Professional Documents
Culture Documents
Cloud Client Enterprise Security Costs Osterman Whitepaper en
Cloud Client Enterprise Security Costs Osterman Whitepaper en
by
ponsored by
sponsored by
Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058
Phone: +1 253 630 5839 Fax: +1 866 842 3274 info@ostermanresearch.com www.ostermanresearch.com
But they can save almost $60 per employee each year if using a comprehensive content security solution with a cloud-client architecture instead of their conventional approach
1
single vendor for content security infrastructure. Together these benefits can save over 40% of an enterprises total security management costs, not to mention savings on reduced productivity loss, a reduced number of security breaches and other, less tangible costs. The paper discusses the cost model developed by Osterman Research specifically for this white paper, as well as the solutions offered by Trend Micro that can significantly improve an organizations content security infrastructure.
typical you can expect that in any given year nearly two-thirds of your organizations endpoints will become infected.
Only 4% of organizations that have suffered a security breach during the previous 12 months have not experienced any negative consequences. Further, respondents told us that when a security breach occurred, their network was down for a mean of 74 minutes (median of 18 minutes).
We also asked organizations about the likelihood of a security breach occurring during the next 12 months. While no respondents told us that there is almost no chance that a security breach will occur and 5% told us that a security breach is a virtual certainty, the average was just under 45%. In other words, organizations believe there is a 45% chance that a security breach will occur in their networks during the next 12 months. Using traditional quantitative business analysis methods, if we multiply the average cost of a security breach by the likelihood of its occurrence, then the average cost of a security breach that organizations will experience during the next 12 months is $21,839 ($48,698 * 44.8%). However, this represents the low end of the cost of potential security breaches. For example, a breach of personally identifiable information can result in a requirement to send each victim a letter explaining the breach, the cost of credit reports and the like. A single breach can actually reach millions of dollars, not to mention the tremendously negative impact on an organizations reputation.
2009 Osterman Research, Inc. 4
issues.
51 person-hours on managing false positives and related issues caused by the
security infrastructure. Additionally, IT staff in an organization of 5,000 employees spends 1,674 personhours per year on upgrading resource capacity to add bandwidth, storage, new servers or appliances, etc., or the equivalent of just over 0.8 full-time equivalent (FTE) staff members.
Using the $80,000 figure as above, the cost of these three activities totals almost $290,500 per year, or the equivalent of 3.6 FTE IT staff members. Add this to the cost of cleaning infections and organizations of 5000 employees are spending at least $ 487,700 on content security management.
COST SUMMARY
Based on the analysis above, the annual costs experienced by organizations of 5,000 employees are the following: IT labor to address endpoint infections: ~$197,300 per 5,000 employees per year Employee productivity loss: ~$ 160,300 per 5,000 employees per year Security breaches: ~$48,700 per security breach The IT labor cost per year for managing pattern files, signatures and other critical endpoint issues is $124,000 The IT labor cost per year for managing false positives and related issues caused by the security infrastructure is $102,000 The annual IT labor cost for upgrading resource capacity for security is $64,423
Content security management is expensive and much of this cost is related to antimalwarefocused tasks and resources. Organizations spend a considerable amount trying to defend against malware, including labor costs to manage pattern files, deal with false positives as well as additional bandwidth, storage, new servers or appliances, and other network upgrades needed to support the increasing size of pattern files and signatures downloaded to the endpoints to protect against the numerous spam and malware variants. Even with these efforts, organizations using conventional content security methods have 2/3 of their endpoints infected each yearadding the cost of cleaning these endpoints. These costs also do not consider the additional benefits the enterprise would receive if the IT staff could be used on higher priority initiatives that increase productivity and generate more revenue.
pattern files only once or twice a day: of organizations update less than once per day
24%
Based on these assumptions, Osterman Research estimates that the total security management cost savings an organization would receive by getting faster protection through a cloud-client content security solution would equal 34% of the total content security management costs. Add this to the lost productivity costs saved and security breaches avoided and, for an organization of 5,000 employees, this would equal roughly $268,936, or annual savings of $53.79 per employee per year more than what an organization saves with their current, conventional content security solutions.
