Email IBM IBM Global Technology Services Thought Leadership White Paper Selecting a managed security services provider The 10 most important criteria to consider March 2014 Email IBM 2 Selecting a managed security services provider Introduction Enterprises today continually struggle to defend against online attacks that can strike at any moment. Whether the threats are from viruses, denial-of-service attacks or unauthorized web site access, these offenses can wreak tremendous havoc. Attacks can impact business operations and workforce productivity, damage infrastructures and create security breaches that can harm an organization’s reputation. Such character compromises or breaches can also be expensive in terms of operational impact, resources required to remedy the issue and potential loss of business. A successful security program demands deep insight into the current threat landscape. It also requires a strategic approach to managing the cost and complexity of the security technologies needed for security event and log management, vulnerability scanning, email security and other activities. However, with the wide variety of current and emerging security threats that exist, organizations that try to manage their own information security often lack the in-house resources required to adequately protect online systems around the clock. Advanced security practices require highly skilled personnel, who are in high demand and expensive to recruit, hire and retain. According to a Forrester Consulting study, “An alarming 80 percent of security leaders believe that it is difficult or very difficult to find and hire technical security staff that fit all of their requirements. This challenge is even more pervasive in Latin America, where a stunning 96 percent of regional security leaders noted this difficulty.”1 In addition, implementing and managing security solutions can divert IT resources from other critical initiatives, including preventing the next attack. IT teams are forced into a reactive posture that ignores the more important strategic role of an IT security function. To support a cost-effective, robust and proactive security posture, more and more organizations are outsourcing portions—or even all—of their IT security programs. These businesses typically: ●● ●● ●● ●● ●● ●● Lack the in-house capabilities required to properly manage changing business demands, compliance mandates and emerging threats for strategic implementation of new IT security solutions Do not have the capabilities to effectively monitor and manage the security infrastructure to help achieve optimal use of current assets Have in-house IT staff members who spend too much time on day-to-day operational security issues versus new strategic projects Depend on IT security tools and processes that provide a reactive, rather than a proactive, approach to mitigating risk and reducing data loss and downtime Lack the resources and expertise to gather and analyze security intelligence about current and emerging threats Are too overwhelmed by the magnitude and complexity of risks to confidently provide an integrated response. By outsourcing security operations to a managed security services provider (MSSP), organizations can take advantage of the expert skills, tools and processes that these service providers offer and significantly enhance security without making a large investment in technology and resources. But how do you select the right MSSP for your specific needs? This white paper outlines a strategic approach to selecting an MSSP and establishes 10 important qualifications to consider in choosing a provider. The right MSSP can reduce the cost and complexity of information security while helping you build a stronger security posture. Email IBM IBM Global Technology Services The 10 most important things to consider in selecting an MSSP Organizations that lack the resources and budget to build and operate their security infrastructure on an around-the-clock basis can outsource to a reliable MSSP. Allowing an MSSP to handle day-to-day security monitoring and management gives organizations an opportunity to allocate in-house IT resources to more strategic initiatives. MSSPs also facilitate business continuity by providing advanced intelligence to thwart attacks before they cause damage and disrupt business operations. This layer of proactive protection lends a competitive edge by helping your business to remain functional even when sophisticated threats continue to proliferate. To achieve the greatest advantage from outsourcing your security operations to an MSSP, you need to select a provider suited to your organization’s specific needs. Before you do this, however, ask yourself the following questions: ●● ●● ●● ●● ●● Have you conducted an extensive evaluation of your security requirements? Do you understand the security measures with which you must comply? Have you established a reliable governance model? Have you determined which security requirements you expect the MSSP to put in place? Are you prepared to investigate whether the MSSP is equipped with relevant certifications that demonstrate the provider’s capabilities in the above-mentioned areas? 3 Once you have addressed these questions, you are ready to begin evaluating MSSPs. The following 10 criteria can help you select the right provider to protect your vital IT assets while better managing your compliance. 