Top Banner
WHY SUCCESSFUL DIGITAL TRANSFORMATION DEMANDS A ZERO TRUST SECURITY MODEL DIGITAL TRANSFORMATION REQUIRES ENTERPRISE SECURITY AND NETWORK EVOLUTION. 1. IDC InfoBrief, Sponsored by Akamai, Remote Access and Security, September 2017 2. CBS Money https://www.cbsnews.com/news/byod-alert-confidential-data-on-personal-devices 3. https://www.securedgenetworks.com/blog/topic/strategy 4. https://www.forbes.com/forbes/welcome/?toURL=https://www.forbes.com/sites/louiscolumbus/2017/05/14/enterprises-are-running-cloud- based-apps-nearly-50-of-the-time/&refURL=https://www.google.com/&referrer=https://www.google.com 5. https://www.securedgenetworks.com/blog/topic/strategy 6. IDC InfoBrief, Sponsored by Akamai, Remote Access and Security, September 2017 7. https://www.av-test.org/en/statistics/malware 8. https://www.skycure.com/wp-content/uploads/2016/06/Skycure-Q1-2016-MobileThreatIntelligenceReport.pdf 9. Kaspersky Lab’s Mobile Malware Evolution 2016 report 10. Kaspersky Lab’s Malware Report for Q1, 2017 11. IDC InfoBrief, Sponsored by Akamai, Remote Access and Security, September 2017 12. RSA Cybersecurity Poverty Index 2016 https://www.rsa.com/en-us/resources/rsa-cybersecurity-poverty-index-2016 13. https://securelist.com/kaspersky-security-bulletin-2016-story-of-the-year/76757 14. https://blog.barkly.com/ransomware-statistics-2017 15. Infocyte: The Breach Detection Gap and Strategies to Close It https://www.infocyte.com/breach-detection-gap-conf 16. Cisco 2016 Annual Security Report 17. IDC InfoBrief, Sponsored by Akamai, Remote Access and Security, September 2017 18. IDC InfoBrief, Sponsored by Akamai, Remote Access and Security, September 2017 19. http://www.gartner.com/newsroom/id/3598917 20. Arxan: 2017 Study on Mobile and Internet of Things Application Security https://www.arxan.com/2017-Ponemon-Mobile-Iot-Study 21. Pew Research Center via Huffington Post https://track.akamai.com/Pew%20Research%20Center SOURCES As the world’s largest and most trusted cloud delivery platform, Akamai makes it easier for its customers to provide the best and most secure digital experiences on any device, anytime, anywhere. Akamai’s massively distributed platform is unparalleled in scale with over 200,000 servers across 130 countries, giving customers superior performance and threat protection. Akamai’s portfolio of web and mobile performance, cloud security, enterprise access, and video delivery solutions are supported by exceptional customer service and 24/7 monitoring. To learn why the top financial institutions, e-commerce leaders, media & entertainment providers, and government organizations trust Akamai please visit www.akamai.com, blogs.akamai.com, or @Akamai on Twitter. You can find our global contact information at www.akamai.com/locations. Published 10/17. USERS AND DEVICES, AS WELL AS APPLICATIONS AND DATA, ARE MOVING OUTSIDE THE TRADITIONAL ENTERPRISE PERIMETER AND ZONE OF CONTROL. More than 40.8% of companies have 21 – 40% remote employees. 25.7% have more than 40% remote employees. 1 More than 67% of workers use their own devices at work. 2 80% of all BYOD is completely unmanaged. 3 40.8% 67% 80% ! App #1 Enterprises are running cloud-based apps nearly 50% of the time. 4 Fewer than 10% of all organizations report they have complete awareness of what devices access their networks. 5 50% NEW BUSINESS PROCESSES DRIVEN BY DIGITAL TRANSFORMATION INCREASE THE ATTACK SURFACE. of all data breaches are the result of third parties. 6 of mobile devices have a medium to high risk of data exposure. 8 The number of malicious installation packages found striking mobile devices more than tripled in 2016, resulting in almost 40 million attacks. 9 Mobile ransomware volume rose 3.5x in the first few months of 2017. 10 new malicious programs are registered every day. 7 63% 1/3 40,000,000 3.5x 390,000 “TRUST BUT VERIFY” IS NO LONGER AN OPTION AS THREATS ARE MOVING INSIDE THE PERIMETER. of breaches originate with authorized users accessing unauthorized systems. 11 The number of ransomware attacks on businesses tripled last year, jumping from one attack every two minutes in Q1 to one every 40 seconds by Q3. 13 More than 90% of malware uses DNS to move within an enterprise. 16 There were 4.3x more new ransomware variants in Q1 2017 than in Q1 2016. 14 Fewer than 19% of breaches are self-detected. 15 of organizations have had a security incident that negatively impacted their business in the past year. 12 >40% 3x >90% 4.3x <19% 70% 10% THE NUMBER AND TYPES OF DEVICES ON A CORPORATE NETWORK ARE PROLIFERATING AND THE DELINEATION BETWEEN ON- AND OFF-NETWORK IS NO LONGER HARD AND FAST. Gartner predicts 20.4 billion+ IoT devices will be installed by 2020. 19 Should you trust this device on your network? Look where it can go in a week. of IoT & 71% of mobile apps are not tested for security vulnerabilities. 20 of people have a mobile device within reach. 21 20.4 BILLION 80% 90% TRADITIONAL PERIMETERS ARE COMPLEX, INCREASE RISK, AND ARE NO LONGER CONDUCIVE WITH TODAY’S BUSINESS MODELS. INSIDE = TRUSTED EXPECTATION App #1 App #2 App #3 • Users & apps inside • Trust but verify • Full-network access VS. REALITY App #2 • Users & apps anywhere • Verify & never trust • Application-level access THERE IS NO INSIDE... App #1 App #3 41% of IT professionals rank complexity of architecture/integration issues as the largest concern. 18 ENTERPRISE Performance Identity Access Security Network Segmentation, WAF, DLP, SWG, & NGFW ADC WOC IDP, SSO, & MFA VPN & Client/Server Logging App Delivery App #1 App #3 App #4 App #2 INSIDE = TRUSTED App #5 SaaS App Perimeter / DMZ 75% of enterprises touch up to 14 network and app components. 17 • Don’t distinguish between external and internal • Everything is external, just like on the Internet • Verify everything, trust nothing • Only deliver applications and data to authenticated and authorized users and devices • Always verify with full logging and behavioral analytics • Visibility is vital, need to understand what constitutes “normal” App #2 App #1 App #3 IT’S TIME TO ADOPT A CLOUD PERIMETER Leverage a zero trust security and delivery model for successful digital transformation. HOW CAN AKAMAI HELP? Akamai has built the world’s most secure, reliable, scalable, and high-performing platform to help you navigate today’s untrustworthy and risk-laden ecosystem. Learn more at akamai.com/zerotrust. WHY SUCCESSFUL DIGITAL TRANSFORMATION DEMANDS A SECURITY MODEL
1

