Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
1Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Sample three prong diagram
• AWS division jumped 47% to $3.5...
2Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Inaugural Edition
FullDayFaeder on Fridays
My cyber communit...
3Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
I thought it pertinent to touch on the hot off the pres
s fi...
4Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
This week Symantec provided FullDayFaeder exclusive access t...
5Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
The great news is Symantec has partnered with Amazon Web Ser...
6Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
According to the Forrester report, “Blue
Coat/Symantec integ...
Cloud Access Security Broker
(CASB)
PRODUCTS
8Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
New Challenges
26% of Cloud
Docs are
Broadly
Shared1
1 1H 20...
9Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Proxy
Cloud Proxy
Events
Outside
Perimeter
Risk Assessment
I...
10Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Management
Center
Agen
t
Single Pane of Glass
for Cloud Sec...
Cloud Secure Web Gateway
PRODUCTS
12Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Shadow Cloud
IT
Consumer
Internet
Proxy
“We supply employee...
13Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Symantec Web Security Service
Consumer
Internet
Shadow Clou...
14Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
PRODUCTS
Dubai
https://www.bluecoat.com/cloud-data-center-l...
15Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Secure Web Access in the Cloud
Proxy Enabled Web Security S...
16Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Web Security Service with Malware Analysis
Service Add-On
W...
17Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Malware Analysis Service: Standard vs
Advanced
Key Capabili...
18Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Email
Web
Access
Cloud
Apps
User Security
Information
Prote...
Cloud Data Protection
PRODUCTS
20Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
IN TRANSIT AT REST IN USE
ZZ
Cloud Data Flow
“귏企専吁企倁ᐋ가귉”
“企...
21Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Symantec CDP Data Protection Process
Symantec
Cloud Data Pr...
22Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Cloud Data Protection Steps
Data Governance
Determines Info...
23Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Cloud Data ProtectionInfo Stored & Processed in the Cloud
U...
VIP and VIP Access Manager
PRODUCTS
25Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Symantec Identity Access Management
• Two-Factor
Authentica...
26Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Every Organization Needs Strong Authentication
63% of Confi...
27Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Identity & Access Control
Secure Access for the Entire User...
28Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
VIP Deployment and Integration
Cloud-based and zero capital...
Data Loss Prevention Next Week
PRODUCTS
Upcoming SlideShare
Loading in …5
×

FullDay Faeder on Friday

153 views

Published on

Inaugural Edition of Weekly Symantec Cyber Security topics and events. This weeks is primarily focused on Cloud Security and 3 Organizations transforming the world as we know it

