CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE

Similar documents
Total Cost of Ownership: Benefits of the OpenText Cloud

Making the case for SD-WAN

Partner with an MSSP or Grow an In-House Security Team: What s Right For Your Business?

Total Cost of Ownership: Benefits of ECM in the OpenText Cloud

New Threats, New Mindset: Being Risk Ready in a World of Complex Attacks. How to Address Incident Response Challenges

Kaspersky Security for Small and Medium Business

A Ready Business rises above infrastructure limitations. Vodacom Power to you

Kaspersky for Business. On the Money: Growing IT Security Budgets to Protect Digital Transformation Initiatives. Kaspersky Lab

KEDAYAM A KAAPAGAM MANAGED SECURITY SERVICES. Kaapagam Technologies Sdn. Bhd. ( T)

BUSTED! 5 COMMON MYTHS OF MODERN INFRASTRUCTURE. These Common Misconceptions Could Be Holding You Back

WHITEPAPER MOVING TO A NEW BUSINESS PHONE SYSTEM

Moving to a New Business Phone System

THALES DATA THREAT REPORT

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

DDoS MITIGATION BEST PRACTICES

Managed IT Services Eliminating technology pains for SMBs

THALES DATA THREAT REPORT

Perfect Balance of Public and Private Cloud

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Security Automation Best Practices

Go Cloud. VMware vcloud Datacenter Services by BIOS

Sage Data Security Services Directory

5 Reasons to Choose Parallels RAS Over Citrix Solutions

SECURITY OPERATIONS CENTER BUY BUILD BUY. vs. Which Solution is Right for You?

3 Ways Businesses Use Network Virtualization. A Faster Path to Improved Security, Automated IT, and App Continuity

Why Enterprises Need to Optimize Their Data Centers

Overcoming IT Challenges in the Education Segment Leveraging Cloud and On-Premise Resources for Maximum Impact

ENABLING SECURE CLOUD CONNECTIVITY. Create a Successful Cloud Strategy with Reliable Connectivity Solutions

IT Security: Managing a New Reality

Enabling Innovation in the Digital Economy

White Paper: Backup vs. Business Continuity. Backup vs. Business Continuity: Using RTO to Better Plan for Your Business

Simplified. Software-Defined Storage INSIDE SSS

THE STATE OF CLOUD & DATA PROTECTION 2018

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

Mastering The Endpoint

Cloud Video Conferencing. A comprehensive guide

Cloud Video Conferencing. A Comprehensive Guide

SECURITY AUTOMATION BEST PRACTICES. A Guide on Making Your Security Team Successful with Automation SECURITY AUTOMATION BEST PRACTICES - 1

The Value Of NEONet Cybersecurity. Why You Need To Protect Your The Value Of NEOnet Cybersecurity. Private Student Data In Ohio

Five Reasons It s Time For Secure Single Sign-On

Securing Digital Transformation

Resolving Security s Biggest Productivity Killer

Cloud Computing: Making the Right Choice for Your Organization

Web Designer vs Web Developer What s the Difference?

Evolve Your Security Operations Strategy To Account For Cloud

BYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled

Professional Services for Cloud Management Solutions

Backup vs. Business Continuity

CommScope Multi-Tenant Data Center Solutions: A solid advantage from the critical infrastructure experts. Data Center Solutions

Consolidating to a Best of Breed Security System

Backup vs. Business Continuity: Using RTO to Better Plan for Your Business

BRING EXPERT TRAINING TO YOUR WORKPLACE.