An average of 4 vendors We asked organizations that are using multiple content security vendors, If is used for content security you could use just one best-of-breed vendor for all of your server and endpoint security requirements, what A 5000-employee enterprise percentage of IT staff time devoted to can save 9.5% in content content security management do you security management think you might save during a typical week? While 14% of respondents told costs by using one us there would be no savings from the best-of-breed vendor consolidation of vendors, 22% told us there would be savings of up to 5% in IT labor costs, another 41% told us labor savings would be between 6% and 10%, and 23% told us savings would be greater than 10%. The average savings was 9.5%. This can result in major cost reductions, particularly for large organizations.
THE BOTTOM LINE
Faster access to threat intelligence, coupled with the use of a single content security vendor, can result in significant savings. In the 5,000-employee organization discussed above, the total content security management costs are estimated at $ 487,731. The total savings for faster security would equal approximately 34%, or would be $163,713. After applying these saving, organizations would receive a benefit of another 9.5%, or $30,780, reduction in their security management costs when using one vendor. Add this to the savings from a reduction in productivity loss and fewer security breaches, and a 5,000employee organization would save almost $ 300,000 when using a cloud-client solution from a single vendor. The breakdown of these savings is shown in the following figure, although it should be noted that the enormous potential cost savings of avoiding a single security breach could outweigh all of the other costs shown.
protected. And this protection can also be accessed by roaming users when both on and off the network. This immediate access to threat intelligence lowers exposure to dangerous spam and malware, reducing malware infections and security breaches. The reputation databases also stop threats at their source, limiting the amount of spam and malware on the network and saving on costly resources.
Number of Employees
Trend Micro Enterprise Security powered by the Smart Protection Network provides immediate protection with less complexity, offering lower business risks and costs to enterprises.
10
Summary
Malware is bad and getting worse. Malware variants are becoming more numerous, more virulent, more difficult to detect and their lifecycle is becoming dramatically shorter. Organizations that employ a more traditional content security infrastructure whose pattern files and signatures are updated only once or twice each day are at a serious disadvantage, since malware variants can enter a network, do their damage and then disappear before the enterprise deploys the latest pattern files or signatures to address them. Instead, organizations should employ an integrated content security infrastructure that accesses the latest threat intelligence through a cloud-client architecture, providing immediate protection against the latest spam and malware threats. This will reduce the chance of security breaches, reduce the number of endpoints that become infected and reduce IT labor costs focused on security management. Coupled with the use of a single content security vendor, the savings from doing so can be significant. Trend Micro provides just such a solution with Trend Micro Enterprise Security powered by the Smart Protection Network. This approach provides immediate protection in an integrated solution that combines web, messaging, and endpoint security. This comprehensive content security saves cost today while also providing a sustainable architecture as threats evolve in the future.
2009 Osterman Research, Inc. All rights reserved. No part of this document may be reproduced in any form by any means, nor may it be distributed without the permission of Osterman Research, Inc., nor may it be resold or distributed by any entity other than Osterman Research, Inc., without prior written authorization of Osterman Research, Inc. Osterman Research, Inc. does not provide legal advice. Nothing in this document constitutes legal advice, nor shall this document or any software product or other offering referenced herein serve as a substitute for the readers compliance with any laws (including but not limited to any act, statue, regulation, rule, directive, administrative order, executive order, etc. (collectively, Laws)) referenced in this document. If necessary, the reader should consult with competent legal counsel regarding any Laws referenced herein. Osterman Research, Inc. makes no representation or warranty regarding the completeness or accuracy of the information contained in this document. THIS DOCUMENT IS PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND. ALL EXPRESS OR IMPLIED REPRESENTATIONS, CONDITIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE DETERMINED TO BE ILLEGAL.
11