1. Broad portfolio of security services As a result of the dynamic nature of your business environment, the influx of new threats and the changes in regulatory requirements, your security needs are continually evolving. Your managed security services partner should offer a robust suite of vulnerability assessment and management services that can help keep you protected ahead of threats, regardless of your security challenges. To meet your budget and unique protection requirements, choose an MSSP that provides multiple service levels and the ability to mix and match services. Also, consider a provider with offerings that are prepackaged and structured for more consistent delivery and performance. Through world-class services that address risk across each aspect of your business, you can build a strong security posture that can help you reduce costs, improve service and manage risk. 2. Highly respected security intelligence and research professionals The MSSP you choose should have extensive, top-tier internal and external resources with ongoing insight into the latest attack strategies, network threats and vulnerabilities, including up-todate information on emerging threats and remediation. Global operations groups, strong research and development teams, and time-tested vulnerability and threat analysis processes are crucial to keeping your company protected from evolving attack schemes and technologies. In addition, the provider should be able to dedicate research resources to investigating vulnerabilities and threats, whether by assigning specific duties to each resource or by demonstrating a rotation of duties. Email IBM 4 Selecting a managed security services provider 3. Excellent reputation The reputation of an MSSP and its history of customer satisfaction are important factors to consider. Look for a provider that has successfully retained customers for several years. Ask what its average customer churn rate is, looking for long-term customers from your industry and with similar network needs. Ask to see results from current customer satisfaction research conducted either internally or by a third-party vendor. Review analyst reports that include the MSSP, and compare the provider with its competitors for an unbiased evaluation of its services and expertise. Also, consider whether or not their solid reputation stands beside a solid vision for the future. Make sure that the provider is investing in its portfolio of solutions and services and has a clearly defined strategic roadmap that aligns with your security goals. 4. Robust, web-based management tool to improve visibility and intelligence Although the MSSP can deliver a portion or all of your of your IT security program, your IT team nevertheless needs ready access to a robust view of your entire security infrastructure. Look for an MSSP that provides a single management console with the flexibility to mix and match by device type, vendor and service level that can meet your individual business needs. The best web-based management tools will allow your security resources to more easily monitor both managed and unmanaged security devices via the cloud and traditional approaches. 5. Sophisticated back-end technology Once you are certain that an MSSP is committed to ongoing global security intelligence, make sure it has the back-end technology to align that intelligence with your IT infrastructure and security initiatives. The underlying protection system, accessed through a management portal, should perform far more than simple event monitoring and device management. It should also have the capability to go beyond the normal limits of IT security to perform advanced analysis, correlation, aggregation, categorization and prioritization. Additionally, security intelligence should be integrated, enabling alerts from multiple service offerings to be chained together. This helps reduce the rate of false positives and streamline the identification of advanced threats, whether the threats target just your organization or a wide range of organizations. Look for technology with incident escalation and remediation, as well as a sophisticated alert mechanism—all tied to an enormous database of known threats provided by and continually updated by the MSSP. Make sure that your provider is using a common platform across its customer base, rather than attempting to manage multiple distinct platforms simultaneously, which can increase opportunities for variance in service delivery. 6. One-stop solutions for federal, state and industry regulations Your MSSP should have a deep understanding of the compliance regulations that apply to your particular industry. Therefore, confirm that their work conforms to relevant industry-standard security and audit protocols. Consider seeking governance, risk and compliance services from a single vendor that can help you evaluate your existing security practices in the context of your requirements and future objectives, including technical and business considerations, in addition to compliance. An MSSP with robust services that are designed to better manage your compliance may include capabilities for not only regulatory and standards compliance, but related functions such as security risk management, security program design and management, privacy and security education and training. In addition, verify that the MSSP has an internal governance structure in place, such as the IT Infrastructure Library (ITIL) framework, that includes best practices methodology, incident management and security operations management. Email IBM IBM Global Technology Services 7. Broad security infrastructure expertise Check the provider’s understanding, experience and reputation in terms of providing the infrastructure and system integration that can support your overall security strategy and objectives. The MSSP should have extensive infrastructure expertise that includes in-depth knowledge of hardware, software data center and network requirements, particularly as they relate to security best practices. MSSPs that offer integrated technology services, such as business continuity, integrated communications and storage and data services, can extend the value of their managed security services offerings. The MSSP should have the skills and analytics capabilities to help you understand how a securityrich infrastructure can support your growth beyond your managed security services implementation and expansion into adjacent areas. 