52% 54% 63% 34% 31% 44% 44% 47% Find the Cloud Connection That Helps Secure Your Business Organizations moving mission-critical applications and data into the cloud need to make sure they have the right network connection to help keep their IT infrastructure and business assets secure. e availability and performance of your apps and the productivity of your people are critical to the success of your business and now more than ever it is dependent on the success of your cloud strategy… which is dependent on your network strategy… and your security strategy. Who is in the Cloud? is migration is expected to impact all areas of business and IT BUSINESS FUNCTION IT FUNCTION BACK-OFFICE IT APPS Percent moving some or significant processing to cloud in next 12-24 months Sales & Marketing Customer Service Business Analytics Web Presence Communications Disaster Recovery Transaction Processing Data Center Consolidation A Focus on Security is Imperative Protect sensitive data in an increasingly dangerous online world A Network Strategy Ties it All Together Find the right cloud connection for your business 2013 was the worst year to date for data breaches The Public Internet is a convenient way to transport data to and from the cloud, but requires vigilance to keep your IT assets and data secure. More than 740 million online records were exposed 2013 saw a five-fold increase in credit card and social security numbers compromised 89 percent of the 500 data breaches in the first half of 2013 were considered 'avoidable' of SSL sites were vulnerable to the Heartbleed SSL bug in April 2014 17.5% at means nearly 500,000 digital certificates were at risk of theft and spoofing Web site Mobile App Back-end calls to PII or PCI Developing and testing new applications ERP systems High data protection/ compliance standards Data replication or archival, Big Data analytics and storage You sell goods and services or provide content and generate advertising revenue Everyone has an Internet connection these days Delivering news, games or selling goods and services over mobile devices Reach a wide audience using any device or form factor User authentication and credit card transactions on your web site or mobile app Ensures fast response time and complete security when PII and/ or PCI are contained in your private cloud You're adding and configuring infrastructure to test a new application for a business unit Provides a secure environment for developers and test engineers to do their work without exposing your business network and info to the outside world Your company uses several different ERP systems to manage HR functions like recruiting, payroll and healthcare Shield sensitive employee data from the outside world and make sure the apps perform regardless of where they are located around the world Your business deals with healthcare information, credit card data, or sensitive R&D Retain more control over the security of your data with a network that is physically separate from the public Internet You move very large volumes of information in and out of the cloud, some of which may be highly proprietary Can be more cost effective than the Internet, makes more efficient use of bandwidth and deterministic performance translates into better application performance and productivity THE NEED THIS MIGHT BE YOU IF... THE BENEFITS... PUBLIC INTERNET OR PRIVATE NETWORK CONNECTION SO REMEMBER, WITHOUT A NETWORK STRATEGY, IT’S NOT REALLY A CLOUD STRATEGY. WITH PRIVATE NETWORK CONNECTIONS, YOU GET: End-to-end security and control: keep your data and applications protected from the network on up to the cloud Application performance: make sure your apps perform as well in the cloud as they did when they were in the data center in your building Efficiency: scale bandwidth dynamically as you need it and only pay for what you use 1. 2. 3. Sources: e Future of Cloud Computing, 4th Annual Survey, 2014: http://slidesha.re/1jeEzIh More an A Half-Million Servers Exposed To Heartbleed Flaw, Dark Reading, April 2014: http://ubm.io/1r9acmD 2013 Was the Worst Year for Data Breaches, Vice.com, Jan. 2014: http://bit.ly/WyK8r8