Jeff Warson, GCIH, SCPS, CISSP, CCSK Sr. Principal Security Strategist Symantec Corpora5on



Similar documents
Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP

Symantec DLP Overview. Jonathan Jesse ITS Partners

Gartner Magic Quadrant Sources and Disclaimer

CA Technologies Data Protection

Altiris Asset Management Suite 7.0

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

Recognition of Websense Leadership. Industry Analysts Validate Websense Market and Technological Leadership

Magic Quadrant for Content-Aware Data Loss Prevention

<Insert Picture Here> Oracle Identity And Access Management

Enterprise Identity Management Reference Architecture

The Impact of HIPAA and HITECH

Simplify and Automate IT

ORACLE FUSION MIDDLEWARE PROFILE

Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore

Overview of F5 Networks. Fatih Bilger Senior Systems Engineer, Prolink.

Simplify and Automate IT

32% of Excel users are comfortable with using it for Advanced Analysis e.g., PivotTables

How To Improve Your Network Security

CA Systems Performance for Infrastructure Managers

Table of Contents Abstract... 3

Identity Management Overview. Bill Nelson Vice President of Professional Services

MDM that Works. A Real World Guide to Making Data Quality a Successful Element of Your Cloud Strategy. Presented to Pervasive Metamorphosis Conference

Parallel Data Warehouse

Adaptive IPS Security in a changing world. Dave Venman Security Engineer, UK & Ireland

DATA TRANSPARENCY TOWN HALL MEETING

Magic Quadrant for Content-Aware Data Loss Prevention

Protecting What Matters Most. Bartosz Kryński Senior Consultant, Clico

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader

VMware Vision Accelerating the Journey to Your Cloud

Cloud Database Demystified to Deliver SaaS Customer Value

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout

Independent process platform

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

IBM Tririga nástroj pre Real estate portfólio manažment

End User Services. Managed Mobile. Mobile Device Management. Managed Mobile. Copyright 2012 FUJITSU

Optymyze Sales Performance Software

Magic Quadrant for Content Monitoring and Filtering and Data Loss Prevention, 2Q07

CA Virtual Assurance for Infrastructure Managers

Securing OS Legacy Systems Alexander Rau

How To Buy Nitro Security

Enterprise content management solutions Better decisions, faster. Storing, finding and managing content in the digital enterprise.

NetApp SANscreen: come controllare i costi senza sacrificare la service quality. Roberto Patano Business Development Manager NetApp Italia

Efficiently Protect, Manage and Access Big Data. Nigel Tozer Business Development Director EMEA

Reducing the cost and complexity of endpoint management

#ITtrends #ITTRENDS SYMANTEC VISION

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

G06 - How to store your data in SharePoint

Securely Yours LLC Top Security Topics for Sajay Rai, CPA, CISSP, CISM

Malware and Other Malicious Threats

SAS CUSTOMER INTELLIGENCE. Solve more marketing challenges with a comprehensive enterprise solution

Sun and Oracle: Joining Forces in Identity Management

Making the Enterprise Mobile First. Riccardo Canetta Regional Sales Director, Mediterranean

Embracing Complete BYOD Security with MDM and NAC

Any Partner. Any System. Anywhere. IBM Sterling Business Integration Suite

The Next Generation of IT Management. Jason Andrew Vice President, Marketing & Communications

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

The SDN Opportunity. Erik Papir Director, Global Technical Marketing & Competitive Intelligence HP Networking May 2014

Business Intelligence with SharePoint 2010

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector

Magic Quadrant for Content-Aware Data Loss Prevention

INVESTOR PRESENTATION. Third Quarter 2014

SM B13: Symantec Data Insight Ketan Shah, Principal Product Manager John Dodds, Director Technical Product Manager

Data Security: Fight Insider Threats & Protect Your Sensitive Data

Microsoft Enterprise Project Management. James Wright Christopher Pond

INVESTOR PRESENTATION. First Quarter 2014

8 Key Requirements of an IT Governance, Risk and Compliance Solution

Symantec Consulting Services

Commvault - Modern Data and Information Management. Aleksandar Antić Commvault Regional Sales SEE Region

Security.cloud Configuring DLP on to your flow and applying security to your hosted deployment

By 2007, 80 percent of enterprise communications purchase decisions will require support for unified communications (0.6 probability).

