White Papers

1H 2013 Financial Institution Threat Report

Toggle Content

SilverSky provides comprehensive security services to financial institutions of all sizes. In this report for the first half of 2013, we summarize security incidents based on data collected from 925 financial institution customers.

  •  

1H 2014 Financial Institution Threat Report

Toggle Content

SilverSky provides managed security services (MSS) to financial institutions of all sizes. In this report, we summarize security incidents based on data collected from 954 financial institution customers in the first half of 2014. During that period, SilverSky reported 1,225 likely and confirmed compromises. In total, 337 financial institutions (35%) experienced at least one incident, down from 42 percent in 2H 2013 – a 7 percent decrease. Incidents had a slight spike in February and declined throughout the summer. In 1H 2014, CryptoLocker was the top threat, and a few new threats emerged on our top list.

  •  

2H 2013 Financial Institution Threat Report

Toggle Content

SilverSky provides cloud-based security services for more than 1,800 banks, credit unions, and other financial institutions. The financial services industry is one of the most security-conscious vertical markets. It is also one of the most targeted. As a service to our financial institution customers, SilverSky Labs issues its Financial Services Threat Report twice a year. In this report for the second half of 2013, we summarize security incidents based on data collected from 925 financial institutions.

  •  

8 Elements of Complete Vulnerability Management

Toggle Content

Threats to the security of your network will never completely go away, but the ability to prepare for, recognize, and quickly remediate these threats should be a part of day-to-day company operations. This white paper gives you eight essentials for managing vulnerabilities in a network, including internal and external assessments, how frequently you should run scans for threats, and the importance of broadening testing beyond basic network services and operating systems.

  •  

Cloud Business Email – Market Quadrant 2014

Toggle Content

The Radicati Group, a technology market research firm, highlights its choices for Cloud Business Email providers based on market share and functionality. They detail the criteria for a Top Player in this market and include SilverSky in that category.

  •  

Five Strategies for Email Data Loss Prevention

Toggle Content

The average employee sends and receives about 110 emails each day or 29,000 emails per year. One in every 20 of those emails contains risky data – from sensitive attachments to social security numbers to protected health information to valuable corporate secrets that set your organization apart. All of this risky data can become toxic to your company if it’s hacked or suffers a breach – causing reputational damage, customer loss, heavy fines, and decreased competitive edge. Download our Email DLP white paper to review the five strategies your organization should be doing to protect your email.

  •  

Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013

Toggle Content

In Forrester Research, Inc.,'s 15-criteria evaluation of the emerging managed security services provider (MSSP) market, SilverSky was identified as a leader. Forrester identified the 10 most significant providers in this category and researched, analyzed, and scored them. SilverSky received the highest score possible for business and technical value and SLA adherence, and among the highest scores for security services, threat intelligence, and analytics. Download this industry research paper now to learn why SilverSky is the MSSP you should be working with today.

  •  

Forrester Wave™: Managed Security Services: North America, Q4 2014

Toggle Content

Forrester’s 26-criteria evaluation of managed security service providers (MSSPs) included the 13 most significant vendors in the North American market that security and risk professionals can turn to for solving some of their most important security challenges — AT&T, CenturyLink, CSC, Dell SecureWorks, HP, IBM, Leidos, SilverSky, Solutionary/NTT, Symantec, Trustwave, Verizon, and Wipro. This report details how well each vendor met our criteria and where they stand in relation to each other. This report will help you refine your selection criteria and choose the right partner for your outsourced security needs.

  •  

Fortune 500 Security on a Budget

Toggle Content

Network security and regulatory compliance are expensive to do in-house for any size company, but if you are a small- or medium- sized business, the burdens go beyond cost to staff bandwidth and security expertise. This white paper explores the problems with traditional network setups and ways to address these issues in a budget-friendly manner.

  •  

Hosted Microsoft Exchange Market Quadrant

Toggle Content

The Radicati Group, a technology market research firm, highlights its choices for Hosted Microsoft Exchange providers based on market share and functionality. They detail the criteria for a Top Performer in this market and include SilverSky in that category.

  •  

Microsoft Hosted Exchange Email and Collaboration Market Quadrant

Toggle Content

The Radicati Group, a technology market research firm, highlights its choices for Microsoft Hosted Exchange providers based on market share and functionality. They detail the criteria for a Top Performer in this market and include SilverSky in that category.

  •  

Navigating the Pitfalls of Attack Prevention: A Look at Employee Perception

Toggle Content

In order to understand how employees perceive the abundance of attacks targeting their organizations and the ability to defend them, SilverSky surveyed nearly 200 U.S based employees on their perceptions around targeted attack detection. The study revealed several inadequacies in detecting and blocking targeted cyber-attacks. In fact, most employees said their organization had fallen victim to 1-5 known attacks in the last 12 months. Download this white paper now to learn more about employee perceptions on targeted attacks and how you can protect your organization.

  •  

Picking a Sensible Mobile Password Policy

Toggle Content

Creating a mobile password policy would appear to be a straightforward task – just use the same policy that you use for PCs. But employees use their portable devices outside the work environment, and the password policies for these devices need to encompass both protecting the device and limiting the complexity for the user. SilverSky’s Chief Technology Officer discusses six policies that will produce a reasonable, employee-friendly, and highly-usable password system that will be strong enough to protect your company’s data.

  •  

Secure Enterprise Messaging by SilverSky

Toggle Content

This white paper covers what makes Silversky different; proven enterprise success; how we reduce operational risk, compliance burden, costs, and complexity; how we provide the most reliable Exchange Mailbox anywhere; and SilverSky's global reach and scale.

