Datasheet

14
Part I: Building the Background
Figure 1-1:
Data-loss
proliferation
in a maze
of security
needs.
The Internet
Branch Office
Local Users
Branch Office / Regional Site
Anti-virus, host-based intrusion detection
Data Center (Servers)
Intrusion detection and
prevention system
Users
Anti-virus, anti-spyware, client
firewall, intrusion detected
The Remote User
Virtual private network, anti-virus, anti-spyware,
client firewall, intrusion detection & prevention
Integrated firewall,
virtual private
network, intrusion
detection &
prevention, content
filtering, anti-virus
File server’s
anti-virus
Anti-spam &
email anti-virus
Firewall & virtual
private network –
secure sockets layer
VPN & SSL
Policy management
-Anti-virus / malware
-Security architecture
IT Operations
Security event
correlation
A few quick numbers illustrate why this is a growing problem. IDC estimates
that in 2008 alone, human beings created more data than in the previous
5,000 years combined. That gives the digital universe an approximate size
of over 250 exabytes (billion gigabytes). And IDC projects a hefty growth in
the amount of information generated between 2006 and 2010 — to the tune
of 600 percent per year. In addition, in 2010 around 70 percent of the digital
universe will be generated by individuals. Guess who’ll be looking after it . . .
you guessed it: In 2010, business organizations will have responsibility for the
security, privacy, reliability, storage, and legal compliance of at least 85 per-
cent of that information.
Where will we put it all?
Managing a universe, even a digital one, will be a huge challenge for organiza-
tions. Consider: On average, the annual demand rate for digital storage was
only 35 to 40 percent from 2006-2008, and the average level of disk allocation
for storage (on Unix/Linux systems, anyway) was only 30 to 45 percent.
Kiss those days goodbye.
05_388433-ch01.indd 1405_388433-ch01.indd 14 1/23/09 9:36:07 PM1/23/09 9:36:07 PM