#ITtrends #ITTRENDS SYMANTEC VISION

Size: px
Start display at page:

Download "#ITtrends #ITTRENDS SYMANTEC VISION 2012 1"

Transcription

1 #ITtrends 1

2 Strategies for Security and Management in a Mobile and Virtual World Anil Chakravarthy Senior Vice President, Enterprise Security Group 2

3 MASSIVE INCREASE IN SOPHISTICATED ATTACKS 403 million unique malware variants in % increase year-over-year in malicious attacks 6x increase in targeted attacks during million identities exposed in % of enterprises believe they cannot respond to latest threats Source: Symantec Internet Security Threat Report; 2012; Threat Management Survey

4 NEW ATTACK SURFACES Mobile / Device Proliferation 93% increase in mobile malware in 2011 >80% chance of breach attempts when smartphones are lost Cloud Data / Apps 82% of enterprises cite security as top challenge for cloud strategy by % of global 1000 will store customer data in the cloud Virtualized Environments 97% of all data compromised involved servers 40% of SMBs completely secure virtual applications 4 4

5 Managed Unmanaged Device-centric App-centric SECURE AND MANAGE MOBILE DEVICES A Context-Based Approach BYOD Company Owned But Unmanaged Company Controls Relevant Apps & Data Only Company Controls Standard Devices Company-owned Company Controls Personal Devices Personally-owned 5

6 Control Points FIVE PILLARS FOR ENTERPRISE MOBILITY User & App Access App & Data Protection Device Management Threat Protection Secure File Sharing Device Apps Data User 6

7 NEW MOBILITY OFFERINGS Mobile Management Single SKU All use cases User-based, subscription pricing App Center Ready Program Global catalogue of enterprise-ready apps Data protection Central administration 7

8 DIMENSIONS OF CLOUD PROTECTION Protection delivered from the cloud Simplify IT operations by outsourcing security to Symantec (Symantec.Cloud, Web and Security) Protection for public cloud interactions Safely leverage 3rd party clouds Mitigate shadow IT (VMWare integrations with CCS, DLP, CSP) Protection for information traveling to and from the cloud Ensure business continuity with certificate management (SSL) Protect apps with code signing Protection for clouds that you build Ensure private cloud build outs are secure and compliant (Encryption, Symantec O 3 ) 8

9 PROTECTED ACCESS TO CLOUD SERVICES Symantec O 3 One Login with Strong Credentials O Identity-based Access Control 3 Application Visibility and Audit Information Protection Private Cloud 9

10 DEMO SYMANTEC O 3 Nicolas Popp, VP Engineering 10

11 SECURE VIRTUALIZED DATA CENTERS Secure Virtual Infrastructures Maintain Endpoint Performance Ensure Compliance Across Workloads Harden vcenter and Hypervisors (VMware hardening guidelines) Monitor vcenter and Hypervisors Unrivaled security Blazing performance Vshield integration Identify rogue, vulnerable or noncompliant virtual machines Integrate VMware prescribed standards 11

12 VIRTUALIZE WITHOUT COMPROMISE Critical System Protection Harden the underlying OS until patched VM1 VM2 VM3 APP APP APP Harden the underlying OS and lock down the vcenter application Harden and protect ESX while monitoring configuration changes to ESXi WINDOWS OS NON-WINDOWS OS ESX/ESXi OS vcenter Deliver fine-grained access control and real-time File Integrity Monitoring 12

13 SYMANTEC ENDPOINT PROTECTION Best Performance in Virtualized Environments Insight & SONAR technology # 1 market share 8.5M+ V12 users Leader Gartner EPP Magic Quadrant Coming Soon: Symantec Endpoint Protection Mountain Lion 13

14 PROTECT THE FOUNDATION Control Compliance Suite Data Loss Prevention and Encryption O 3 Cloud Firewall Zones for Enterprise Endpoint & Datacenter Protection VeriSign Identity Protection Symantec Protects People and Information Mobile App Security SSL & Code Signing IT Management Suite Managed Security Services Mail & Web Security Mobile Device Management 14