WHY SUCCESSFUL DIGITAL TRANSFORMATION DEMANDS A · Kaspersky Lab’s Mobile Malware Evolution 2016 report 10. Kaspersky Lab’s Malware Report for Q1, 2017 11. IDC InfoBrief, Sponsored

Jul 14, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: WHY SUCCESSFUL DIGITAL TRANSFORMATION DEMANDS A · Kaspersky Lab’s Mobile Malware Evolution 2016 report 10. Kaspersky Lab’s Malware Report for Q1, 2017 11. IDC InfoBrief, Sponsored

WHY SUCCESSFUL DIGITAL TRANSFORMATION DEMANDS A ZERO TRUST SECURITY MODEL

DIGITAL TRANSFORMATION REQUIRES ENTERPRISE SECURITY AND NETWORK EVOLUTION.

1. IDC InfoBrief, Sponsored by Akamai, Remote Access and Security, September 2017

2. CBS Money https://www.cbsnews.com/news/byod-alert-confidential-data-on-personal-devices

3. https://www.securedgenetworks.com/blog/topic/strategy

4. https://www.forbes.com/forbes/welcome/?toURL=https://www.forbes.com/sites/louiscolumbus/2017/05/14/enterprises-are-running-cloud-based-apps-nearly-50-of-the-time/&refURL=https://www.google.com/&referrer=https://www.google.com

5. https://www.securedgenetworks.com/blog/topic/strategy

6. IDC InfoBrief, Sponsored by Akamai, Remote Access and Security, September 2017

7. https://www.av-test.org/en/statistics/malware

8. https://www.skycure.com/wp-content/uploads/2016/06/Skycure-Q1-2016-MobileThreatIntelligenceReport.pdf

9. Kaspersky Lab’s Mobile Malware Evolution 2016 report

10. Kaspersky Lab’s Malware Report for Q1, 2017

11. IDC InfoBrief, Sponsored by Akamai, Remote Access and Security, September 2017

12. RSA Cybersecurity Poverty Index 2016 https://www.rsa.com/en-us/resources/rsa-cybersecurity-poverty-index-2016

13. https://securelist.com/kaspersky-security-bulletin-2016-story-of-the-year/76757

14. https://blog.barkly.com/ransomware-statistics-2017

15. Infocyte: The Breach Detection Gap and Strategies to Close It https://www.infocyte.com/breach-detection-gap-conf

16. Cisco 2016 Annual Security Report

17. IDC InfoBrief, Sponsored by Akamai, Remote Access and Security, September 2017

18. IDC InfoBrief, Sponsored by Akamai, Remote Access and Security, September 2017

19. http://www.gartner.com/newsroom/id/3598917

20. Arxan: 2017 Study on Mobile and Internet of Things Application Security https://www.arxan.com/2017-Ponemon-Mobile-Iot-Study