THINK CLOUD ATI CHALLENGES. 3 SITA 2011 SITA

FROM PRODUCT TO PLATFORM

Salient Managed Services. Hosting and Support

On and off premises technologies Which is best for you?

Microsoft Business Intelligence solution. What makes Microsoft BI difference

ITIL and Altiris ServiceDesk. Joseph Carson, Sr. Product Manager October 21, 2009

IBM Security Intelligence Strategy

Cloud, where are we? Mark Potts, HP Fellow, CTO Cloud November 2014

Mobile device Management mit NAC

IBM QRadar Security Intelligence April 2013

Transcription:

Jeff Warson, GCIH, SCPS, CISSP, CCSK Sr. Principal Security Strategist Symantec Corpora5on

Agenda 1 2 3 4 5 Sources of a Breach Key IT Security Trends How is DLP Implemented Symantec's Strategy and Recent Acquisitions How Symantec can help

Sources of a Breach Organized Criminal Well Meaning Insider Malicious Insider 3

More Sophis5cated AAacks Complex Heterogeneous Infrastructure Key IT Security Trends Explosion of Informa5on Increased Cost of Incidents

Data Loss Preven;on Is Impera;ve Insiders and partners cause most breaches Insiders make mistakes handling data Broken business processes increase risk Compliance mandates data protec5on Increased focus on data privacy Need to demonstrate data controls 76% of breaches 81% of companies breached were not PCI compliant More complex threats to your data External threats target high value data Limited visibility of where data is $6.7 million average cost of a breach

How is DLP implemented?

Con;nuous Risk Reduc;on Visibility 1000 Remedia;on 800 No;fica;on 600 400 Incidents Per Week Preven;on 200 0 Risk Reduc;on Over Time

Successful DLP Workflow 8

Customer Example Reduce risk by another Reduce risk by Additional 20-25%, increased risk reduction by 25%+, visibility to coverage 30%+, increased of exposed coverage all network traffic confidential of exposed Tighter data, controls confidential when and exposed increased data, policies increased endpoint violated, endpoint full confidential data coverage, coverage automation employee and robust education response via Notifications rules, increased risk reduction

Symantec Named as a Leader in 2010 Gartner Magic Quadrant for Content- Aware Data Loss Preven;on challengers leaders ability to execute niche players Trustwave Verdasys Fidelis Security Systems Palisade Systems Trend Micro GTB Technologies CA visionaries Symantec McAfee Websense RSA (EMC) Code Green Networks Source: Gartner, Inc., Magic Quadrant for Content- Aware Data Loss Prevention, Paul Proctor, Eric Ouellet, June 2, 2010. The Magic Quadrant is copyrighted 2010 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. completeness of vision As of June2010 This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from Symantec.

Symantec s Strategy and Recent Acquisi;ons

Symantec s Security Strategy and Recent Acquisi;ons Security Need Offering Protect Iden55es VeriSign Iden,ty & Authen,ca,on Protect Devices Protect Informa5on Develop and Enforce IT Policies Manage Systems Symantec Protec,on Suite DLP & Encryp,on Suite Control Compliance Suite IT Management Suite Symantec will be able to sell you the pieces or provide the whole enchilada If this isn t an exci5ng security business model, nothing is. Jon Oltsik, Enterprise Strategy Group, May 2010 Symantec has agreed to acquire VeriSign s iden5ty and authen5ca5on business and plans to use the circle check mark logo aaer closing.

How can Symantec Help? Risk Assessments: Free 2-3 week engagement Monitor Network Traffic Scan Storage Execu5ve Level delivery of results Advisory Services: Paid Engagements Informa5on Exposure Assessments PCI Assessments Penetra5on Tes5ng Secure Code and Network Design Security Program Assessments