Public, Private, Hybrid: How to Use the Cloud for More Effective Security Symantec and Cloud Computing Ron Poserina, Director of Systems Engineering
Agenda Our Perspective on Cloud Computing Why Cloud for Security? Symantec s Cloud Solutions Q&A and Discussion 2
What We Are Hearing From Our Customers Current Landscape is Forcing IT to Evolve and Creates New Challenges Growth of information Sophistication of attacks Consumerization of IT More compliance laws Virtualize infrastructure Move to cloud Embrace and protect mobile devices Enhance infrastructure agility Virtualization compounds storage growth Information distributed across physical, virtual and cloud Security of virtual, cloud and mobile environments 3
IT Evolves to Meet New Demands System-Centric Information-Centric Data: Centralized, structured Infrastructure: Physical IT focus: Systems Data: Distributed, unstructured Infrastructure: Physical, virtual, cloud, outsource, mobile IT focus: Information 4
Cloud Differs from Traditional IT 3 Service Models 4 Deployment Models 5 Essential Characteristics 1. Software 2. Platform 3. Infrastructure 1. Public Cloud 2. Private Cloud 3. Hybrid Cloud 4. Community Cloud 1. Self-service 2. Wide network access 3. Resource pooling 4. Rapid elasticity 5. Measured service 5 Source: The NIST Definition of Cloud Computing, National Institute of Standards and Technology Special Publication 800-145
Customers Heterogeneous Cloud Reality Customers using many clouds SaaS and IaaS and PaaS Public and private Dedicated and virtual On-premise and off-premise Cloud and legacy Built by self and SI s and CSPs SYMC Apps @ SYMC (e.g. VIP, SHS) SaaS Apps (SFDC, Concur) IaaS (AWS, Rackspace) Private Cloud (HP, Fujitsu, VMware) Solutions spanning the clouds Visibility Intelligence Control Legacy
Customers extend their IT across cloud services Extend Symantec s Cloud Perspectives Consume Software as a Service: customers consume our products from the cloud Customers and partners create secure, resilient public and private clouds Build
Description Value Successful Cloud Adoption Models Consume Cloud Service Transform Complexity to Simplicity Build Cloud Services Deliver Highly Agile, Highly Reliable IT Services Extend into Cloud Services Establish Consistency Across Environments Use or consume products and solutions from the cloud Create secure & resilient public and private clouds Confidently leverage third party cloud services 8
Consideration Solution Considerations Consume Cloud Service Ease of use Low initial cost Elastic capacity Strong SLAs and Customer Support Build Cloud Services Heterogeneous support Platform independence Strong support for virtualization Extend into Cloud Services Integration with existing infrastructure Cross-platform support: physical +virtual +cloud 9
Symantec Solutions Messaging Security Email Security.cloud Email Encryption.cloud Instant Messaging Security.cloud Data Protection & Mgmt Enterprise Vault.cloud Email Continuity.cloud Backup Exec.cloud Consume Cloud Service Authentication Services Symantec Validation and ID Protection Service (VIP) End User Protection Web Security.cloud Endpoint Protection.cloud Security Incident & Event Management Managed Security Service 10
Symantec Solutions Build Resilient Private Clouds Application HA, Veritas Cluster Server, Altiris ITMS, NetBackup/Backup Exec Build Cloud Service Build Storage as a Service Storage Foundation, Veritas Operations Manager, Data Insight, NetBackup/Backup Exec Build Public Cloud Services Backup, Archive, & Harden Servers Clean Pipe, Security Controls Automation End Point Security & Mgmt Service 11
Symantec Solutions Backup & Archive to Hybrid Clouds NetBackup / Backup Exec with OST Appliances with Cloud Connector Enterprise Vault Extend Cloud Service Secure Shadow IT Secure Cloud File share, Secure Social Media, Protect Cloud Email, Secure IaaS Secure Public Cloud Interactions Symantec O3 Public Cloud Control Point CCS: Symantec Security Assessment for Salesforce Enterprise Vault: Office365/BPOS archiving 12
