#ITtrends #ITTRENDS SYMANTEC VISION
|
|
- Primrose Kelley
- 8 years ago
- Views:
Transcription
1 #ITtrends 1
2 Strategies for Security and Management in a Mobile and Virtual World Anil Chakravarthy Senior Vice President, Enterprise Security Group 2
3 MASSIVE INCREASE IN SOPHISTICATED ATTACKS 403 million unique malware variants in % increase year-over-year in malicious attacks 6x increase in targeted attacks during million identities exposed in % of enterprises believe they cannot respond to latest threats Source: Symantec Internet Security Threat Report; 2012; Threat Management Survey
4 NEW ATTACK SURFACES Mobile / Device Proliferation 93% increase in mobile malware in 2011 >80% chance of breach attempts when smartphones are lost Cloud Data / Apps 82% of enterprises cite security as top challenge for cloud strategy by % of global 1000 will store customer data in the cloud Virtualized Environments 97% of all data compromised involved servers 40% of SMBs completely secure virtual applications 4 4
5 Managed Unmanaged Device-centric App-centric SECURE AND MANAGE MOBILE DEVICES A Context-Based Approach BYOD Company Owned But Unmanaged Company Controls Relevant Apps & Data Only Company Controls Standard Devices Company-owned Company Controls Personal Devices Personally-owned 5
6 Control Points FIVE PILLARS FOR ENTERPRISE MOBILITY User & App Access App & Data Protection Device Management Threat Protection Secure File Sharing Device Apps Data User 6
7 NEW MOBILITY OFFERINGS Mobile Management Single SKU All use cases User-based, subscription pricing App Center Ready Program Global catalogue of enterprise-ready apps Data protection Central administration 7
8 DIMENSIONS OF CLOUD PROTECTION Protection delivered from the cloud Simplify IT operations by outsourcing security to Symantec (Symantec.Cloud, Web and Security) Protection for public cloud interactions Safely leverage 3rd party clouds Mitigate shadow IT (VMWare integrations with CCS, DLP, CSP) Protection for information traveling to and from the cloud Ensure business continuity with certificate management (SSL) Protect apps with code signing Protection for clouds that you build Ensure private cloud build outs are secure and compliant (Encryption, Symantec O 3 ) 8
9 PROTECTED ACCESS TO CLOUD SERVICES Symantec O 3 One Login with Strong Credentials O Identity-based Access Control 3 Application Visibility and Audit Information Protection Private Cloud 9
10 DEMO SYMANTEC O 3 Nicolas Popp, VP Engineering 10
11 SECURE VIRTUALIZED DATA CENTERS Secure Virtual Infrastructures Maintain Endpoint Performance Ensure Compliance Across Workloads Harden vcenter and Hypervisors (VMware hardening guidelines) Monitor vcenter and Hypervisors Unrivaled security Blazing performance Vshield integration Identify rogue, vulnerable or noncompliant virtual machines Integrate VMware prescribed standards 11
12 VIRTUALIZE WITHOUT COMPROMISE Critical System Protection Harden the underlying OS until patched VM1 VM2 VM3 APP APP APP Harden the underlying OS and lock down the vcenter application Harden and protect ESX while monitoring configuration changes to ESXi WINDOWS OS NON-WINDOWS OS ESX/ESXi OS vcenter Deliver fine-grained access control and real-time File Integrity Monitoring 12
13 SYMANTEC ENDPOINT PROTECTION Best Performance in Virtualized Environments Insight & SONAR technology # 1 market share 8.5M+ V12 users Leader Gartner EPP Magic Quadrant Coming Soon: Symantec Endpoint Protection Mountain Lion 13
14 PROTECT THE FOUNDATION Control Compliance Suite Data Loss Prevention and Encryption O 3 Cloud Firewall Zones for Enterprise Endpoint & Datacenter Protection VeriSign Identity Protection Symantec Protects People and Information Mobile App Security SSL & Code Signing IT Management Suite Managed Security Services Mail & Web Security Mobile Device Management 14
