{"id":4444,"date":"2015-08-25T16:00:53","date_gmt":"2015-08-25T16:00:53","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=4444"},"modified":"2019-11-15T13:56:44","modified_gmt":"2019-11-15T11:56:44","slug":"security-of-virtual-infrastructure-errors-may-cost","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/security-of-virtual-infrastructure-errors-may-cost\/4444\/","title":{"rendered":"Security of virtual infrastructure: errors may cost"},"content":{"rendered":"<p>Businesses pay a significant premium to recover from a cyber attack, if the virtual infrastructure is affected during the incident. This is the surprising finding of a special report on the Security of Virtual Infrastructure prepared by Kaspersky Lab, based on a worldwide survey of 5,500 companies conducted in cooperation with B2B International in 2015. This may look strange, even somewhat counter-intuitive, but the explanation is rather simple.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Security of #virtual infrastructure: errors may cost. #enterprisesec<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F23BC&amp;text=Security+of+%23virtual+infrastructure%3A+errors+may+cost.+%23enterprisesec+\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><strong>Figures<\/strong><\/p>\n<p>When the virtual infrastructure is affected, enterprises pay more than $800,000 on average to recover from a security breach, the report finds, which is twice as much compared to incidents involving only physical infrastructure. SMBs experience the same pattern: On average, SMBs reported damage of more than $26,000 for an attack on their physical infrastructure. However, the involvement of virtual infrastructure in a security breach drives the cost up closer to $60,000.<\/p>\n<p>The report also finds that the\u00a0majority of businesses use virtual infrastructure for their most important operations. While an attack on physical nodes leads to the temporary loss of access to business critical information in 36% of incidents reported, this rises to 66% when a breach affects virtual servers and desktops.<\/p>\n<p>Attacks affecting virtual environments also more frequently require additional budget on third-party expertise. Businesses have to request help not only from IT consultants, but also lawyers, risk management experts, and others.<\/p>\n<p><strong>And the reasons are\u2026<\/strong><\/p>\n<p>Up to 62% of businesses use virtualization in some form, while only 56% are fully prepared to deal with security risks in their virtual environment.<\/p>\n<p>The complexity of security measures in a virtual environment, as well as an incorrect perception of the threat landscape, are two additional elements that increase the cost of recovery in the virtual environment. Kaspersky Lab\u2019s report shows that 42% of businesses believe that security risks in virtual environments are significantly lower than in \u2018physical\u2019 environments (wrong). 45% of companies report that security management in virtual environments is perceived as a problem. Furthermore, only 27% of businesses have deployed a security solution specifically designed for the virtual environment. 34% are not even aware such a solution exists on the market.<\/p>\n<p>This means that if they do protect their virtual machines parks, they most likely use the client-based security solutions tailored for use with the physical devices (PCs, servers, etc.). That makes a huge impact on virtual infrastructure, even if provides a decent level of security.<\/p>\n<p><strong>Diminished advantages<\/strong><\/p>\n<p>Virtualization offers a lot of advantages, and the possibility to speed things up isn\u2019t the least of them. However, these advantages tend to fade away if the virtual systems security is approached from the wrong angle.<\/p>\n<p>The traditional client-based solutions used within the virtual infrastructure may put heavy strain on the hypervizor: one of the simpliest reasons is the duplication of their own resources and consumption of the physical resources. This kills the very idea of virtualization. Why talk about fast and dynamic resource allocation within an enterprise infrastructure if it crawls?<\/p>\n<p>Kaspersky Lab\u2019s own product tailored specifically for protection of virtual infrastructures uses a very different approach. Its primary idea is to reduce the resource\u2019s drain, so that dynamic changes within the virtual infrastructure stay dynamic, without any \u2018crawling\u2019. This is achieved via the centralization of protection.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Enterprises pay over\u00a0$800,000 on average to recover from a security breach affecting virtual infrastructure. #enterprisesec<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F23BC&amp;text=Enterprises+pay+over%C2%A0%24800%2C000+on+average+to+recover+from+a+security+breach+affecting+virtual+infrastructure.+%23enterprisesec+\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Depending upon the virtualization platform, there are agentless variants and so-called \u2018Light Agents\u2019, when every VM is equipped with a small piece of software acting in the similar way to a full-scale security agent, but without straining the server. In both cases, there is \u2018the core\u2019 \u2013 a virtual appliance installed on the host, which actually performs all resource-intensive security processing, thus providing immediate protection for every virtual machine, both existing and new. The solution also has a unified, centralized database on all threats, so there is no unnecessary data duplication. Also, there is Shared Cache, which ensures that the same file opened on several different VMs is scanned only once: The scanning engine\u2019s initial verdict is shared within all of the environments, so unless the \u2018good\u2019 file is changed or a user requests a new scan manually, it will be considered safe and won\u2019t be scanned again.<\/p>\n<p>In recent years it\u2019s become clear that virtual PCs (especially those with Windows installed) require protection from cyberthreats as well as physical ones. Machines may be virtual, but they are still used to work with sensitive data, and a loss can have very real and, as shown above, very costly consequences. Businesses expect virtual infrastructure to drive down their IT spend and streamline their infrastructure.<\/p>\n<p>However, the survey results show expenses may exceed the benefit if the security of virtual systems isn\u2019t approached correctly. And the right approach, in our view, is the solution that has a low impact on resources, a high detection rate, and the ability to spot suspicious activity right away, preventing security breaches in the virtual infrastructure.<\/p>\n<p>The full text of the report <strong>Security of Virtual Infrastructure<\/strong>\u00a0is available <a href=\"https:\/\/press.kaspersky.com\/files\/2015\/08\/IT_Risks_Survey_Report_Virtualization.pdf\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new Kaspersky Lab report finds businesses pay a significant premium to recover from a cyber attack if the virtual infrastructure is affected during the incident. <\/p>\n","protected":false},"author":209,"featured_media":15587,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3021],"tags":[2091,1104],"class_list":{"0":"post-4444","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-kaspersky-security-for-virtualization","10":"tag-virtualization"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/security-of-virtual-infrastructure-errors-may-cost\/4444\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/security-of-virtual-infrastructure-errors-may-cost\/4444\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/security-of-virtual-infrastructure-errors-may-cost\/4444\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/kaspersky-security-for-virtualization\/","name":"Kaspersky Security for Virtualization"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/4444","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=4444"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/4444\/revisions"}],"predecessor-version":[{"id":24535,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/4444\/revisions\/24535"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/15587"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=4444"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=4444"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=4444"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}