  •  

SilverSky Email Security Habits Survey Report

Toggle Content

SilverSky recently conducted a survey among business users to assess email security habits and perceptions. What we found fell in line with the Lake Wobegon Effect (i.e., overconfidence) of users believing that they are more secure than their fellow co-workers. However, this overconfidence on the part of employees could potentially be dangerous for businesses, since it could lead to poor email security habits – which ultimately lead to real legal, regulatory, and reputational risks through data loss. Download the full report by clicking below, and also check out our infographic comparing the perception vs. reality of driving and emailing.

  •  

SilverSky Silver Lining Report

Toggle Content

Two hundred U.S. chief information officers and senior level security decision makers were surveyed in the company's new Silver Lining Report." Nearly all (97%) of survey respondents indicate their confidence level in the cloud has either increased or stayed the same in the past 12 months. On average, respondents have moved one-quarter of all their business functions and services to the cloud, the most popular being e-Commerce (41%), closely followed by email (39%), and storage (30%). Many respondents have plans to migrate additional applications within the next 12 months, particularly storage, e-Commerce, and middleware/infrastructure. However, traditional back-office functions, such as finance, accounting, and procurement applications, show no upward movement. View the Cloud Security Adoption Infographic or download now to get the full report.

  •  

TEI of SilverSky Network Security Solutions

Toggle Content

SilverSky commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by engaging SilverSky network security services, including its managed security services, network protection suite, and professional services. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of SilverSky security services for their organizations.

  •  

The Business Value of Managed Security Services

Toggle Content

For many organizations, outsourcing network security services appears to be a logical choice. You avoid hardware, licensing, and maintenance costs; you benefit from around-the-clock security monitoring and management from dedicated security experts; and you free up your in-house IT staff to pursue activities core to your business mission. Yet many business decision makers dismiss the managed security service option out of hand, fearing the loss of control over the network. This paper provides an overview of the benefits of outsourced security solutions. The managed security services option saves money, improves the network security posture, and maximizes the efficiency of existing corporate resources.

  •  

The Holistic Approach to Preventing Targeted Attacks

Toggle Content

In this white paper, we look beyond the headlines and focus on the roots of the Target attack and we investigate what Target could have done to prevent it. Finally, we propose a holistic approach to security that all companies can adopt to increase their security.

  •  

The Right Way to do Exchange in the Cloud

Toggle Content

For the past decade, front office and back office systems, such as CRM, payroll, and document management, have gradually moved to the cloud. Now enterprises are contemplating and executing the migration of once immovable major systems that have been ensconced inside the walls of the corporation for decades. At the top of the list is Exchange Server, Microsoft’s enterprise stalwart. With the introduction of Office 365 in 2011, Microsoft is encouraging businesses to shift core apps like Exchange, SharePoint, and Lync, to the cloud. It’s an attractive prospect for most organizations: offload the maintenance and security to Microsoft yet keep the same basic look, feel, and experience for employees. Office 365 is a fine offering for small to mid-size businesses, but larger enterprises looking to make the move to the cloud should consider new options, such as the one now offered by SilverSky in partnership with IBM. In this white paper, we look at the best way for enterprises to make the move to the cloud and explore how to ensure that security, scalability, and flexibility are not compromised.

  •  

To Outsource or not to Outsource: That is the Network Security Question

Toggle Content

This paper discusses how to cost-effectively turn the tables and ultimately win the battle for securing the network. We will discuss different options and the methodology for making critical decisions on how to tackle your network security challenges.

  •  

What to look for in a Managed Security Service Provider

Toggle Content
Managed Security Service Providers (MSSPs) are responsible for protecting an organization’s critical data and ensuring that they avoid data breaches. Thus, choosing an MSSP is an important decision that requires a careful, thorough assessment of the options. This whitepaper provides a useful framework to help prospective buyers assess MSSPs. It also provides helpful, probing questions that companies can use to vet potential providers. MSSPs provide fully managed security services, not just security technology. Therefore, it is important to assess the three key elements of comprehensive managed security – technology, processes, and people. This whitepaper starts with what buyers should look for in a provider from a high-level, company perspective, then uses the “technology, process, people” framework to help buyers assess potential providers. MSSPs help customers reduce costs and complexity, reduce information security risk, and reduce the compliance burden. This whitepaper will help customers reduce the amount of work and complexity involved in deciding which MSSP best meets the needs of their organization.
  •  

What to Look for in Cloud-Based Email

Toggle Content

This white paper includes a comprehensive list of things to consider in evaluating cloud-based email solutions, from the hidden costs of hosting your own to additional services you might need, as well as what questions to ask your provider. 

  •  

What You Need to Know About Email DLP

Toggle Content

Data loss is a growing issue for companies around the globe. Everyone’s on the go and intellectual property is equally as mobile. While the focus on leaks via removable drives and other media is admirable, the bulk of the problem lies in email. According to a recent survey of business professionals at U.S. organizations conducted by SilverSky, 56% of respondents have accidentally sent an email to the wrong person while at work, and 53% have received unencrypted, risky data via email or email attachments. Email is part of every moment of every day, and enterprises have attempted to deal with the issue. Some enterprises have opted for the pricey route, with the complicated and heavy-handed premises-based approach of enterprise data loss prevention (DLP) systems. Enterprise DLP costs millions of dollars and disrupts just about every part of a business it touches – all with the express aim of eliminating malicious data loss incidents caused by insiders, which it never really does. On the other hand, there’s cloud-based email DLP, which addresses the biggest source of data loss – email – while requiring a fraction of the cost of enterprise DLP. The math seems to make the case by itself, but in this white paper we’ll look at the other advantages of cloud-based email DLP.

  •  

Why You Should Consider Cloud-Based Email Archiving

Toggle Content

In this white paper, authored by technology market research firm The Radicati Group, you'll find the 10 reasons you should outsource your archiving solution, the unique benefits of archiving in the cloud, and how the SilverSky solution compares.

  •