Improving Business Outcomes: Plug in to Security As A Service Adrian Covich



Similar documents
Security.cloud Configuring DLP on to your flow and applying security to your hosted deployment

Symantec Protection Suite Add-On for Hosted and Web Security

Better Together: Microsoft Office 365 & Symantec Office 365

Symantec Enterprise Vault.cloud Giovanni Alberici

Public, Private, Hybrid:

Protect Your Enterprise With the Leader in Secure Boundary Services

Countering Insider Threats Jeremy Ho

Symantec Security.cloud - Skeptic Whitepaper

V1.4. Spambrella Continuity SaaS. August 2

How To Get A Cloud Service For A Small Business

On and off premises technologies Which is best for you?

INFORMATION PROTECTED

ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones

Unified Security, ATP and more

Small and Midsize Business Protection Guide

Symantec Messaging Gateway 10.5

Spreading IT Security Wherever Employees Roam

Symantec Messaging Gateway 10.6

Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution.

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

IronPort C300 for Medium-Sized Enterprises and Satellite Offices

IBM Lotus Protector for Mail Security 2.5. Empower users and extend your IBM Lotus Notes and Lotus Domino security features

Integrating MSS, SEP and NGFW to catch targeted APTs

Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems

anomaly, thus reported to our central servers.

Solution Brief: Enterprise Security

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

SR B10: Improving Antispam Effectiveness and Protecting Against Threats with Submissions 2.0

Endpoint Protection Small Business Edition 2013?

Security for Small Businesses: What's the Right Solution For You?

WEBSENSE SECURITY SOLUTIONS OVERVIEW

Evaluation Guide. eprism Messaging Security Suite V8.200

Symantec Messaging Gateway powered by Brightmail

100% Malware-Free A Guaranteed Approach

Features and benefits guide for partners and their customers

SAAS VS. ON-PREMISE SECURITY. Why Software-as-a-Service Is a Better Choice for and Web Threat Management

AVG AntiVirus. How does this benefit you?

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices

Risk and threats everywhere, all the time

Mimecast Unified Management

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

Stop Spam. Save Time.

Trend Micro Hosted Security Stop Spam. Save Time.

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

Firewall and UTM Solutions Guide

Technology Blueprint. Protect Your . Get strong security despite increasing volumes, threats, and green requirements

Symantec.cloud Business Value White Paper

InsightCloud. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

10 Reasons Why Enterprises Select Symantec.cloud for Archiving

Services Deployment. Administrator Guide

Quick Reference. Administrator Guide

Secure Your Mobile Workplace

AVeS Cloud Security powered by SYMANTEC TM

White Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses

Symantec Endpoint Security Management Solutions Presentation and Demo for:

Quarterly Report: Symantec Intelligence Quarterly

Symantec Protection Suite Small Business Edition

MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST

Putting Web Threat Protection and Content Filtering in the Cloud

White Paper: Security Management

Getting Started with Symantec Endpoint Protection

Symantec Enterprise Vault for Lotus Domino

Symantec Protection Suite Small Business Edition

Comprehensive protection. Streamlined administration console

Protecting the Infrastructure: Symantec Web Gateway

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION


Excel Micro, Incorporated 2013 COMPLETE PRODUCT GUIDE

Achieve more with less

Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules

Mobile workforce management software solutions. Empowering the evolving workforce with an end-to-end framework

Security Series

Mimecast Security

IronPort C-Series Overview High performance security appliances. Carrier-proven technology, enterprise-class management.

GFI Product Comparison. GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.0

Network Security. Intertech Associates, Inc.

INTRODUCING isheriff CLOUD SECURITY

Selecting Your Essential Cloud Services

IronPort C350 for Medium-Sized Enterprises and Satellite Offices

isheriff CLOUD SECURITY

The Headache of Managing an Service Top 10 Reasons to Outsource. White Paper April 08

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

FortiMail Filtering Course 221-v2.0. Course Overview. Course Objectives

TTAsia Secure Over the Cloud

IronPort C650 Security Appliance for Large Enterprises and ISPs

The Advantages of Security as a Service versus On-Premise Security

Symantec Intelligence Report: February 2013

Migration Project Plan for Cisco Cloud Security

The Headache of Managing an Service Top 10 Reasons to Outsource. White Paper July 08

Data Sheet: IT Compliance Payment Card Industry Data Security Standard

Endpoint Security for DeltaV Systems

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

Transcription:

Improving Business Outcomes: Plug in to Security As A Service Adrian Covich Principal Systems Engineer, Symantec.cloud

1 Who We Are 2 Security Challenges in Education 3 Security As A Service Email, Web, Endpoint 4 Archiving As A Service 5 Conclusion 2