WHITEPAPER SWITCHING TO HOSTED VOICE

SECURITY AUTOMATION BEST PRACTICES. A Guide to Making Your Security Team Successful with Automation

The Case for Virtualizing Your Oracle Database Deployment

Kaspersky Security. The Power to Protect Your Organization

I D C T E C H N O L O G Y S P O T L I G H T

KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY. Perspectives from U.S. and Japanese IT Professionals

Understanding Managed Services

MEASURING THE BUSINESS VALUE OF HORIZON CLOUD WITH HOSTED INFRASTRUCTURE WHITE PAPER EFFECTIVE FEBRUARY 2017

The security challenge in a mobile world

CyberEdge Group 2018 Cyberthreat Defense Report

2013 Cloud Computing Outlook: Private Cloud Expected to Grow at Twice the Rate of Public Cloud

Abstract. The Challenges. ESG Lab Review Lumeta Spectre: Cyber Situational Awareness

Financial Services Solutions

The Importance of Data Protection

Introduction. Read on and learn some facts about backup and recovery that could protect your small business.

SECOND ANNUAL. Small & Medium Business Trends Report Research insights from nearly 500 business owners and leaders

Pedal to the Metal: Mitigating New Threats Faster with Rapid Intel and Automation

Services solutions for Managed Service Providers (MSPs)

HOW MIDSIZE ORGANIZATIONS CAN MEET COMPLIANCE REQUIREMENTS AND ENHANCE CYBERSECURITY WITH MICRO-SEGMENTATION WHITE PAPER FEBRUARY 2018

SDI, Containers and DevOps - Cloud Adoption Trends Driving IT Transformation

Security in India: Enabling a New Connected Era

A guide for assembling your Jira Data Center team

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity

State of Cloud Survey GERMANY FINDINGS

HOW TO ENABLE AFFORDABLE ENTERPRISE VIDEO FOR EVERYONE

How unified backup and cloud enable your digital transformation success

product overview CRASH

Get your business Skype d up. Lessons learned from Skype for Business adoption

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Digital Marketing Manager, Marketing Manager, Agency Owner. Bachelors in Marketing, Advertising, Communications, or equivalent experience

Security-as-a-Service: The Future of Security Management

Hybrid IT for SMBs. HPE addressing SMB and channel partner Hybrid IT demands ANALYST ANURAG AGRAWAL REPORT : HPE. October 2018

THE IMPACT OF SECURITY ON APPLICATION DEVELOPMENT. August prevoty.com. August 2015

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

2018 MANAGED SECURITY SERVICE PROVIDER (MSSP): BENCHMARK SURVEY Insights That Inform Decision-Making for Retail Industry Outsourcing

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE

THE ULTIMATE GUIDE TO VIDEO CONFERENCING TECHNOLOGY

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Choosing the Right Container Infrastructure for Your Organization

Sensitive Data Loss is NOT Inevitable

Integrated Access Management Solutions. Access Televentures

From Reactive to Proactive: How to Avoid Alert Fatigue

Virtualization. Q&A with an industry leader. Virtualization is rapidly becoming a fact of life for agency executives,

Information Technology

7 Business Benefits of Moving from an On-Premise PBX to a Cloud Phone System

Why is Office 365 the right choice?

Transcription:

CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE Business has always looked to squeeze the maximum possible benefit out of IT resources at the lowest possible cost but measuring return on investment isn t so easy.

2 EXECUTIVE SUMMARY EXECUTIVE SUMMARY When a breach occurs, every second counts and costs. But few companies have a handle on the ROI for their cybersecurity efforts. How can you find the value? What if weighing up the different payoffs could help your organization focus on the cyber security solutions that best fit and, in the process, derive the best possible bang for their buck? The cyber security solution you implement impacts ROI: Classic/traditional: mostly on-premises, supported by large admin teams in larger businesses. Cloud solution: managed via cloudbased console and tools, with no additional hardware. Outsourced: where an external third party service provider a Managed Service Provider (MSP) takes care of everything. Each brings its own benefits and budgetary impacts but for companies with limited inhouse resources or that prefer to outsource to a third party for management cloud-based cybersecurity represents the best value, form both an ease of management and cost-efficiency perspective.

