#ITtrends #ITTRENDS SYMANTEC VISION 2012 1

Similar documents
Transcription:

#ITtrends 1

Strategies for Security and Management in a Mobile and Virtual World Anil Chakravarthy Senior Vice President, Enterprise Security Group 2

MASSIVE INCREASE IN SOPHISTICATED ATTACKS 403 million unique malware variants in 2011 81% increase year-over-year in malicious attacks 6x increase in targeted attacks during 2011 232 million identities exposed in 2011 57% of enterprises believe they cannot respond to latest threats Source: Symantec Internet Security Threat Report; 2012; Threat Management Survey 2011 3

NEW ATTACK SURFACES Mobile / Device Proliferation 93% increase in mobile malware in 2011 >80% chance of breach attempts when smartphones are lost Cloud Data / Apps 82% of enterprises cite security as top challenge for cloud strategy by 2016 50% of global 1000 will store customer data in the cloud Virtualized Environments 97% of all data compromised involved servers 40% of SMBs completely secure virtual applications 4 4

Managed Unmanaged Device-centric App-centric SECURE AND MANAGE MOBILE DEVICES A Context-Based Approach BYOD Company Owned But Unmanaged Company Controls Relevant Apps & Data Only Company Controls Standard Devices Company-owned Company Controls Personal Devices Personally-owned 5

Control Points FIVE PILLARS FOR ENTERPRISE MOBILITY User & App Access App & Data Protection Device Management Threat Protection Secure File Sharing Device Apps Data User 6

NEW MOBILITY OFFERINGS Mobile Management Single SKU All use cases User-based, subscription pricing App Center Ready Program Global catalogue of enterprise-ready apps Data protection Central administration 7

DIMENSIONS OF CLOUD PROTECTION Protection delivered from the cloud Simplify IT operations by outsourcing security to Symantec (Symantec.Cloud, Web and Email Security) Protection for public cloud interactions Safely leverage 3rd party clouds Mitigate shadow IT (VMWare integrations with CCS, DLP, CSP) Protection for information traveling to and from the cloud Ensure business continuity with certificate management (SSL) Protect apps with code signing Protection for clouds that you build Ensure private cloud build outs are secure and compliant (Encryption, Symantec O 3 ) 8

PROTECTED ACCESS TO CLOUD SERVICES Symantec O 3 One Login with Strong Credentials O Identity-based Access Control 3 Application Visibility and Audit Information Protection Private Cloud 9

DEMO SYMANTEC O 3 Nicolas Popp, VP Engineering 10

SECURE VIRTUALIZED DATA CENTERS Secure Virtual Infrastructures Maintain Endpoint Performance Ensure Compliance Across Workloads Harden vcenter and Hypervisors (VMware hardening guidelines) Monitor vcenter and Hypervisors Unrivaled security Blazing performance Vshield integration Identify rogue, vulnerable or noncompliant virtual machines Integrate VMware prescribed standards 11

VIRTUALIZE WITHOUT COMPROMISE Critical System Protection Harden the underlying OS until patched VM1 VM2 VM3 APP APP APP Harden the underlying OS and lock down the vcenter application Harden and protect ESX while monitoring configuration changes to ESXi WINDOWS OS NON-WINDOWS OS ESX/ESXi OS vcenter Deliver fine-grained access control and real-time File Integrity Monitoring 12

SYMANTEC ENDPOINT PROTECTION Best Performance in Virtualized Environments Insight & SONAR technology # 1 market share 8.5M+ V12 users Leader Gartner EPP Magic Quadrant Coming Soon: Symantec Endpoint Protection 12.1.2 Mountain Lion 13

PROTECT THE FOUNDATION Control Compliance Suite Data Loss Prevention and Encryption O 3 Cloud Firewall Zones for Enterprise Endpoint & Datacenter Protection VeriSign Identity Protection Symantec Protects People and Information Mobile App Security SSL & Code Signing IT Management Suite Managed Security Services Mail & Web Security Mobile Device Management 14

