admitted the deployment of a security solution, specifically designed for virtual environments.

7 Not Using Specialised Security Solution And Not Aware Of The Difference Not Using Specialised Solution But Aware Of The Difference Use anti-virus that is designed to be used in virtualised environments only Overall 34% 39% 27% Server virtualisation 32% 40% 28% Virtual Desktops 44% 34% 22% Of the companies that use specialised solutions, the majority are still employing agent-based software that affects consolidation ratio and reduces benefits of virtualisation employment. 100% 0% 20% 40% 60% 80% 100% 4% 4% 6% 90% 13% 15% Agent-based anti-malware for virtual endpoints 80% 70% 60% 35% 26% 47% Agent-less anti-malware for virtual endpoints 50% 40% Light agent anti-malware for virtual endpoints 30% 20% 10% 48% 55% 47% Other/ Not Sure 0% Overall Server virtualisation VDI

8 Even more companies are not using virtualisation-aware solutions at all. Of those, 31% did not experience any problems with a traditional security solution. 35% 30% 25% 20% 15% 27% 31% 10% 5% 11% 12% 17% 0% 1% Virtualisation-aware solutions lack some functionality that a traditional solution has Would like to invest in a specially-designed solution, but cannot afford it Not convinced that specially-designed solutions make much difference Evaluating / planning to implement a solution designed for virtualised environments The problems experienced with "traditional" products in virtualised environments are small and do not require investment in a different solution Did not experience any problems with a "traditional" anti-virus product Indeed, in most cases traditional security suites do work in virtual environments. However, what is regarded as a small performance penalty on a physical endpoint, may significantly reduce cost benefits when deployed on multiple virtual machines. This adds to the fact that an attack on virtual infrastructure costs twice as much as those involving only physical endpoints and servers. The conclusion is: IT threats are a significant factor that influences the total cost of ownership (TCO) of a virtual infrastructure. A security breach or even making the wrong choice in security approach may nullify the expected cost benefits of going virtual. Only 53% of businesses said that they are concerned about securing their virtualized environments, and only a half say that they have a detailed understanding of the security risks affecting the hypervisor platform that they use. At the same time, 56% of respondents think that they are fully prepared to mitigate and deal with the associated threats but that may be a misguided impression. The security risks in virtual environments are significantly lower than in 'physical' environments 42% We struggle to manage the security solutions that are installed in each of our virtual environments 45% I have a detailed understanding of the security risks affecting the hyper visor platform that we currently use In general, I am highly concerned about the security of virtualised environments 52% 53% We are fully prepared to mitigate and deal with the security risks to our virtualised infrastructure 56% 0% 10% 20% 30% 40% 50% 60% The root of many problems with virtual environment protection comes from the old misconception that risks in these environments are significantly lower than in physical environments. 42% of respondents still believe in that.

9 CONCLUSION As we have observed during our survey, businesses are excited to adopt virtual infrastructure. But the industry s understanding of this technology, especially virtual-specific security issues, is far from perfect. Virtual environments are trusted more than physical servers, and nothing can be trusted in a grim security environment. This leads to higher recovery costs and inefficient security approaches being deployed. In turn, poor decisions affect ROI and may lead to disappointment in virtualisation in the future, an attitude virtual infrastructure does not deserve. Corporate IT Security Risks survey details In 2015 Kaspersky Lab together with B2B International questioned 5,564 IT specialists representing companies of all sizes from 35 countries: small and very small businesses (up to 250 employees) - 3465, medium businesses (251-1499 employees) - 1074 and enterprises (over 1500 employees) 1025. However, most of the questions presented in this report were relevant only to virtualisation technology users (62%). The survey was conducted in 35 countries: Brazil, China, France, Germany, India, Italy, Japan, Russia, Spain, United Kingdom, United States, Mexico, Saudi Arabia, South Africa, Turkey, United Arab Emirates (UAE), Australia, Canada, Indonesia, Malaysia, Singapore, Chile, Colombia, Czech Republic, Greece, Hungary, Kazakhstan, Peru, Denmark, Sweden, Thailand, Vietnam, Netherlands, Belgium and Israel. Wick Hill Ltd River Court Albert Drive Woking Surrey GU21 5RP Tel: Fax: 01483 227600 01483 227700