[ISN] Managed Services on the Rise

From: InfoSec News (alerts@private)
Date: Wed Nov 08 2006 - 22:11:32 PST


Forwarded from: Security UPDATE <Security_UPDATE (at) list.windowsitpro.com>

PLEASE VISIT OUR SPONSORS, WHO BRING YOU SECURITY UPDATE FOR FREE:

If Your Internet Access is Vulnerable, So are You!
   http://list.windowsitpro.com/t?ctl=3F448:7EB890

PatchLink and SMS: Now You Need Both. Free Report.
   http://list.windowsitpro.com/t?ctl=3F456:7EB890

PC on a Stick: A Portable Endpoint Security Nightmare
   http://list.windowsitpro.com/t?ctl=3F442:7EB890


=== CONTENTS ===================================================

IN FOCUS: Managed Services on the Rise

NEWS AND FEATURES
   - Image-Based Spam Increasing
   - Vulnerabilities in Firefox 2.0, IE 7.0, Drupal, and 
Yahoo! Messenger
   - Security Log Collection
   - Recent Security Vulnerabilities

GIVE AND TAKE
   - Security Matters Blog: Long Week in the Linux Trenches
   - Share Your Security Tips
   - FAQ: Circular Logging in Exchange Server
   - Know Your IT Security Contest
   - Microsoft Learning Paths for Security: Unifying Malware Protection 
for Better Desktop Defense 

PRODUCTS
   - Do You Know Where Your Data Is?
   - Wanted: Your Reviews of Products 

RESOURCES AND EVENTS

FEATURED WHITE PAPER

ANNOUNCEMENTS


=== SPONSOR: St. Bernard Software ==============================

If Your Internet Access is Vulnerable, So are You!
   If you're not filtering Web access, you could be inviting lawsuits. 
Employees who download pornographic, hostile or racist material can 
leave you wide open to costly litigation. iPrism, the Web filtering 
appliance from St. Bernard, helps you enforce your Acceptable Usage 
Policy and avoid trouble. Download your free e-Policy Guide with AUP 
templates today!
   http://list.windowsitpro.com/t?ctl=3F448:7EB890


=== IN FOCUS: Managed Services on the Rise =====================
   by Mark Joseph Edwards, News Editor, mark at ntsecurity / net

Managed services are growing in popularity, with the support of many 
network administrators. The value of managed services is clear: They 
offload a lot of burden from a company, saving it time and money and 
reducing learning curves to a nearly flat line in some cases. Plus, 
managed services provide the advantage of knowing someone is there 
watching a service 24 hours a day, even on holidays. 

Because managed services are such a red hot market, consolidation is 
occurring at a blistering pace. The most recent movement comes from BT 
Group, global provider of communications solutions and managed 
services, which announced that it acquired Counterpane Internet 
Security, a provider of managed network security services. Counterpane, 
servicing some 550 companies, is now part of BT Global Services, a 
division of BT Group. 

This latest acquisition comes on the heels of other recent major 
acquisitions and mergers. In late September 2006, SecureWorks and LURHQ 
merged under the SecureWorks name. Together the companies provide 
managed security services to an estimated 1500 clients. In late August, 
IBM announced that it had reached a deal to acquire Internet Security 
Systems (ISS) for $1.3 billion in cash. ISS, a definitive leader in 
software-based and hardware-based solutions, also provides managed 
security services. 

Another managed services provider, Perimeter Internetworking, has 
acquired seven companies during the past several years: ANE 
Technologies, Red Cliff Solutions, Internet Threat Management, IRW 
Services, US Networks, Guarded Networks, and Breakwater Security 
Associates. If Perimeter wants to be acquired, its own recent 
acquisitions make it ripe for that possibility. Earlier this year, 
SurfControl acquired BlackSpider Technologies, and late last month, 
SurfControl announced two new managed security services offerings for 
Web and email protection. 

The merger and acquisition trends fit with industry analyst projections 
for increasing interest in the overall managed services sector. In 
February, a spokesperson for Insight Research said, "The US managed 
services market will grow at a compounded rate of 22 percent over the 
next five years due to growth in all segments of the managed services 
value chain." The company also said that revenues in the market sector 
will grow from $34 billion in 2006 to nearly $94 billion in 2011. 

"Because they can offer around-the-clock monitoring of network 
performance, improved application performance, and predictable service 
levels, managed service providers are in a unique position to expand 
their business in an effort to address the growth of this market," said 
Insight President Robert Rosenberg.

In a study commissioned by Cisco Systems, research firm Ovum said that 
it expects the global managed services market to reach $41.5 billion 
per year by 2009. The study results include predictions that by 2009, 
managed VPNs will account for 53 percent of the managed services market 
and that managed VoIP will account for the fastest growth with a 65 
percent compound annual growth rate. The study also indicates that 
Europe, the Middle East, and Africa are adopting managed services 
faster than any other region, with North America being the second 
fastest adopter. 