SYMANTEC GLOBAL INTELLIGENCE NETWORK Attack Quarantine System Endpoints Gateways Analysts Hosted Intelligence Honeypots DeepSight Global Sensor Network Analytics 3 rd Party Affiliates Global Data Collection Big Data Analytics Warehouse Intelligence Feeds Probes in 200 countries & territories Visibility into 30% of global email traffic Over 2 million decoy accounts 15

SYMANTEC ENCRYPTION Symantec File Share Encryption, Powered by PGP Technology Protects confidential data and sets user access policies on file sharing services, Dropbox Access encrypted data on iphone and ipad while keeping info protected Mobile email encryption for ios and Android Symantec O 3 16

SYMANTEC FILE SHARE ENCRYPTION DEMO Save a file to Dropbox automatically encrypt 17

SYMANTEC FILE SHARE ENCRYPTION DEMO Save a file to Dropbox automatically encrypt 18

SYMANTEC FILE SHARE ENCRYPTION DEMO Accessible via Dropbox 19

SYMANTEC FILE SHARE ENCRYPTION DEMO but not readable 20

SYMANTEC FILE SHARE ENCRYPTION DEMO Permission to open on approved clients 21

SYMANTEC FILE SHARE ENCRYPTION DEMO ios File Viewer safety and mobility 22

SYMANTEC DATA LOSS PREVENTION Intellectual Property Mobile Cloud Vector Machine Learning Technology DLP 11 DLP protection for ipads, iphones DLP 11.5 Social networking Office 365 Sharepoint DLP 11.6 23

SYMANTEC MANAGED SECURITY SERVICES Enhanced Security Operations Portal Context-Aware Security Analytics DeepSight integration User-configured dashboards Enhanced on-demand reporting* Leverage customer and Security intelligence to prioritize responses* Expanded advanced threat detection* * First half of 2013 24

SYMANTEC ENDPOINT MANAGEMENT Comprehensive Management for Today s Environments Manage Anywhere Device Management Application Management Powerful Reporting Remote users and sites Manage endpoints over the Internet Consistent management across diverse platforms Single console management extends to mobile devices Smarter patch management Dependable application virtualization and streaming Agent management for endpoint and DLP Data insight for faster remediation and planning Integrated reporting across management and security 25

MAKE SECURITY RELEVANT TO THE BUSINESS Symantec Protection Center Executive dashboard for security Oversight and action SPC Mobile Executive Security Dashboard Role-Based Dashboards and Reports Security Metrics Symantec Connectors Business Asset System Central Data Repository Security Workflows 3 rd Party Connectors SPC Enterprise Data Collection and Analytics Platform Consolidate security information Key IT security metrics Threat intelligence feeds Business view of IT risk Prioritize action plan for remediation 26

DEMO SYMANTEC PROTECTION CENTER Joe Bertnick, Director Product Management 27

INSIGHTS INTO YOUR SECURITY POSTURE Symantec Malicious Activity Assessment GOAL Discover the presence of malware & botnet activity APPROACH 7 to 15 day, non-invasive assessment using Symantec Web Gateway RESULTS Immediate, specific guidance on improving security posture 1 2 3 Engage Discover Report 28

SYMANTEC S LEADERSHIP IN ENTERPRISE SECURITY # We protect 1 billion systems around the world Gartner MQ Leader in 6 of 6 security segments The Largest IT Security Company in the world 29

SESSIONS YOU DON T WANT TO MISS Risk Management Dashboard at Your Fingertips: Symantec Protection Center Mobile Overview Nov 13 14.45 to 15.45 Look Inside O 3 : Symantec s New Cloud Security Platform Breakout Nov 14 17.15 to 18.15 Symantec Endpoint Protection 12 Customer Panel Nov 13 17.30 to 18.30 Endpoint Management: State of the Union and Vision Nov 14 9.00 to 10.00 Roadmap: The Future of Encryption at Symantec Nov 15 10.30 to 11.30 Adding Security Intelligence to Your Existing Solutions for Enhanced Protection Nov 15 9.00 to 10.00 30

Thank you! Copyright 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 31