3 WHEN LESS HAS MORE WHEN LESS HAS TO DELIVER MORE Do more with less has become a business mantra over the past few years, but it s nothing new to IT professionals. Business has always looked to squeeze the maximum possible benefit out of IT resources at the lowest possible cost the real challenge for IT pros today is keeping pace with complexity in the face of limited resources. And when it comes to cyber security, businesses of all sizes are struggling to keep up with constantly evolving threats while maintaining control over an ever-expanding range of hardware, devices, applications and end-users. Back in 2013, PriceWaterhouseCooper reported a decline in hiring cyber security staff; at the time, Kaspersky Lab research found 58% of companies admitting their IT security was under-resourced in at least one area of staff, systems or knowledge. Fast forward to Q4 2016, and businesses are talking about a cyber skills shortage and expanding their budgets to meet it. But this isn t just a skills story: 40% of companies today point to increased infrastructure complexity as a key driver of cyber security budgets. Interestingly, no one seems to have a handle on what the return on investment for their cybersecurity efforts is: 62% of large companies and 59% of SMBs says they ll continue to invest regardless of their ability to measure return. So how can companies break down the return on cyber security investment? What if weighing up the different payoffs could help your organization focus on the cyber security solutions that best fit and, in the process, derive the best possible bang for their buck?

4 THE NUTS AND BOLTS OF CYBER SECURITY THE NUTS AND BOLTS OF CYBER SECURITY Managing cyber security costs and finding the returns on investment - ultimately breaks down to three key, intertwined areas: CAPEX, OPEX and Human Resources. In plain speech, that s how much kit you need, how much it s going to cost you to manage it and where you re going to find the people to oversee both. LET S START WITH CAPEX: If you re a CISO or cyber security manager, you ll be pleased to know that budgets are increasing, with the approval of senior management: 38% of large businesses and 33% of SMBs say top management is asking them to ramp up cyber security investment. are higher. One downside of increased cyber security investment can be complexity more hardware, more devices, more applications all needing to be integrated, managed, monitored. It s a fact that, for every 25 per cent increase in functionality, there s a 100 per cent increase in complexity. Fifty-five per cent of SMBs point to the growing volume of devices they need to secure as a key challenge. Who s going to manage all this stuff? That brings us to OPEX and HR both essentially about skills The other side of this coin, of course, is that expectations in terms of what can be delivered Title Sub-title sentence VSB SMB Enterprise 30% 20% 10% 0% $1.1k-10k $11k-25k $26k-100k $101k-250k $251k-500k $501k-1m $1.1m-5m $5.1m-50m $51m+ Percentages of businesses whose IT security budget lies in each range.

5 THE HUMAN FACTOR - COUNTING THE COST OF A CYBERSECURITY SKILLS SHORTAGE THE HUMAN FACTOR COUNTING THE COST OF A CYBERSECURITY SKILLS SHORTAGE Despite more than half (54%) of SMBs believing their IT security will be compromised at some point and understanding that preparation plays a critical role in prevention and detection 40% say they lack sufficient insight or intelligence on the threats faced by their business. When you consider that the average SMB s IT team of 16 has only two security experts, it s easy to understand why human resources are playing at least as important a role in cyber security planning as any technology or infrastructure concerns. No wonder more than a third of businesses worldwide see improving specialist security expertise as one of the top three drivers of cyber security investment, with half saying there s a talent shortage. The most worrying thing of all? Research shows a clear line between availability of talent and the cost of recovering from a breach: enterprises struggling to find the best security talent spend an average three times more recovering from a breach; a significant amount of recovery costs for SMBs comes in the form of increased staff wages (an average $14k). The adage that time is money could have been written for cyber security; when a breach occurs, every second counts and costs. A breach detected almost instantly costs the average SMB $28k, rising to $105k if undetected for more than a week. In actual data terms, an average of 417 records are compromised, even with instant detection. This rises to more than 70,000 when undetected for over a week. Bottom line: Human resources are as important as technology resources in fighting cyber threats. It s how you find the right balance for your business that counts. Title Sub-title sentence Time is money Sub-title sentence $104,730 Over a week $78,914 Several days $72,806 Within a day $61,952 Within a few hours Observe the growth of wages Experience the talent shortage Need more specialists $27,542 Almost instant