"More and more business customers want service providers to deploy and 
manage their network solutions to reduce costs and improve 
reliability," said Peter Hall, research director at Ovum. "Significant 
opportunities exist for service providers developing and delivering 
managed services, especially in the areas of multi-service IP VPN, IP 
communications, security and Metro Ethernet."

If you aren't using managed services, you might consider looking into 
how they could benefit your company. And if you're looking to head out 
on your own into the world of business start-ups, the managed services 
market space is a good one to look into. 


=== SPONSOR: PatchLink =========================================

PatchLink and SMS: Now You Need Both. Free Report.
   New Free White Paper reveals why organizations can no longer afford 
to choose to have one versus the other. To truly counter emerging 
vulnerabilities and new threats, companies now need to embrace a tandem 
PatchLink-SMS complementary solution. Learn why this can be a low risk, 
high ROI solution.
   http://list.windowsitpro.com/t?ctl=3F456:7EB890


=== SECURITY NEWS AND FEATURES =================================

Image-Based Spam Increasing
   Finding spam in text- and HTML-based messages is possible thanks to 
a variety of detection and filtering mechanisms. However, when spammers 
embed their message text into images, detection takes on a new level of 
difficulty. Secure Computing said that it sees a growing trend towards 
this type of message delivery.
   http://list.windowsitpro.com/t?ctl=3F44E:7EB890

Vulnerabilities in Firefox 2.0, IE 7.0, Drupal, and Yahoo! Messenger
   Learn about recently discovered security exposures in these popular 
software products.
   http://list.windowsitpro.com/t?ctl=3F44D:7EB890

Security Log Collection
   The growing requirement for statutory and regulatory compliance has 
many systems administrators scrambling for a way to manage their 
security logs more effectively. John Howie looks at some criteria you 
can use to help choose a security log management tool. 
   http://list.windowsitpro.com/t?ctl=3F44C:7EB890

Recent Security Vulnerabilities
   If you subscribe to this newsletter, you also receive Security 
Alerts, which inform you about recently discovered security 
vulnerabilities. You can also find information about these 
discoveries at
   http://list.windowsitpro.com/t?ctl=3F446:7EB890


=== SPONSOR: Securewave ========================================

PC on a Stick: A Portable Endpoint Security Nightmare
   Threats to your data don't just come from the outside - they can 
come from internally as well, whether a result of malicious intent or 
unintentional negligence. Download this free whitepaper today to learn 
to effectively establish and enforce security policies for all 
applications and devices in use on your network. 
   http://list.windowsitpro.com/t?ctl=3F442:7EB890


=== GIVE AND TAKE ==============================================

SECURITY MATTERS BLOG: Long Week in the Linux Trenches 
   by Mark Joseph Edwards, http://list.windowsitpro.com/t?ctl=3F454:7EB890

Last week, I spent nearly every waking moment working on new Linux 
servers. Being predominantly a Windows guy, I'm rather pleased at my 
success so far, painful as it might have come.
   http://list.windowsitpro.com/t?ctl=3F44F:7EB890

FAQ: Circular Logging in Exchange Server
   by John Savill, http://list.windowsitpro.com/t?ctl=3F452:7EB890 

Q: How do I enable circular logging for a Microsoft Exchange Server 
storage group? 

Find the answer at
   http://list.windowsitpro.com/t?ctl=3F44B:7EB890

KNOW YOUR IT SECURITY Contest
   Share your security-related tips, comments, or solutions in 1000 
words or less, and you could be one of 13 lucky winners of a Zune media 
player. Tell us how you do patch management, share a security script, 
or write about a security article you've read or a Webcast you've 
viewed. Submit your entry between now and December 13. We'll select the 
13 best entries, and the winners will receive a Zune media player--
plus, we'll publish the winning entries in the Windows IT Security 
newsletter. Email your contributions to tipswinitsec@private
   Prizes are courtesy of Microsoft Learning Paths for Security: 
   http://list.windowsitpro.com/t?ctl=3F450:7EB890

MICROSOFT LEARNING PATHS FOR SECURITY: Unifying Malware Protection for 
Better Desktop Defense
   Ensuring end-user security can be an administrator's biggest 
challenge. Use these resources to find malware protection solutions to 
help guard against emerging threats like spyware and rootkits, as well 
as traditional threats such as viruses, worms, and Trojan horses. Plus, 
learn how Microsoft Forefront Client Security can help centralize 
management and provide critical visibility into threats and 
vulnerabilities.
   http://list.windowsitpro.com/t?ctl=3F450:7EB890


=== PRODUCTS ===================================================
   by Renee Munshi, products@private

Do You Know Where Your Data Is?
   GTB Technologies introduced GTB Data at Rest Manager (GTB DARM), 
software that scans computers on an enterprise network and detects 
sensitive data that's stored outside of appropriate locations. GTB DARM 
uses the same detection technology as the company's GTB Inspector 
hardware appliance to find sensitive data even if it's heavily 
modified, converted to another format, extracted, compressed, or 
changed in other ways. GTB DARM pricing starts at $20,000, and the 
product is available now. For more information, go to
   http://list.windowsitpro.com/t?ctl=3F458:7EB890

WANTED: your reviews of products you've tested and used in 
production. Send your experiences and ratings of products to 
whatshot@private and get a Best Buy gift certificate.