5 Look for structured fixed-price, fixed-scope offerings that demonstrate the provider’s ability to deliver services reliably and repeatedly. Also, ascertain that the SLA serves your particular needs. After adopting the security service, validate and test the provider’s capabilities, and verify that performance meets contracted agreements. 10. Financial stability One of the most important criteria to consider when evaluating MSSPs is their financial stability. Managing security on an outsourced basis for large numbers of customers requires significant capital and resource outlays to operate a global network of security operations centers, develop new technologies and attract and retain knowledgeable and motivated personnel. As with any business decision, look for an MSSP with deep resources and a sustainable business model. 8. Multivendor support of security devices In addition to managing and monitoring your security posture around the clock, your MSSP must have the capability and certification to protect your current equipment so you can avoid unnecessary and costly technology changes. Look for an MSSP that has extensive experience in managing a variety of technologies and platforms, in addition to its own suite of products. Ask for a list of platforms that the MSSP is certified to manage. If your current platform does not appear on the list, check with the provider to see if services can be customized to suit your needs. However, beware of providers who insist they can support any IT environment and business need, because the time and cost involved in ramping up a global set of resources to deliver expert, consistent and reliable services can be substantial. 9. Flexible, guaranteed, performance-based service-level agreements Service providers can claim they respond rapidly and thoroughly. However, the MSSP you choose should offer not only a rapid response guarantee but also a guarantee of protection against emerging Internet threats. The provider must be willing to stand behind these commitments in the service-level agreement (SLA). IBM Security Services Many discerning organizations that take the time to thoroughly investigate MSSPs choose IBM Managed Security Services to protect their enterprises. In fact, IBM is recognized in the industry as a managed security services leader. Gartner, Inc., has positioned IBM as a Leader in the Magic Quadrant for Global MSSPs.2 In addition, IBM is a leader in the Forrester Wave™: Information Security Consulting Services, Q1 2013.3 IBM Managed Security Services deliver advanced security solutions for near-real-time security management, including system and identity monitoring and management, emergency response and around-the-clock protection from the Internet’s most critical threats. IBM’s portfolio of security services helps organizations reduce risk, escalating security costs, and complexity, while better managing compliance. The broad portfolio of IBM Managed Security Services solutions includes standard security management and monitoring as well as cloud-based security service offerings. Email IBM 6 Selecting a managed security services provider Managed Security Services (core offerings) ●● IBM Managed Security Services (core offerings) provide aroundthe-clock monitoring and management of security technologies housed in an organization’s IT environment. Through a single management console, organizations can view their entire security infrastructure and remain actively involved with their information security programs in collaboration with IBM. Offerings include: ●● ●● ●● Firewall management. Providing near-real-time security monitoring, management and analysis of firewall alerts and logs, this service delivers customized protection for less than the cost of many traditional solutions. It helps provide preemptive protection from known and emerging security threats, as well as vendor-neutral support that can help optimize your existing security investments. IBM’s firewall management service keeps you informed with robust and customizable reports, along with executive and technical reporting options. Intrusion detection and prevention system (IDPS) management. This service is designed to improve your security posture by protecting your networks and servers from internal and external threats and intrusions. Additionally, it delivers advanced attack detection by taking a multistep approach to event analysis and attack recognition. This service also provides configuration and customizable reporting, as well as increased visibility into your security events. Managed protection services. These services can deliver expertise in monitoring, management and incident escalation for your IT infrastructure around the clock. Managed protection services represent an enhanced, robust managed security solution from IBM and include IBM’s unique protection guarantee SLAs. ●● ●● ●● Unified threat management. This service comprises two discreet security technologies—protection and content— which correspond to the capabilities available from marketleading unified threat management appliances. The protection component supports and manages intrusion prevention systems and firewalls designed to block traditional attacks like worms, Trojans and intruders. The content component provides management and support for web and email filtering and antispam and antivirus technology (where available). Secure web gateway management. Along with ongoing support to help protect critical web-based transactions, this service provides access to a web-based portal designed to optimize your