6 HORSES FOR COURSES: HOW THE CYBER SECURITY SOLUTION YOU IMPLEMENT IMPACTS ROI HORSES FOR COURSES: HOW THE CYBER SECURITY SOLUTION YOU IMPLEMENT IMPACTS ROI Business cyber security comes in three main flavours: Classic/traditional Mostly on-premises, supported by large admin teams in larger businesses. Cloud solution Managed via cloudbased console and tools, with no additional hardware. Outsourced Where an external third party service provider a Managed Service Provider (MSP) takes care of everything. Companies that opt to use different vendors for different components of their security also introduce the twin problems of complexity and integration again, areas that place additional demands on in-house skills. Organizations that use traditional cyber security approaches can reduce costs by opting for solutions that offer centralized consoles, enhanced systems management and automation capabilities and the ability to secure and control disparate devices. You ll be reducing time spent on dayto-day tasks for admin staff but ultimately still need to ensure you have the required skills in place to keep everything running properly. Each brings its own benefits and budgetary impacts. TYPICAL COSTS ($)* ANNUAL COSTS ($) Approximate costs for a company with two offices and 100 endpoints in total Offices connected via a network TRADITIONAL, ON PREMISE SECURITY: The classic approach is the original do-it-yourself cyber security program. In-house teams of technology, financial and business decision makers choose the solution (or solutions) that best fits company needs, including the hardware resources to support it, and manage everything in-house themselves. On the plus side, having everything in house gives maximum control over security the down side is that you need to have the in-house skills and resources to exploit that benefit. Admin resources for IT security: $4000 a month Hardware: at least $3000 Cybersecurity software: 4614(around $4800) for a one-year license In-house skills training: $1500 a year TOTAL ANNUAL COSTS TOTAL ONE-OFF COSTS 48,000 one-off costs 4,800 1,500 54,300 3,000 *Costs are approximate and for information only. Costs for specific business situations may vary from these.

7 HORSES FOR COURSES: HOW THE CYBER SECURITY SOLUTION YOU IMPLEMENT IMPACTS ROI CLOUD BASED SECURITY: With almost two thirds of SMBs already using an average of three cloud solutions, it s not surprising that Cloud-based security is one of the fastest-growing options available. The low cost of entry, ease of management and flexible licensing options are well suited to SMBs looking to scale on demand in any direction. Because everything is centralized, administrators of cloud-based security solutions can monitor the security status of up to 1000 corporate network nodes from any chosen online device, from any location. Reporting and license tracking are easily managed via a simple, intuitive interface. You get the best security while getting the best out of your current staff. What makes cloud-based security particularly appealing on the budget front is that it s very quick to rollout, even easier to manage and requires no additional hardware investment. Because all the necessary infrastructure is hosted by the vendor in the cloud, there s no need for customers to buy or maintain a server (or a license for it) for their management console. This allows smaller businesses to use leading-edge security solutions without having to hire additional skilled staff or high-end hardware to manage it. For SMBs struggling to grow the expertise to protect themselves from increasingly sophisticated threats, this is a real win-win scenario. TYPICAL COSTS ($)* Approximate costs for a company with two offices and 100 endpoints in total No need to connect offices via network Admin resources: $2000 a month License fee: 200 (around $208) a month ANNUAL COSTS ($) 24,000 2,500 A key reason for this is that the cloud-based console enables the management of multiple endpoints, mobile devices and file servers remotely, from anywhere. They re usually ready to run and highly intuitive meaning IT admins without specialized security skills can easily use high-end security features. Default security policies developed by skilled cyber security analysts bring ready-made intelligence and best practices in-house without having to make new hires or train existing employees to use the new cloud console. Everything s intuitive and ready to run. Basic in-house skills required: $7000 a year TOTAL ANNUAL COSTS TOTAL ONE-OFF COSTS 7,000 54,300 3,000 *Costs are approximate and for information only. Costs for specific business situations may vary from these.