15 SYMANTEC GLOBAL INTELLIGENCE NETWORK Attack Quarantine System Endpoints Gateways Analysts Hosted Intelligence Honeypots DeepSight Global Sensor Network Analytics 3 rd Party Affiliates Global Data Collection Big Data Analytics Warehouse Intelligence Feeds Probes in 200 countries & territories Visibility into 30% of global traffic Over 2 million decoy accounts 15

16 SYMANTEC ENCRYPTION Symantec File Share Encryption, Powered by PGP Technology Protects confidential data and sets user access policies on file sharing services, Dropbox Access encrypted data on iphone and ipad while keeping info protected Mobile encryption for ios and Android Symantec O 3 16

17 SYMANTEC FILE SHARE ENCRYPTION DEMO Save a file to Dropbox automatically encrypt 17

18 SYMANTEC FILE SHARE ENCRYPTION DEMO Save a file to Dropbox automatically encrypt 18

19 SYMANTEC FILE SHARE ENCRYPTION DEMO Accessible via Dropbox 19

20 SYMANTEC FILE SHARE ENCRYPTION DEMO but not readable 20

21 SYMANTEC FILE SHARE ENCRYPTION DEMO Permission to open on approved clients 21

22 SYMANTEC FILE SHARE ENCRYPTION DEMO ios File Viewer safety and mobility 22

23 SYMANTEC DATA LOSS PREVENTION Intellectual Property Mobile Cloud Vector Machine Learning Technology DLP 11 DLP protection for ipads, iphones DLP 11.5 Social networking Office 365 Sharepoint DLP

24 SYMANTEC MANAGED SECURITY SERVICES Enhanced Security Operations Portal Context-Aware Security Analytics DeepSight integration User-configured dashboards Enhanced on-demand reporting* Leverage customer and Security intelligence to prioritize responses* Expanded advanced threat detection* * First half of

25 SYMANTEC ENDPOINT MANAGEMENT Comprehensive Management for Today s Environments Manage Anywhere Device Management Application Management Powerful Reporting Remote users and sites Manage endpoints over the Internet Consistent management across diverse platforms Single console management extends to mobile devices Smarter patch management Dependable application virtualization and streaming Agent management for endpoint and DLP Data insight for faster remediation and planning Integrated reporting across management and security 25

26 MAKE SECURITY RELEVANT TO THE BUSINESS Symantec Protection Center Executive dashboard for security Oversight and action SPC Mobile Executive Security Dashboard Role-Based Dashboards and Reports Security Metrics Symantec Connectors Business Asset System Central Data Repository Security Workflows 3 rd Party Connectors SPC Enterprise Data Collection and Analytics Platform Consolidate security information Key IT security metrics Threat intelligence feeds Business view of IT risk Prioritize action plan for remediation 26

27 DEMO SYMANTEC PROTECTION CENTER Joe Bertnick, Director Product Management 27

28 INSIGHTS INTO YOUR SECURITY POSTURE Symantec Malicious Activity Assessment GOAL Discover the presence of malware & botnet activity APPROACH 7 to 15 day, non-invasive assessment using Symantec Web Gateway RESULTS Immediate, specific guidance on improving security posture Engage Discover Report 28

29 SYMANTEC S LEADERSHIP IN ENTERPRISE SECURITY # We protect 1 billion systems around the world Gartner MQ Leader in 6 of 6 security segments The Largest IT Security Company in the world 29

30 SESSIONS YOU DON T WANT TO MISS Risk Management Dashboard at Your Fingertips: Symantec Protection Center Mobile Overview Nov to Look Inside O 3 : Symantec s New Cloud Security Platform Breakout Nov to Symantec Endpoint Protection 12 Customer Panel Nov to Endpoint Management: State of the Union and Vision Nov to Roadmap: The Future of Encryption at Symantec Nov to Adding Security Intelligence to Your Existing Solutions for Enhanced Protection Nov to

31 Thank you! Copyright 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 31