15 SYMANTEC GLOBAL INTELLIGENCE NETWORK Attack Quarantine System Endpoints Gateways Analysts Hosted Intelligence Honeypots DeepSight Global Sensor Network Analytics 3 rd Party Affiliates Global Data Collection Big Data Analytics Warehouse Intelligence Feeds Probes in 200 countries & territories Visibility into 30% of global traffic Over 2 million decoy accounts 15
16 SYMANTEC ENCRYPTION Symantec File Share Encryption, Powered by PGP Technology Protects confidential data and sets user access policies on file sharing services, Dropbox Access encrypted data on iphone and ipad while keeping info protected Mobile encryption for ios and Android Symantec O 3 16
17 SYMANTEC FILE SHARE ENCRYPTION DEMO Save a file to Dropbox automatically encrypt 17
18 SYMANTEC FILE SHARE ENCRYPTION DEMO Save a file to Dropbox automatically encrypt 18
19 SYMANTEC FILE SHARE ENCRYPTION DEMO Accessible via Dropbox 19
20 SYMANTEC FILE SHARE ENCRYPTION DEMO but not readable 20
21 SYMANTEC FILE SHARE ENCRYPTION DEMO Permission to open on approved clients 21
22 SYMANTEC FILE SHARE ENCRYPTION DEMO ios File Viewer safety and mobility 22
23 SYMANTEC DATA LOSS PREVENTION Intellectual Property Mobile Cloud Vector Machine Learning Technology DLP 11 DLP protection for ipads, iphones DLP 11.5 Social networking Office 365 Sharepoint DLP
24 SYMANTEC MANAGED SECURITY SERVICES Enhanced Security Operations Portal Context-Aware Security Analytics DeepSight integration User-configured dashboards Enhanced on-demand reporting* Leverage customer and Security intelligence to prioritize responses* Expanded advanced threat detection* * First half of
25 SYMANTEC ENDPOINT MANAGEMENT Comprehensive Management for Today s Environments Manage Anywhere Device Management Application Management Powerful Reporting Remote users and sites Manage endpoints over the Internet Consistent management across diverse platforms Single console management extends to mobile devices Smarter patch management Dependable application virtualization and streaming Agent management for endpoint and DLP Data insight for faster remediation and planning Integrated reporting across management and security 25
26 MAKE SECURITY RELEVANT TO THE BUSINESS Symantec Protection Center Executive dashboard for security Oversight and action SPC Mobile Executive Security Dashboard Role-Based Dashboards and Reports Security Metrics Symantec Connectors Business Asset System Central Data Repository Security Workflows 3 rd Party Connectors SPC Enterprise Data Collection and Analytics Platform Consolidate security information Key IT security metrics Threat intelligence feeds Business view of IT risk Prioritize action plan for remediation 26
27 DEMO SYMANTEC PROTECTION CENTER Joe Bertnick, Director Product Management 27
28 INSIGHTS INTO YOUR SECURITY POSTURE Symantec Malicious Activity Assessment GOAL Discover the presence of malware & botnet activity APPROACH 7 to 15 day, non-invasive assessment using Symantec Web Gateway RESULTS Immediate, specific guidance on improving security posture Engage Discover Report 28
29 SYMANTEC S LEADERSHIP IN ENTERPRISE SECURITY # We protect 1 billion systems around the world Gartner MQ Leader in 6 of 6 security segments The Largest IT Security Company in the world 29
30 SESSIONS YOU DON T WANT TO MISS Risk Management Dashboard at Your Fingertips: Symantec Protection Center Mobile Overview Nov to Look Inside O 3 : Symantec s New Cloud Security Platform Breakout Nov to Symantec Endpoint Protection 12 Customer Panel Nov to Endpoint Management: State of the Union and Vision Nov to Roadmap: The Future of Encryption at Symantec Nov to Adding Security Intelligence to Your Existing Solutions for Enhanced Protection Nov to
31 Thank you! Copyright 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 31