=== RESOURCES AND EVENTS =======================================
   For more security-related resources, visit
   http://list.windowsitpro.com/t?ctl=3F451:7EB890

No IT pro today works in a completely homogeneous environment, and with 
virtualization, your chances of dealing with multiple OSs is 
increasing. Attend TechX World--available online December 14--and find 
out about virtualization, OS interoperability, directory and security 
integration, and data interoperability. Register today for free! 
   http://list.windowsitpro.com/t?ctl=3F44A:7EB890

Did you know that 75% of corporate intellectual property resides in 
email? The challenges facing this vital business application range from 
spam to the costly impact of downtime and the need for effective, 
centralized email storage systems. Join us for a free Web seminar and 
learn the key features of a holistic approach to managing email 
security, availability, and control. Live Event: Thursday, November 16. 
   http://list.windowsitpro.com/t?ctl=3F440:7EB890 

BONUS: Register for any Web seminar--live or on-demand--during the 
month of November, and you could win a PS3! View a full list of 
eligible seminars at
   http://list.windowsitpro.com/t?ctl=3F445:7EB890

Information is the "I" in "IT." Do you know where your information is? 
Is it protected? Backed up? Download this free podcast today to find 
out the top 5 reasons that you should be considering storage 
consolidation.  
   http://list.windowsitpro.com/t?ctl=3F444:7EB890

When disaster strikes your Windows, SQL Server, or Exchange servers, 
you need answers. Make sure that if an emergency occurs, you're 
prepared. Get the full eBook and get started on your recovery plan 
today! 
   http://list.windowsitpro.com/t?ctl=3F443:7EB890

Your business, like most today, relies upon its computing systems to 
store financial information, house proprietary data, and maintain 
communications channels. This increasing reliance also increases the 
dangers to your systems from security breaches, including viruses, 
spyware, spam, and hackers. Visit the Windows Protection Site at 
http://list.windowsitpro.com/t?ctl=3F455:7EB890 for the latest tips on 
safeguarding your system.

When disaster strikes, do you feel like you're digging for buried 
treasure to recover your data? Test your disaster recovery skills, and 
you could win! Each week we'll give away a USB flash drive to one lucky 
treasure hunter. You'll also be entered to win the full treasure chest, 
including Bose headphones! Test your skills now! 
   http://list.windowsitpro.com/t?ctl=3F447:7EB890


=== FEATURED WHITE PAPER =======================================

Does your business require collaboration to get projects done? If so, 
you're at risk for having your valuable business data accidentally 
transferred to outside parties. Using enterprise rights management can 
help mitigate this risk and allow your users to work with confidence. 
Learn to extend Windows Rights Management Services to protect your 
digital information today! 
   http://list.windowsitpro.com/t?ctl=3F441:7EB890


=== ANNOUNCEMENTS ==============================================

Save $40 off Windows IT Pro  
   Subscribe to Windows IT Pro today and SAVE $40! Along with your 12 
issues, you'll get FREE access to the entire Windows IT Pro online 
article archive, which houses more than 9,000 helpful IT articles. This 
offer expires on November 30, 2006, so order now:  
   https://store.pentontech.com/index.cfm?s=1&promocode=eu206buw

Special Invitation for VIP Access 
   Become a VIP subscriber and get continuous, inside access to ALL the 
content published in Windows IT Pro, SQL Server Magazine, and the 
Exchange and Outlook Administrator, Windows Scripting Solutions, and 
Windows IT Security newsletters. Subscribe now and SAVE $100:
   https://store.pentontech.com/index.cfm?s=1&promocode=eu276buv


================================================================

Security UDPATE is brought to you by the Windows IT Pro Web site's 
Security page (first URL below) and the Windows IT Security newsletter 
(subscribe at the second URL below).
   http://list.windowsitpro.com/t?ctl=3F453:7EB890
   https://store.pentontech.com/index.cfm?s=1&promocode=eu255xsb

Subscribe to Security UPDATE at
   http://list.windowsitpro.com/t?ctl=3F449:7EB890

Be sure to add Security_UPDATE@private 
to your antispam software's list of allowed senders.

To contact us: 
   About Security UPDATE content -- letters@private
   About technical questions -- http://list.windowsitpro.com/t?ctl=3F457:7EB890
   About your product news -- products@private
   About your subscription -- windowsitproupdate@private
   About sponsoring Security UPDATE -- salesopps@private

View the Windows IT Pro privacy policy at
   http://www.windowsitpro.com/AboutUs/Index.cfm?action=privacy

Windows IT Pro, a division of Penton Media, Inc.
221 East 29th Street, Loveland, CO 80538
Attention: Customer Service Department

Copyright 2006, Penton Media, Inc. All rights reserved.


_________________________________
Visit the InfoSec News store!
http://www.shopinfosecnews.org 



This archive was generated by hypermail 2.1.3 : Wed Nov 08 2006 - 22:28:00 PST