security devices and give you an overall view of your security status. The service supports proxy or cache, content filtering, directory services and application control. In addition, it combines ongoing threat monitoring with advanced policy management capabilities to help improve your security posture. Security intelligence analyst. With this service, you get a dedicated SOC specialist who works with you to analyze your current security posture, review trends in your environment and provide policy tuning and strategic recommendations to strengthen your overall security posture. Managed security information and event management (SIEM). This service provides around-the-clock security monitoring and reporting of activities across the enterprise and for specific users. We help you better identify and respond to threats, manage compliance and optimize your infrastructure investment. Our services, which can be delivered at a more predictable monthly cost, support multivendor SIEM systems and can add value to your existing implementations. Email IBM IBM Global Technology Services Cloud security services ●● Cloud security services from IBM use the power of the IBM Virtual SOC platform to deliver high-value services that require little or no security device investment or maintenance, making the total cost of ownership much lower than what companies incur performing these security services in house. The cloud-based security services offerings from IBM are complemented by a robust portfolio of traditional managed security and professional services solutions. Cloud-based security services from IBM Managed Security Services include: ●● ●● ●● ●● Hosted email and web security. Designed to help clients protect their email and data from unintentional exposure resulting from malware, identity theft and phishing scams, this service can protect IT infrastructure and business continuity by virtually eliminating performance degradation and system crashes. It also reduces the need for additional hardware and software solutions. The service can help improve employee productivity by protecting desktop performance, helping prevent access to inappropriate websites and helping clients streamline web security configuration and administration through a web interface. Hosted security event and log management service. This service enables IT teams to compile the event and log files from network applications and operating systems, as well as security technologies, into one seamless platform. It offers the ability to run queries on all of these logs using a single interface. This innovation dramatically improves the speed of conducting security investigations. Hosted vulnerability management. Providing cloud-based internal and external infrastructure scanning through a single portal, this service streamlines compliance management requirements. It supports compliance initiatives by scanning for and classifying vulnerabilities, and it provides the data and remediation steps for managing security risks and reducing threat exposure. ●● ●● 7 IBM® X-Force® hosted threat analysis service. Delivering customized information about a wide array of threats that could affect network security, this security intelligence service helps you proactively protect your networks with detailed analyses of global online threat conditions. Hosted application security management. This service provides an advanced application security analysis to help identify and analyze web application security risks. Designed to detect threats before they can be exploited, it helps reduce application downtime and improve application availability and compliance management. Hosted mobile device security management. A fully managed solution that supports virtually all mobile devices across platforms, this service is designed to provide the knowledge, technology and ongoing management to help protect against mobile device risks. Hosted mobile device security management can help you address data security issues, reduce capital and operational costs, better manage regulatory compliance and improve employee productivity. Managed distributed denial of service protection. This service provides a multilayered approach to help you plan for, respond to and correlate data during an attack. By combining IBM security expertise with the cloud-based Kona Site Defender technology from Akamai, you can avoid potential attacks on your infrastructure, helping to facilitate sustained performance and availability. Why IBM Managed Security Services? IBM’s broad range of solutions across the Managed Security Services portfolio enables end-to-end security monitoring and management, better visibility and increased efficiency while supporting multiple technologies, vendors and devices. We have nearly 50 years of security experience and more than 3,500 skilled security services professionals with deep expertise in the broad threat landscape. Additionally, we use a simplified, predictable pricing model and a vendor-neutral approach for our core offerings, which helps you better manage costs and optimize the value of your existing security investments. We also Email IBM 8 Selecting a managed security services provider provide enhanced flexibility, allowing you to choose the level of service suited to your security infrastructure and to make device configuration changes without per-device restrictions. Solutions and services from IBM systematically integrate both new and existing security capabilities, providing critical visibility and robust controls, and reducing complexity. IBM security analysts and specialists are located in 10 global security operations centers (SOCs), where they analyze 15 billion security events daily. (See Figure 1.) Security Operations Center Staffing Intelligence IBM Managed Security Services are virtually