We aim to provide you with a round-up of our latest offers and essential info to help increase your productivity and keep you secure.
Gartner Magic Quadrant for Secure Web Gateways – updated Nov 2014
The SWG market is evolving rapidly as vendors respond to the mobility trend and the evolving threat landscape. SWG vendors are highly differentiated in their ability to deliver cloud-based services, and to protect users with advanced threat defense features.
Secure Web Gateways (SWGs) utilize URL filtering, advanced threat defense, legacy malware protection and application control technologies to defend users from Internet-borne threats, and to help enterprises enforce Internet policy compliance.
SWGs are delivered as on-premises appliances (hardware and virtual) or cloud-based services. Vendors differ greatly in the maturity and features of their cloud-based services, and in their ability to protect enterprises from advanced threats.
The vast majority of enterprises still implement SWGs as on-premises appliances. Gartner estimates that, in 2013, 77% of SWG implementations were on-premises and 23% were cloud-based. Comparing these values to those from 2012 (86% on-premises and 14% cloud) indicates that cloud-based services are growing more quickly than on-premises appliances.
Despite the rapid growth in cloud adoption, and the inevitable need to protect laptops and mobile devices as users bypass the corporate network to go directly to the Internet, the market for cloud-based SWG services is far from mature.
Vendor differentiation remains high in key areas of cloud services, such as global coverage (number of countries and data centers), support for mobile operating systems and the ability to deliver hybrid (cloud and on-premises) implementations.
To read the full Gartner report – click here >>
Infosec Cloud Vendor Webinars
Don’t forget to visit our Webinars page to see the latest scheduled webinars from our key partners. Click here for details >>
Would you like 12 months of the best Anti-Virus free of charge?
Comodo, the ‘2014 Anti-Malware Solution of the Year’, proactively protects servers, workstations, laptops and netbooks, while offering advanced, real-time management and control over critical system resources.
Plus Comodo is the ONLY Endpoint Security solution that includes a £3000 warranty that you remain 100% virus and malware free.**
Watch this 4 minute video which explains the difference between legacy AV (EVERY other AV provider) and Comodo – The GOOD, the BAD and the UNKNOWN >>
COMMERCIALS: We have two great offers for Comodo – both enable you to get the best Antivirus solution available and save money:
• 12 months free — Buy 24 months and we will give you an additional 12 months at no cost.
• 12 month existing contract buy out — whenever your existing AV is due for renewal (within the next 12 months) we will provide you these months on Comodo at no charge, giving you up to 24 months for the price of 12.
In addition to the free months you will most likely see at least a 25% cost saving per user over your current AV solution.
Email [email protected] for special pricing or call 01256 379970.
** The warranty is underwritten by Chubb Insurance and pays £3000 per Malware instance — but of course you would never get a virus with Comodo installed…
Cybersecurity Predictions for 2015
2014 was a year in which information security vaulted into the public eye, driven by a surge in both the number and the visibility of data breaches and compromises. This new attention will bring greater scrutiny in 2015, just as the nature and severity of threats continue to evolve for the worst.
* Cyberextortion will be the most rapidly growing new threat family – In 2015, Proofpoint expects these cyberextortion schemes to increase in scope, sophistication, and – following the example of the Destover malware – destructiveness.
* Cyberattackers will target a wider range of data and assets – Organizations that today are focused on protecting the traditional targets of cybercriminals – credit card data, PII, PHI, bank accounts, etc – will have to think about the broader business impact of potential compromises, which will target intellectual property and business secrets.
* Email-borne threats will become more social and lead to more data breaches – As a result, organizations that continue to rely on traditional hygiene-focused email solutions will suffer more, and more costly, data breaches. Organizations must instead move more aggressively to adopt email security solutions that include tightly integrated advanced threat detection and threat response capabilities
* Social media will be fertile ground for cybercriminals – As a result, organizations that continue to rely on traditional hygiene-focused email solutions will suffer more, and more costly, data breaches. Organizations must instead move more aggressively to adopt email security solutions that include tightly integrated advanced threat detection and threat response capabilities
* Malvertising will continue to increase as a threat – Organizations with stolen ad creative will put increased pressure on site owners and ad network operators to proactively detect malware in their ad streams. At the same time, protecting end users from URLs – even in legitimate email messages – linking to malvertising-infected sites will become an essential defense measure for all organizations.
* Increased volume of alerts will make automated incident response a priority – Adoption of automated incident response will have a significant impact on the way that information security is practiced, shifting focus from tools to processes, and will result in more rapid identification and containment of data breaches.
* The breaches of 2014 will breed new regulations in 2015 – The result for organizations will be a need to move beyond spot solutions and adopt a combination of technologies for detecting advanced threats and the presence of intruders in their environments, and solutions and processes for rapidly responding to incidents in order to mitigate both the damage and the legal and financial consequences of breaches.
* Social media will fall subject to aggressive regulation – The result for organizations will be a need to quickly select and implement security and compliance solutions that are purpose-built for social media, but that can be easily integrated within the management and reporting framework of their existing information security solutions.
To read the full article, please click here to go to the Proofpoint website.
Office 365 – New SME Plans
Flexible, discounted prices, free migration and ongoing support.
Microsoft has released three new Office 365 plans tailored to meet the needs of small and medium-sized businesses, ranging from one to 250 employees.
Not sure which plan is best for you?
Best UK prices. Free Migration. Ongoing Support.
Mobile Networks enable 2FA
This free white paper describes the secure authentication options available for mobile device users.
Employees who want to access an internal network must usually first prove their identity. They generally do this by entering a username and a password. Two factor authentication (2FA) adds a further layer of security to this process by requesting a passcode.
Mobile device users can receive the required passcode via their mobile phones, smartphones, tablets or laptops. Users receive the numeric passcode via SMS, email or in a soft token app. The passcode is then entered on the login page together with the personal user access details, thus providing unequivocal confirmation of the user’s identity.
The required passcode can also be provided via a landline call or via a QR code.
For more information or impartial advice, please
email: [email protected] or call 01256 379970