Better Together: Microsoft Office 365 & Symantec Office 365



Similar documents
Symantec Enterprise Vault.cloud Giovanni Alberici

Improving Business Outcomes: Plug in to Security As A Service Adrian Covich

Integrating MSS, SEP and NGFW to catch targeted APTs

Unified Security, ATP and more

Security.cloud Configuring DLP on to your flow and applying security to your hosted deployment

You ll learn about our roadmap across the Symantec and gateway security offerings.

How To Get A Cloud Service For A Small Business

On and off premises technologies Which is best for you?

Public, Private, Hybrid:

Risk and threats everywhere, all the time

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

Securing the endpoint and your data

/Endpoint Security and More Rondi Jamison

#ITtrends #ITTRENDS SYMANTEC VISION

Symantec Endpoint Security Management Solutions Presentation and Demo for:

Secure Your Mobile Workplace

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

UP L13: Leveraging the full protection of SEP 12.1.x

Countering Insider Threats Jeremy Ho

OVERVIEW. Enterprise Security Solutions

ARCHIVING. What it is, what it isn t, and how it can improve your business operations

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Veritas Enterprise Vault.cloud for Microsoft Office 365

ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones

Securing Office 365 with Symantec

Your is outsourced to the Cloud and Mobile, Are You protecting it with Encryption? Wolf Schreiner

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

SR B10: Improving Antispam Effectiveness and Protecting Against Threats with Submissions 2.0

Best Practices for a BYOD World

Symantec Managed Security Services The Power To Protect

Secure Your with Encryption as a Service

SPEAR PHISHING AN ENTRY POINT FOR APTS

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Finding Security in the Cloud

IBM Security X-Force Threat Intelligence

Investor Presentation

Choosing Between Managed Security Services or In-house SIEM? Consider the Benefits of both!

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

INFORMATION PROTECTED

Symantec Enterprise Vault and Symantec Enterprise Vault.cloud

End to End Security do Endpoint ao Datacenter

PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud

Security Intelligence

Symantec Encryption Solutions for , Powered by PGP Technology

Cyber Security Services: Data Loss Prevention Monitoring Overview

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

SM B13: Symantec Data Insight Ketan Shah, Principal Product Manager John Dodds, Director Technical Product Manager

anomaly, thus reported to our central servers.

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

Symantec Federal Solutions

V1.4. Spambrella Continuity SaaS. August 2

Symantec Enterprise Vault.cloud Overview

Separating Security and Information Management into Two Industry-Leading Technology Companies

Find the needle in the security haystack

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

What security and compliance challenges exist with the move to Microsoft Office 365?

Streamlining Web and Security

Comprehensive real-time protection against Advanced Threats and data theft

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

How To Create An Insight Analysis For Cyber Security

Addressing Security for Hybrid Cloud

IBM Security IBM Corporation IBM Corporation

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

How to Unlock Agility by Backing up to, from, and in the Cloud

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Solution Brief: Enterprise Security

Symantec Protection Suite Add-On for Hosted and Web Security

What s New with Enterprise Vault 11? Symantec Enterprise Vault 11 - What's New?

Cybercrime Security Risks and Challenges Facing Business

Symantec Enterprise Vault.cloud Overview

Procurement General Session: Empowering Modern Procurement

Symantec Messaging Gateway powered by Brightmail

Security Industry Market Share Analysis

Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information

Evaluation Guide. eprism Messaging Security Suite V8.200

Safeguarding the cloud with IBM Dynamic Cloud Security

How To Know If Your Archive Is Ready To Be Used For Business

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules

Symantec Critical System Protection Configuration Monitoring Edition Release Notes

Small and Midsize Business Protection Guide

Strengthen security with intelligent identity and access management

Transcription:

#SymVisionEmea

#SymVisionEmea Better Together: Microsoft Office 365 & Symantec Office 365 & Symantec Mike Smart Product Marketing Information SECURITY David Moseley Product Marketing Information MANAGEMENT

Safe Harbor Disclaimer Any information regarding pre-release Symantec offerings, future updates or other planned modifications is subject to ongoing evaluation by Symantec and therefore subject to change. This information is provided without warranty of any kind, express or implied. Customers who purchase Symantec offerings should make their purchase decision based upon features that are currently available. 3