unmatched in their ability to provide the deep analytics needed to ward off the wide range of threats facing organizations today. By collecting security-relevant data via near-real-time client feeds, we embed our knowledge into our professional engagements to help conduct analyses, fraud prevention and anomaly detection. At the core of IBM Managed Security Services, the IBM X-Force research and development team provides the foundation for the proactive approach to Internet security that customers have grown to expect from IBM. In fact, the IBM X-Force team is one of the best-known commercial security research groups in the world. In addition, the IBM X-Force team serves as a trusted security advisor to federal, state and local government organizations, helping create governmental security standards and initiatives. The IBM X-Force team comprises more than 15,000 researchers, developers, analysts and specialists on security initiatives. It is responsible for over 1,000 security patents. This group of security professionals researches and evaluates vulnerabilities and security issues, develops assessment and countermeasure technology for IBM products, and educates the public about emerging Internet threats through threat reports produced throughout the year, as well as critical alerts and advisories. The IBM X-Force team maintains one of the world’s most robust threats and vulnerabilities database—the result of tens of thousands of hours of research by the team. 1st shift 2nd shift 3rd shift Atlanta, GA, United States Brisbane, Australia Brisbane, Australia Boulder, CO, United States Brussels, Belgium Hortolandia, Brazil Bangalore, India Bangalore, India Southfield, MI, United States Tokyo, Japan Wroclaw, Poland Heredia, Costa Rica Figure 1. IBM Security Operations Centers (SOCs) are staffed around the clock. Innovative security technologies IBM Managed Security Services, in addition to depending on SOC security professionals, is supported and enabled by the IBM Virtual SOC, a security-rich web-based management tool. Using the combined capabilities and intelligence of the global SOCs, the Virtual SOC provides a single interface (shown in Figure 2) for security managers to more easily monitor the security of the overall infrastructure of managed and unmanaged security devices around the clock. The Virtual SOC portal combines IBM X-Force security research with service-level data from devices across company networks, helping IT teams manage vulnerabilities discovered in their systems. Email IBM IBM Global Technology Services 9 Figure 2. The IBM Virtual Security Operations Center (SOC) portal lets you more easily monitor the security of your systems. IBM Managed Security Services clients can use the Virtual SOC portal as their single command and control center for their security management services. The security-rich web-based portal helps organizations collaborate with their team of IBM security specialists and offers the intelligence, tools and capabilities necessary to make near-real-time decisions to improve the security posture. The IBM X-Force Protection System is a highly sophisticated back-end system that delivers the ongoing security intelligence available through the Virtual SOC. It can help broaden your visibility into the attack surface, notifying you of the suspicious actors who are targeting your infrastructure and providing global statistics regarding the number of IBM customers affected, the industries targeted and the attack techniques deployed over time. Email IBM 10 Selecting a managed security services provider A cloud-based security platform and analytics engine, the IBM X-Force Protection System is built on top of a community of interest that includes nearly 4,000 customers. IBM can profile attackers by tracking the organizations contacted, the industries targeted and the techniques used. Harvesting this information, IBM can examine its customer-base, notifying customers with similar vulnerabilities and the likelihood of attack. Further, it escalates priority events to alert an IBM security analyst or client to take action and offers individualized remediation advice and capabilities, such as ticketing and integrated workflow. Analysis of the data populates near-real-time and on-demand dashboards, such as configurable home dashboards, the Suspicious Host Dashboard, the Internet Protocol (IP) Intelligence Report and the Alert Monitor. The more diverse the services and their data sets, the more valuable and actionable the analysis. By providing a single management and operational view of your entire security infrastructure—regardless of vendor or device type—the X-Force Protection System allows you to more efficiently manage your security operations, particularly if you are dealing with multiple sites. The benefits of choosing IBM Managed Security Services IBM Managed Security Services helps you reduce the need for in-house security resources by allowing you to outsource security operations or supplement existing security teams. We offer the expertise to help you better manage the complex security landscape; provide the extensive industry knowledge needed to evaluate security risk posture; and deliver innovation through security-rich, end-to-end security solutions. IBM Managed Security Services can help you: ●● ●● ●● Improve your security posture. By providing ongoing insight into emerging Internet threats and remediation recommendations, IBM Managed Security Services helps enhance protection, increase business continuity, unify policy management and protect your reputation. The IBM X-Force team delivers deep, continuous security intelligence, while the IBM Virtual SOC portal offers needed visibility, control and automation, enabling more proactive, near-real-time security management. Reduce costs. IBM Managed Security Services