Security and the Cloud- Symantec

898 views
760 views

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
898
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
16
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Overview of SymantecOpened DataCentre in March 2011 in SAConnectivity cheaper, more accessible, one of the mega trendsLocalised Delivery capabiltiy and supportNo vendor specific info – Forrester research, specific to 700 in MEA – SA6 industries
  • Are Symantec a serious cloud player in the eyes of our customers and partners?
  • Norton 360Largest Public Storage cloud, 5 Ptb per month, 300 million usersTrust takes time to earnStorage is one thingSecurity is top of mind concern, on avg 8 bn per day through our serviceGives us intelligence - AV, AS, mail filtering
  • Slide ObjectiveDescribe the strength of the Global Intelligence Network, which is truly a differentiator for Symantec. ScriptAt the heart of all of our products is the Symantec Global Intelligence Network. We are incredibly proud of this Network, and it just gets more and more powerful all the time.We have a 95% detection rate—that’s the highest of any security vendor And the lowest number of false positives (0.0001%)***KM: This is just the anti-spam stat. What stat do we have for our overall effectiveness?***This is, by far, the largest, most sophisticated intelligence network on the planet.It processes over 8 billion email messages daily and gathers malicious code data from 130 million systemsThe Network updates every 5-10 Minutes from 240,000 Sensors In over 200 CountriesThere are more than 35,000 vulnerabilities in the Symantec vulnerability databaseThere are 5 million decoy accounts in the Symantec Probe NetworkThere are 4 Symantec Security Operations Centerslocated in Australia, UK, USA, IndiaThere are 11 Security Response Centers in the USA, Australia, Canada, India, China, IrelandWhat all of this means is that if there is a malicious attack about to hit you, we know about it first. We block it, we keep it from affecting your business, and we tell you how to take action. It’s about prioritized risk and response, and our intelligence network keeps you protected and tells you what to do first. There simply is no approach that’s faster or more thorough than ours. This Network is the main reason that 99% of the Fortune 500 & 1000 utilize our products. This is what makes all the difference between having security software and knowing that your information is protected 24/7.
  • Environment moves quickly, very dynamicThis nis global phising rateBredoLabbotnetSmaller the company more exposed
  • 12 months ago – South Africa was 1 in 40. 4 months in a row, top phising target in worldSecurity awareness in SA relatively low in relation to # of new online users
  • You may pull something from the most current threat deck for this slide. The objective here is that we demonstrate a current example where we used Skeptic to protect our customers with zero hour protection.Tribute to Anikornikova Virus – mass mailerOn September 9, 2010 Symantec .cloud Skeptic technology proactively identified and started blocking a new mass mailer worm.  This new worm, W32.Imsolk.B@mm, with its “Here you have” subject line was a throwback to the types of worms we used to see years ago and used infected machines to send out more copies to the victims’ entire address book. Skeptic is Symantec .cloud’s proprietary heuristic technology for malware and spam filtering. It uses an arsenal of unique and patent-protected technologies to deliver accurate detection of malware including application reputation, junk code analysis, and link following. Skeptic is a core component of Symantec.cloud’s email, web, and instant messaging security services.  Not only did the Symantec .cloud Email Security offering, prevent a single copy from reaching any of our clients, the heuristic rule that triggered the block had actually been in place since 2008. Clients of our Web Security service were also protected due to our converged threat analysis.  For example, if a customer received a copy of the virus via Web mail and clicked the link, we were able to block the downloader upon its first interaction with our Web service. This occurs because the hyperlink is copied across from the Skeptic email towers where the threat first emerged thus ensuring that the link does not operate when detected via the Web.All about scale – 2 cloud vendors beat 85% of traditional security AV vendors – validates the model – sheer scale and volume
  • The news isn’t all bad – there is a tremendous opportunity for Symantec if we can move quickly
  • Security and the Cloud- Symantec

    1. 1. Gordon Love RegionalSymantec.cloud Director - Africa
    2. 2. Cloud Adoption in South Africa Source : Forrester
    3. 3. Cloud Solutions currently adopted? Source : Forrester
    4. 4. Perception of Value Source : Forrester
    5. 5. Concerns and Barriers to Adoption Source : Forrester
    6. 6. Cloud Related Cost savings Source : Forrester
    7. 7. Future Adoption Source : Forrester
    8. 8. Future Demand Source : Forrester
    9. 9. Symantec and the cloud?
    10. 10. 90+petabytes
    11. 11. Global Intelligence Network Identifies more threats, takes action faster & prevents impact Calgary, Alberta Dublin, Ireland Tokyo, Japan San Francisco, CA Mountain View, CA Austin, TX Chengdu, China Culver City, CA Taipei, Taiwan Chennai, India Pune, India Worldwide Coverage Global Scope and Scale 24x7 Event Logging Rapid DetectionAttack Activity Malware Intelligence Vulnerabilities Spam/Phishing• 240,000 sensors • 133M • 35,000+ vulnerabilities • 5M decoy accounts• 200+ countries client, server, gateways • 11,000 vendors • 8B+ email messages/day and territories monitored • 80,000 technologies • 1B+ web requests/day • Global coverage Preemptive Security Alerts Information Protection Threat Triggered Actions 1 1
    12. 12. Threat landscape in context – January 2012
    13. 13. Threat landscape in context – February 2012
    14. 14. Threat landscape in context – January 2012
    15. 15. Threat landscape in context – February 2012
    16. 16. Botnets in South Africa 1
    17. 17. Window of vulnerability:Imsolk.B “Here you have” wormThreat Landscape
    18. 18. Email Security Email Anti Spam Email Anti Virus Email Image Control Email Content Control Email Management Boundary Encryption Policy Based Encryption Email Archiving Email Continuity Web & IM Security Web Anti Virus & Anti Spyware Web URL Filtering Web Roaming UserPre-integrated Secure Enterprise IM applications IM Security Endpoint Security Hosted Endpoint Protection
    19. 19. The Cloud – By the Numbers Estimated Addressable SaaS Market ($B) - 30% CAGR 9 0.4 Remote Access /Monitoring 0.4 Endpoint Management 8 7 0.3 0.3 2.4 Backup 6 0.3 1.9 0.3 Continuity 5 0.3 0.2 1.8 1.5 Archiving 4 0.2 0.2 1.3 0.2 0.5 3 0.2 0.2 1.2 1.0 0.4 0.6 DLP 0.2 0.9 0.1 0.3 0.4 0.6 Encryption 2 0.1 0.7 0.1 0.7 0.2 0.2 0.4 0.5 0.7 Endpoint Protection 0.5 0.1 0.6 0.1 1 0.4 0.1 0.0 0.2 0.3 0.3 0.5 Web Security 0.1 0.0 0.2 0.2 1.1 1.3 0.1 0.8 1.0 0.5 0.6 0 Email Security 2009 2010 2011 2012 2013 2014 Source: IDC and Symantec analysis
    20. 20. Cloud Computing is inevitableThank you – Questions?Gordon_Love@Symantec.com

    ×