Symantec.cloud: Who Are We? 10.9 million SaaS users 32,000 clients 104 Countries A leading provider of SaaS Web Security (IDC) A leader in Gartner MQ for Secure Email Gateway Worldwide leader in SaaS Messaging Security (IDC)

Protected by Symantec.cloud Today

Security Challenges in Education Educational Institutions have wide and varied IT environment Threats are increasingly sophisticated and targeted in nature Low User Awareness Requirement to remain competitive Increased pressure to provide open environment for greater number of users Pressure on universities to streamline processes in order to remain competitive. Must do more with less! 5

SPAM Clogging our Email and that s Just the Start 6

University Directories provide all of the information Online directories of staff and students available to be harvested for future attacks 7

Hostile: Faked Email to Collect Student Fees In February we saw phishing sites spoofing UK and US based universities In this example phishers pretended to be from the finance directorate of the university At the top of the phishing site was the address and contact details of the university, aimed at convincing users that the site was the legitimate one (which of course is not!). The intent of impersonating the finance directorate was to instill a sense of urgency into the users to encourage them to log into the site 8

Hitting Tech-savvy but not street smart victims http://******.com/test?authenticate_username=****** [Domain name and User name removed] 9

Targeted Attacks Education in the Crosshairs Worldwide industry sector since 2008 33% 5% 32% Public Sector Manufacturing Finance IT Services Education Other 6% 16% 8% 18172 targeted attacks during 2010 10

Most targeted individuals 2010 Academic Expert, Asian Defense Policy Executive, Voluntary Sector Executive, Trade Delegation Academic Expert, Asian Politics Executive, Voluntary Sector Executive, Financial Regulation Academic Expert, Asian Politics Academic Expert, Asian Defense Policy Journalist, Pakistan Expert, Asian Politics 11

Security as A Service Symantec Provides from the Cloud Protect Control Secure Recover Email Web Skeptic TM Anti-Virus Anti-Spam Anti-Virus Anti-Spyware Content Control Image Control URL Filtering Boundary Encryption Policy Based Encryption Archiving Continuity IM Anti-Virus Anti-Spam Content Control EndPoint EndPoint Security 12

Key Features 100% protection against both known & unknown viruses 99% Spam capture rate with >0.0003% false positives Internet level filtering helps preserve Bandwidth Supported by shared global threat intelligence WWW Link-following checks URLs in email for malware Backed by an Industry leading SLA

Benefits Easy to deploy Easy to scale No hardware or software Part of an integrated set of cloud-based solutions Automatic updates $ Pay as you go 14

Email AntiVirus.cloud and Email AntiSpam.cloud How it works

Email AntiVirus.cloud and Email AntiSpam.cloud Platform Multi-layered perimeter defense mail sent to your organization All mail from your organization is clean, legitimate & relevant The platform: Connection Manager 64%* 20% 1% Brightmail Traffic Shaper SMTP Heuristics User Validation Traffic management - (TCP/IP layer) Connection management - (connection layer) AntiSpam Components AntiVirus Components 2% >1% Commercial DNS Blocklists 4% Brightmail Symantec AV Engine Commercial AV Engines Skeptic (AS & AV) 9% User management - (message layer) Our services: Known spam, viruses, phishing, malware stopped New and unknown threats stopped by Skeptic The end result: Inboxes clear of spam, viruses and phishing scams Happy, productive and safe end users * Figures November 2009 to April 2010 16

Utilising Symantec.cloud Web Security

Smart Connect for Web Security.cloud Web protection and policy management for Mobile Users Seamlessly connects users from: Data center Home Offices Public Wi-Fi Hotspots; Pay-for-use portals Corporate LAN & Regional Offices Seamlessly logs in users in a variety of network environments Ideal for road-warrior users and frequent travelers Enforces policies and protects users as if they were inside your corporate LAN 19

Endpoint Protection.cloud Protecting Mobile Users Key Features: Comprehensive protection for your systems Always-on protection for endpoints Web-based management console Identifies unsafe web sites in search results Security audit & customizable reporting Compatible with hosted web and email security services

Additional Challenge: Email Management Email Volumes are Growing! Users are inclined to keep emails rather than delete them Discovery Requirements are becoming more complex Across a larger data set Regulatory Requirements State Records Act 1998 21

Enterprise Vault.cloud: How it Works

Enterprise Vault.cloud: What Does the User See? Users can quickly find and restore lost or deleted emails and attachments Better knowledge management Retain and easily reassign the archives of departed employees

In Conclusion: Security as a Service offers the ability to: take advantage of the most advanced security platforms Place institutions in the best position to deal with today s and tomorrow s challenges. 24

Thank you! Adrian Covich Principal Systems Engineer adrian_covich@symantec.com Copyright 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.