Published in: Social Media
  • Be the first to comment

  • Be the first to like this

FullDay Faeder on Friday

  1. 1. 1Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Sample three prong diagram • AWS division jumped 47% to $3.5B • $926M Operating Income • 71% Amazon’s $1.3B Operating Income • Symantec Cited as The Clear Leader for Cloud Secure Gateways • Top 7 AWS Security Issues • Security and Compliance for Your AWS Environment . • Server products and Cloud Services revenue grew $577M or 12% • Azure's revenue surged 93% SUPPORTING ITEM • Symantec Secures Office365 • Optimizing O365 with Symantec PacketShaper
  2. 2. 2Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Inaugural Edition FullDayFaeder on Fridays My cyber community has been asking for me to put something together to help sort through the “fake news” and noise these thousands of small start-ups or even niche best of breed so called players that simply don’t improve their security posture. Respected cybersecurity leaders value my transparent insight and therefore I have acquiesced to their demands.
  3. 3. 3Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. I thought it pertinent to touch on the hot off the pres s financial figures of the worlds 3 most impactful cloud companies in my humble opinion. Symantec, Amazon Web Services, and Microsoft Azure all had outstanding quarters. It is becoming evident winners have been chosen. Now only one of these companies is focused solely on security. AWS division jumped 47% to $3.5B Azure's revenue surged 93%
  4. 4. 4Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. This week Symantec provided FullDayFaeder exclusive access to our World Wide Solutions Architect, Mohammad Kaouk, who is a genuine genius and dedicated to cloud security. I personally witnessed some RSA sneak peaks as well current general availability SKUs of the new: Integrated Cyber Defense Platform *Web Security Services, *Symantec CloudSOC, *Symantec DLP, *On-Premise to Cloud DLP, *Malware Analysis Advanced Service (Full Detonation Cloud Sandboxing), *SSL/TLS interception, managed centrally via *Hosted Reporter 10 and *Management Center (riding on a common operating environment), and lastly all backed by *VIP multi-factor authentication. (WOW)
  5. 5. 5Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. The great news is Symantec has partnered with Amazon Web Services to provide our customers access to easily spin up a controlled virtual environment to play with the solutions for 2 weeks. Super easy to get going with our Symantec Security Services Platform. Giving this transformation to the cloud and the need for seamless multi-factor authentication for this Inaugural edition I chose to cover our CASB/WSS/VIP story to protect users and data everywhere. Just ping me for a free trial...
  6. 6. 6Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. According to the Forrester report, “Blue Coat/Symantec integrates CSG with its on- premises secure web gateway. The solution supports both proxy-based and API monitoring of cloud platforms (both AWS and Azure) and cloud applications. It has strong capabilities for Salesforce and other structured data protection, including search, sort, and filtering operations, and offers a wide selection of encryption and decryption policy options. The solution’s built-in cloud application catalog, support for Office 365, and mobile-device-based encryption lag.”
  7. 7. Cloud Access Security Broker (CASB) PRODUCTS
  8. 8. 8Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. New Challenges 26% of Cloud Docs are Broadly Shared1 1 1H 2016 Shadow Data Report Proliferation of Cloud Apps Variety of Endpoints Shadow Data Problem Compromised Accounts Risk Assessment Intrusion Detection Proxy/Firewall DLP Incident Response Investigations Malware Detection
  9. 9. 9Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Proxy Cloud Proxy Events Outside Perimeter Risk Assessment Intrusion Detection Proxy/Firewall Incident Response Investigations DLP Malware Detection Enterprise Perimeter Cloud API StreamIQ™ ContentIQ™ ThreatScore™ LIST (WEB)
  10. 10. 10Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Management Center Agen t Single Pane of Glass for Cloud Security Visibility of Shadow IT Protection Against Malicious Attacks Granular Control of Sensitive Data 10 PRODUCTS
  11. 11. Cloud Secure Web Gateway PRODUCTS
  12. 12. 12Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Shadow Cloud IT Consumer Internet Proxy “We supply employees with mobile devices. We need to govern their use and protect information and users when they are out in the world.” Remote Sites, Mobile Devices and Users How to Protect PRODUCTS
  13. 13. 13Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Symantec Web Security Service Consumer Internet Shadow Cloud IT Proxy Extend Web & Cloud Governance to Mobile Take Remote Sites Safely “Direct to Net” PRODUCTS
  14. 14. 14Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. PRODUCTS Dubai https://www.bluecoat.com/cloud-data-center-locations/ AMERICAS Ashburn, VA * Santa Clara, CA Chicago, IL * Miami, FL Seattle, WA * Toronto, Ontario, Canada Dallas, TX Denver, CO Buenos Aires, Argentina Mexico City, Mexico Sao Paulo, Brazil New York, NY Montreal, Quebec, Canada EMEA London, UK (2x) * Frankfurt, Germany * Paris, France* Zurich, Switzerland Stockholm, Sweden Madrid, Spain Helsinki, Finland Milan, Italy Johannesburg, South Africa Oslo, Norway Tel Aviv, Israel Dubai, UAE APAC Sydney, Australia Auckland, New Zealand Republic of Singapore* Tokyo, Japan Shanghai, China Hong Kong, China Taipei, Taiwan Seoul, Korea Mumbai, India Chennai, India * Core site Blue Coat Global Data Center Footprint SSAE16ISO 27001 • Coverage across 6 continents • Hosted at Top Tier infrastructure providers • Redundant within and between locations • Connect to any/closest Data Center • Fully meshed /redundant network • 40 Data Centers