Distinction Why Symantec for Cloud? Consume Cloud Service Robust clouds with proven support Proven service levels + Top customer support + Pre-integrated portfolio Build Cloud Services Cloud doesn t come in a box Heterogeneous + No hardware agenda Extend into Cloud Services Protection for both the cloud and traditional IT Unified deployment + Market leading products 13
Enabling IT with Symantec s Cloud Security Offerings Consume Build Extend 14
Is SaaS right for me? Do your IT staff spend too much time on system administration tasks? Can you easily deploy new technology? Are you able to make new capital investments in updated equipment? Do you have an increasing number of remote and mobile workers who need access to data and systems from a variety of devices? 15
Global Infrastructure = Greater Visibility and Protection Incorporating 17 data centers spanning four continents Every data center is scalable and secured to the highest standards (ISO27001/SAS70II/ISAE 3402) Clustered high performance servers, each cluster has full redundancy 16
Symantec.cloud Security Solutions Email Security.cloud AntiVirus AntiSpam Image Control Content Control Email Encryption.cloud Boundary Encryption (TLS) Policy Based Encryption (Push/Pull) IM Security.cloud Endpoint Protection.cloud Back-up Exec.cloud Web Security.cloud AntiVirus & AntiSpyware URL & Content Filtering Roaming User Protection Enterprise Vault.cloud 17
Identifying more threats, taking action faster & preventing impact Relevant Global Expertise Billions of email connections and Web requests/week Accurate In-depth Analysis Zero hour protection IT Policies and Controls Skeptic Multi-protocol Converged Threat Protection Threat intelligence shared across Email, Web, and IM Email Security.cloud Web Security.cloud Instant Messaging Security.cloud 18
Symantec Email Security.cloud No Hardware / No Software Predictive Threat Protection through Skeptic Block unwanted content BEFORE it enters your environment Stopping spam and viruses can eat up a lot of time and money. We really wanted a cost effective solution that didn t need to be managed in-house and we found it with Symantec.cloud. Ann Harten, Senior Vice President and CIO of SIRVA 19
Email Security.cloud Perkins Eastman Business Requirements Prevent damage from email-borne viruses Reduce time employees spend managing spam Minimize IT staff spent managing email security Business Value & Technical Benefits Improved Security Five years with no significant damage from viruses or malware 99% of spam captured before reaching the email gateway Operational Benefits 37,000 hours/year reclaimed for end users Payback in weeks Self-service management of spam IT Staff Benefits 50% reduction in IT staff time spent managing email security 12 hours/week reclaimed in IT staff time Five minutes to deploy 20
Symantec Web Security.cloud Simple to deploy Flexible solutions for the mobile workforce Simple yet flexible policy management Seamless updates and enhancements With Web Security.cloud s uptime and no latency, it s pretty much seamless Kristine Lange Network Administrator General Air 21
Web Security.cloud Groupo Lamosa Business Requirements Enhance protection against threats at the Internet and endpoints Increase employee productivity Reduce IT overhead Improve data protection and server recovery Business Value & Technical Benefits Security and data protection 28,000 Web-borne threats blocked in first 10 months No disruption from malicious code since deployment on protected systems Operational and cost efficiency 100% payback because Web filtering reclaims tens of thousands of hours of employee productivity Projected ability to delay up to $30,000 in server purchases Up to 520 IT staff hours available for more valuable tasks 22
Why Symantec for Cloud Security? 15 Years of SaaS Experience Customers in over 200 Countries Daily Process over 10 Billion Security Events Our Applications deployed in over 200 clouds 15 Datacenters on 4 continents Used by 95% of the Fortune 500 and 90% of the Internet top 500
Thank you! Ron Poserina ronald_poserina@symantec.com (646) 267-0656 Copyright 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 24