8 HORSES FOR COURSES: HOW THE CYBER SECURITY SOLUTION YOU IMPLEMENT IMPACTS ROIITY OUTSOURCING TO A MANAGED SECURITY SERVICE PROVIDER This option takes cloud-based security a little further instead of someone in-house operating the cloud-based controls, a business can outsource management to an expert third party that doesn t need to be on-site to be in control. You get all the advantages of a leading security solution without putting a strain on budgets. No wonder 40% of SMBs and 26% of very small businesses say they think MSPs could be the answer to their security needs. Almost a quarter of SMBs plan on adopting this approach to security in the next 12 months. TYPICAL COSTS ($)* Approximate costs for a company with two offices and 100 endpoints in total No need to connect offices via network, but should be within reasonable distance of MSP partner. All IT: $3000 a month No in-house skills required ANNUAL COSTS ($) 36,000 0 The real benefit of outsourcing to an MSP for security is that businesses of any size gain access to the best security talent without having to invest in it or gain expertize to manage it themselves. SMBs could implement enterprise-grade options without needing a budget to match. And because the MSP has the in-house expertise, you can save on paying for up-to-the-minute security and threat intelligence and trying to interpret it. As with cloud-based solutions, the MSP option has a great element of flexibility because the software vendor is running the infrastructure, it s usually very easy for the MSP to accommodate seasonal flexibility or other scaling requirements. This can save a lot of headaches with licensing and subscription budgeting and management. TOTAL ANNUAL COSTS TOTAL ONE-OFF COSTS 54,300 3,000 *Costs are approximate and for information only. Costs for specific business situations may vary from these.

9 THINK DIFFERENTLY, MAXIMISE VALUE THINK DIFFERENTLY, MAXIMIZE VALUE Complexity undermines security, efficiency and growth. It creates room for error and limits your ability to manage change. IT professionals are all too aware of the challenges. But what can you do to mitigate them without restricting end user needs or over-burdening already strained resources? By exploring cyber security options you may not have previously considered such as cloud-based or MSP, you could enhance the return on investment you get from security. Free up IT admin time and reduce the need for in-house expertise or new hardware with cloud-based or outsourced security. Or stay traditional with an on-premise solution but one that offers centralized controls and the kind of advanced systems management features that help you get the best out of human and infrastructure resources. Being prepared before something goes wrong has always been the best plan if you can t find or can t afford additional talent, maximising the ability of existing staff by taking the complexity out of their jobs is a good idea. If you can t do that why not outsource altogether? It all depends on where you re looking to maximize value. But thanks to the choices offered by Kaspersky Lab, when it comes to effective cyber security, your company doesn t have to run just to stand still.

10 THINK DIFFERENTLY, MAXIMISE VALUE READY TO CHOOSE YOUR CYBERSECURITY WEAPON? If you ve got a handle on the cybersecurity approach that best suits your business, it s time to put the theory to the test Are you an on-premise cybersecurity business? Download your free trial of Kaspersky Endpoint Security for Business <HERE> and find out how powerful, intuitive controls, encryption and advanced systems management features can protect your business from even the most advanced threats. Headed for the ease of use of the cloud? Sign up for your free trial of Kaspersky Endpoint Security Cloud <here> and see for yourself how you can reduce costs and resource overheads by managing multiple endpoints, devices and file servers remotely, from anywhere. Outsourcing to a third-party expert? Visit Kaspersky Lab s Managed Service Providers page <HERE> Kaspersky Lab global Website Kaspersky Lab B2B Blog