  15. 15. 15Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Secure Web Access in the Cloud Proxy Enabled Web Security Service Prox y Proxy All Endpoints • Terminate and decrypt traffic • Emulate all device types • Extract content for inspection • Integrate authentication Control Web & Cloud Governance • Discover shadow IT risk • Block web-borne threats • Enforce access policy & audit usage of web & cloud W W W . W E B S I T E . C O M Prevent Threats & Orchestrate Content• Pre-filter sandbox with advanced content inspection • Send content to DLP, sandbox, analytics, etc.. • Open integration architecture to quickly add new services.JAR .EXE Sandbox Malware to Identify Advanced Threats• Multi-factor file analysis • Real time operation – prevent file delivery until sandbox analysis complete Web PRODUCTS
  16. 16. 16Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Web Security Service with Malware Analysis Service Add-On Web Security Service (WSS) • ProxySG Secure Web Gateway • Dual Anti-Virus Scanning • Global Intelligence Network • URL Filtering and Categorization • Comprehensive Reporting • SSL Interception/Policy-Based Decryption • CASB Audit Integration Malware Analysis Service (MAS) • Static Code Analysis • YARA Rules Analysis • Behavioral Analysis • Emulation of Windows Processes • Inline, Real-Time Blocking • File and URL Reputation MAS prevents first-client infection from unknown malware PRODUCTS
  17. 17. 17Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Malware Analysis Service: Standard vs Advanced Key Capabilities Standard Advanced Static Code Analysis ✔ ✔ YARA Rule Analysis ✔ ✔ Behavioral Analysis ✔ ✔ Emulation of Windows Platform ✔ ✔ Inline, Real-time Blocking ✔ ✔ File and URL Reputation ✔ ✔ Windows Emulation ✔ ✔ Full Windows OS Detonation ✗ ✔ EXE and DLL Support ✔ ✔ Office Documents and PDF Support ✗ ✔ +JAVA, MSI, RTF, ZIP Full Detonation Report ✗ ✔
  18. 18. 18Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Email Web Access Cloud Apps User Security Information Protection Advanced Threat Protection Protect Across Web, Mail and Cloud App Vectors PRODUCTS
  19. 19. Cloud Data Protection PRODUCTS
  20. 20. 20Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. IN TRANSIT AT REST IN USE ZZ Cloud Data Flow “귏企専吁企倁ᐋ가귉” “企専吁企倁ᐋ” “가귉귏企専吁企倁” “ᐋ귏企専吁企倁가귉” TOKEN “귏企専吁企倁ᐋ가귉” “企専吁企倁ᐋ” “가귉귏企専吁企倁” “ᐋ귏企専吁企倁가귉” TOKEN “귏企専吁企倁ᐋ가귉” “企専吁企倁ᐋ” “가귉귏企専吁企倁” “ᐋ귏企専吁企倁가귉” TOKEN “귏企専吁企倁ᐋ가귉” “企専吁企倁ᐋ” “가귉귏企専吁企倁” “ᐋ귏企専吁企倁가귉” TOKEN PRODUCTS
  21. 21. 21Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Symantec CDP Data Protection Process Symantec Cloud Data Protection Gateway Cloud Data Protection Token Map Repository User Cloud App Cloud Application Example: enterprise defined a policy to protect FIRST NAME And LAST NAME Fields In ServiceNow Without impacting the cloud apps’ functionality (e.g. search, sort e-mail)
  22. 22. 22Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Cloud Data Protection Steps Data Governance Determines Info Sensitivity Classification Cross-Cloud Data Protection Policies Defined CDP Enforces Policies in Real-Time Without impacting the cloud application’s functionality (e.g. search, sort e-mail) Mobile Users Remote Workers Enterprise SaaS SaaS SaaSPaaS PRODUCTS
  23. 23. 23Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Cloud Data ProtectionInfo Stored & Processed in the Cloud Unauthorized users see only tokenized replacement values Unauthorized Users Direct Connection to ServiceNow Authorized users see all sensitive data in the clear Makes the move to the cloud possible for all sorts of regulated use cases PRODUCTS
  24. 24. VIP and VIP Access Manager PRODUCTS
  25. 25. 25Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Symantec Identity Access Management • Two-Factor Authenticatio n (2FA) • Single Sign On (SSO) • For Enterprises, Consumers, & Cloud Apps VIP and VIP Access Manager Network (Enterprise Gateway) Cloud Applications (Access Manager) Consumer (CDK/API) PRODUCTS
  26. 26. 26Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Every Organization Needs Strong Authentication 63% of Confirmed Data Breaches Involve Leveraging Weak, Default or Stolen Passwords 1. Something you KNOW 2. Something you HAVE3. Something you ARE PRODUCTS
  27. 27. 27Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Identity & Access Control Secure Access for the Entire User Base Identity & Access Control SS O Access Manager Internal Users (Employees) External Users (Partners/Contractors) Corporate Network Cloud Apps PKI Customers Remote Workers PRODUCTS
  28. 28. 28Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. VIP Deployment and Integration Cloud-based and zero capital investment (Bring-Your-Own-Credential) Easy Deployment All-in-one pricing, many credential modalities, and even for consumers Tap your finger to authenticate: password-less authentication Multi-platform Support Designed to Integrate With the security and trust you expect from Symantec API CDK FIDO OATH PUSH B2C B2E Radius SAML PRODUCTS
  29. 29. Data Loss Prevention Next Week PRODUCTS

×