1yr

20% Symantec Vision Attendees Using Office 365 18% 16% 14% 12% 10% 10% 8% 6% 4% 3% 8% 2% 0% 1% 2013 2014 All Mailboxes Hybrid

Source: The Need for Third-Party Security, Compliance and other capabilities in Microsoft Office 365, An Osterman Research White Paper, July 2013 What is driving adoption to Microsoft Office 365? 66% REDUCE EMAIL COSTS 61% 55% REDUCE WORKLOAD FOR IT FREE UP STAFF FOR OTHER PROJECTS

Better Business. Agility Defensibility Protection

Why Better Together? Symantec s View INFORMATION MANAGEMENT INFORMATION PROTECTION THREAT PROTECTION

#SymVisionEmea INFORMATION MANAGEMENT

Information Management Scenario 1: You are in a contract dispute with one of your suppliers. You need to locate an amendment to the original contract that was agreed via email Scenario 2: IT is spending too much time running ediscovery searches and placing data on legal hold. You want to remove the ediscovery burden from IT Scenario 3: Rogue employee sends confidential price list to the competition and then immediately deletes from Sent Items

Enterprise Vault.cloud Store, manage and discover business critical information in the cloud. Enterprisestrength cloud archiving Litigationready ediscovery Archiving beyond email Built for Microsoft

Built for Microsoft Office 365 Works seamlessly, offers advanced archiving and ediscovery Enable compliance. Archive multiple platforms and other content. Leverage advanced, self-service search and ediscovery capabilities. Find and restore email fast.

#SymVisionEmea THREAT PROTECTION

The World s Largest Civilian Cyber Intelligence Threat Network We See More, We Analyze More, We Know More 1 billion+ systems protected 200M+ Norton & SEP users (the biggest source of telemetry) 3.7 trillion rows of security telemetry; 100 billion more/month 14 security ops centers globally; 500+ expert analysts Blocked 182 million threats last year

Threat Protection Email still a target 1 in 392 emails are a phishing attack 1 in 196 emails are a malware attack 25% of malware in email is delivered via a link 66% of all email worldwide is spam Source: Symantec Internet Security Threat Report volume 19

Threat Protection Targeted Attacks Are more Focused 91% Increase in targeted attacks in 2013 vs 2012 Source: Symantec Internet Security Threat Report volume 19

Threat Protection Targeted Attacks are Indiscriminant Targeted Attack Campaigns Risk of Being a Target Ratio of Organization in an Industry Impacted by Target Attack Sent by Spear-Phishing Email Source: Symantec Internet Security Threat Report volume 19

Email Plays a Key Role in Targeted Attacks

Symantec Email Security.cloud Targeted Attack Protection In the Cloud Skeptic Advanced Message Analysis Email Security.cloud Real-Time Link Following Email Security.cloud

#SymVisionEmea INFORMATION PROTECTION

Information Protection Scenario 1 Employees regularly take IP outside the company and never clean it up

Information Protection Scenario 2 Most employees think it s okay to use competitive data taken from a previous employer

Information Protection Scenario 3 Employees don t think their organizations care

Symantec Data Loss Prevention Products STORAGE Network Discover Data Insight Network Protect ENDPOINT Endpoint Discover Endpoint Prevent Mobile Email Monitor Mobile Prevent NETWORK Network Monitor Network Prevent for Email Network Prevent for Web Management Enforce Platform and IT Analytics Data Loss Prevention - Vision and Strategy - May 2014 24

Why Better Together? Symantec s View ediscovery INFORMATION MANAGEMENT Data loss prevention INFORMATION PROTECTION THREAT PROTECTION Mail, web security Archiving Encryption Mobile

Microsoft Office 365 & Symantec Blueprint Archiving ediscovery ON PREMISES Archiving ediscovery Gateway Exchange Advanced Threat Protection Data Loss Prevention Policy- Based Encryption Network Endpoint Storage Email & Web Advanced Protection Data Loss Prevention Policy- Based Encryption Archiving Mobile Access Mobile User Encryption DLP (Discover, Detect,Prevent) Encryption & DLP (Discover) Mobile & Application Management Data Loss Prevention Endpoint & File/Folder Encryption

#SymVisionEmea Thank you! Mike Smart Product Marketing Information SECURITY David Moseley Product Marketing Information MANAGEMENT Copyright 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.