21. Pew Research Center via Huffington Post https://track.akamai.com/Pew%20Research%20Center

SOURCES

As the world’s largest and most trusted cloud delivery platform, Akamai makes it easier for its customers to provide the best and most secure digital experiences on any device, anytime, anywhere. Akamai’s massively distributed platform is unparalleled in scale with over 200,000 servers across 130 countries, giving customers superior performance and threat protection. Akamai’s portfolio of web and mobile performance, cloud security, enterprise access, and video delivery solutions are supported by exceptional customer service and 24/7 monitoring. To learn why the top financial institutions, e-commerce leaders, media & entertainment providers, and government organizations trust Akamai please visit www.akamai.com, blogs.akamai.com, or @Akamai on Twitter. You can find our global contact information at www.akamai.com/locations. Published 10/17.

USERS AND DEVICES, AS WELL AS APPLICATIONS AND DATA, ARE MOVING OUTSIDE THE TRADITIONAL ENTERPRISE PERIMETER AND ZONE OF CONTROL.

More than 40.8% of companies have 21 – 40% remote

employees. 25.7% have more than 40% remote employees.1

More than 67% of workers use their own devices

at work.280% of all BYOD is

completely unmanaged.3

40.8% 67% 80%

!

App #1

Enterprises are running cloud-based apps nearly 50% of the time.4

Fewer than 10% of all organizations report they have complete awareness of what devices

access their networks.5

50%

NEW BUSINESS PROCESSES DRIVEN BY DIGITAL TRANSFORMATION INCREASE THE ATTACK SURFACE.

of all data breaches are the result of third parties.6

of mobile devices have amedium to high risk of

data exposure.8

The number of malicious installation packages found

striking mobile devices more than tripled in 2016, resulting in almost

40 million attacks.9

Mobile ransomware volumerose 3.5x in the first few months

of 2017.10

new malicious programs are registered every day.7

63%

1/3 40,000,000 3.5x

390,000

“TRUST BUT VERIFY” IS NO LONGER AN OPTION AS THREATS ARE MOVING INSIDE THE PERIMETER.

of breaches originate with authorized users accessing

unauthorized systems.11

The number of ransomware attacks on businesses tripled last year, jumping from one attack every two minutes in Q1 to one every 40 seconds by Q3.13

More than 90% of malwareuses DNS to move

within an enterprise.16

There were 4.3x more new ransomware variants in Q1 2017

than in Q1 2016.14

Fewer than 19% of breaches are self-detected.15

of organizations have had a security incident that negatively impacted their business in the past year.12

>40% 3x

>90%4.3x <19%

70%

10%

THE NUMBER AND TYPES OF DEVICES ON A CORPORATE NETWORK ARE PROLIFERATING AND THE DELINEATION BETWEEN ON- AND OFF-NETWORK

IS NO LONGER HARD AND FAST.

Gartner predicts 20.4 billion+ IoT devices will be installed by 2020.19

Should you trust this device on your network? Look where it can go in a week.

of IoT & 71% of mobile apps are not tested for security vulnerabilities.20

of people have a mobile device within reach.21

20.4 BILLION 80%

90%

TRADITIONAL PERIMETERS ARE COMPLEX, INCREASE RISK, AND ARE NO LONGER CONDUCIVE WITH TODAY’S BUSINESS MODELS.

INSIDE = TRUSTED

EXPECTATION

App #1

App #2

App #3

• Users & apps inside• Trust but verify• Full-network access

VS.REALITY

App #2

• Users & apps anywhere• Verify & never trust• Application-level access

THERE IS NO INSIDE...

App #1

App #3

41% of IT professionals rank complexity of architecture/integration issues as the largest concern.18

ENTERPRISE

PerformanceIdentity Access Security

NetworkSegmentation,WAF, DLP,SWG, & NGFW

ADC WOCIDP, SSO,& MFA

VPN &Client/Server

Logging

App Delivery

App #1

App #3

App #4

App #2

INSIDE = TRUSTEDApp #5

SaaS App

Perimeter / DMZ

75% of enterprises touch up to 14 network and app components.17

• Don’t distinguish between external and internal

• Everything is external, just like on the Internet

• Verify everything, trust nothing

• Only deliver applications and data to authenticated and authorized users and devices

• Always verify with full logging and behavioral analytics

• Visibility is vital, need to understand what constitutes “normal”

App #2

App #1

App #3

IT’S TIME TO ADOPT A CLOUD PERIMETERLeverage a zero trust security and delivery model for

successful digital transformation.

HOW CAN AKAMAI HELP?Akamai has built the world’s most secure, reliable, scalable,

and high-performing platform to help you navigate today’s untrustworthy and risk-laden ecosystem. Learn more at akamai.com/zerotrust.

WHY SUCCESSFUL DIGITAL TRANSFORMATIONDEMANDS A

SECURITY MODEL