and the Virtual SOC can help significantly reduce escalating security management costs. IBM services are designed to reduce the total cost of ownership, allowing you to reallocate resources to other business objectives. Your organization can eliminate the cost of hiring and training additional resources to maintain proper network protection. Other cost savings may result from reduced downtime, optimized infrastructure and improved productivity. Simplify management. The IBM Virtual SOC offers a robust mechanism for enterprise-wide security management for IBM offerings and other security solutions, as well as practically all domains of risk. IBM helps increase operational efficiencies by virtually eliminating manual audit tasks and reducing the number and complexity of required security controls. IBM Managed Security Services also help reduce redundant security expenses. You can consolidate multivendor environments for easier management while more efficiently managing global operational footprints. Email IBM IBM Global Technology Services 11 ●● ●● ●● Protect service investments. With IBM Managed Security Services, you benefit from guaranteed performance-based SLAs, facilitating 100-percent accountable and reliable protection. Standardized, repeatable and predefined services and asset-based delivery founded on industry-recognized best practices help optimize service investments. Additional protection results from simplified contracts, predictable pricing and access to a broad range of flexible services from one IT service provider. Protect existing IT investments. IBM Managed Security Services are based on a vendor-neutral approach to security management, which supports a variety of device types from many vendors. Integrated services delivery allows for the seamless integration of disparate security technologies, and together with built-in security intelligence, helps improve decision making and enhance infrastructure investments. Enhanced security management is designed to extend the value of your security infrastructure investments by optimizing their performance. Manage compliance better. Through ongoing security monitoring and documented security policies and procedures, IBM Managed Security Services helps you improve your compliance management with government and industry regulations. IBM holds certifications for some of the industry’s most complex compliance regulations and can offer the expertise to assist you in implementing internal and regulatory controls for a wide range of compliance mandates. IBM enables integrated delivery of security technologies required by many regulations, such as firewalls, intrusion protection systems, vulnerability management, and security event and log management. IBM: Delivering confidence, simplicity and value Outsourcing your managed security needs helps you to improve your security stature, reduce operational costs and focus key IT personnel on core business functions. Central to the success of a security outsourcing decision is choosing the right provider. Organizations should seek a provider with a history of reliable service and financial stability, along with reliable SLAs that include guaranteed protection. A redundant global network of SOCs staffed by experienced security specialists and robust, continually evolving set of services can better protect security investments and the enterprise. IBM Managed Security Services is designed to help organizations benefit from improved operational, financial and strategic efficiencies across the enterprise and, most importantly, gain the ability to advance their security management practices. Companies that choose IBM can quickly gain confidence by working in collaboration with the world-class IBM X-Force security team. They also appreciate the simplicity offered by the IBM Managed Security Services Virtual SOC portal. Just as important, IBM’s 10 global SOCs deliver consistent, premium levels of managed security services, offering optimum value for organizations counting on IBM to support their risk management objectives. Email IBM For more information To learn more about the IBM Managed Security Services, please contact your IBM representative or IBM Business Partner, or visit the following website: ibm.com/services/us/iss Additionally, IBM Global Financing can help you acquire the IT solutions that your business needs in the most cost-effective and strategic way possible. We’ll partner with credit-qualified clients to customize an IT financing solution to suit your business goals, enable effective cash management, and improve your total cost of ownership. IBM Global Financing is your smartest choice to fund critical IT investments and propel your business forward. For more information, visit: ibm.com/financing © Copyright IBM Corporation 2014 IBM Corporation IBM Global Technology Services Route 100 Somers, NY 10589 Produced in the United States of America March 2014 IBM, the IBM logo, ibm.com, and X-Force are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at ibm.com/legal/copytrade.shtml This document is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates. It is the user’s responsibility to evaluate and verify the operation of any other products or programs with IBM products and programs. THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided. 1A commissioned study conducted by Forrester Consulting on behalf of IBM, “Surviving the technical security skills crisis: An assessment of the current security skills landscape and how to overcome it,” May 2013. 2 Gartner Research note: “Magic Quadrant for Global MSSPs”– Kelly M. Kavanagh, February 26, 2014, G00247003 3 Forrester Research, Inc., “The Forrester Wave™: Information security consulting services,” Q1 2013, February 2013. Please Recycle SEW03026-USEN-02
© Copyright 2026 Paperzz