SlideShare a Scribd company logo
1 of 2
Download to read offline
Commercial in Confidence 1
Enterprise Security Services
Symantec ™ Secure Email Service
Managed risk of viruses and spyware across your organisation
Overview
In today global market, email has become a
critical business tool. The nature and extent of
email’s involvement in business process continues
to evolve. The fact is that business email will
continue to grow by 25-30% through 2009
annually, 75% of a company’s Intellectual
Property is now contained in email, and 79% of
companies accept email as written confirmation of
approvals, orders and other transactions.
The challenge though is not the use of email. As
the following statistics highlight, it is the risk
email is subject that challenges business:
Over 60% of email is spam.
Spam is growing at over 63% per year
(Source Ferris Research).
Spam cost businesses $4.2 Million in lost
productivity annually (Source IDC).
99% of business experiences outbreaks of
viruses in 2004 (Source ICSA).
80% of viruses enter through the email
gateway.
Due to this new landscape, managing threats to
integrity and availability of email services has
become paramount for businesses around the
world.
Symantec Email Service (SES) manages this
business risk for your organisation. This service
manages all malicious content (virus, spam and
inappropriate content) flowing both from external
sources as well as within your organisation.
Figure 1 highlights the Symantec model.
SPAMVIRUS
CORPORATE
NETWORK
INTERNET
EXTERNAL
NETWORK
CORPORATE
NETWORK
Figure 1 - Secure Email Service Overview
This service leverages people, process and
technology to deliver a capability which is more
effective and cost effective than an organisation
can provided with internal resources.
Key Benefits
The key benefits to your organisation are:
Reduce operational costs – Lower cost than
companies can provide internally.
Reduce organisational down time –
Proactive management to reduce and eliminate
virus outbreaks.
All year round protection – 24 hours a day,
365 days a year the service monitors and
protects your business.
Guaranteed service – Backed by Symantec
Service Level Agreements (SLA).
Predictable cost model – Fixed fee per
month service based on the number of users
with no capital costs.
Complete visibility – With direct access to
management analysis and reporting tools,
clients can view status and important statistical
information from anywhere they choose.
Key Features
Key features of the Symantec Compliance
Management service are:
Complete coverage – Coverage across all
email services not just your gateway.
Vendor independent – Manage Symantec,
heterogeneous, or other major vendor
products.
24 hour incident response capability –
The service is monitored on a 24 hour, 365
day basis with a team ready to respond and
manage issues.
Management Dashboard – A secure
management portal to view status of service.
Reporting – Regular reporting to
management on service metrics and security
statistics.
Service desk integration – Automatic
ticketing integration with Peregrine and
Remedy service desks.
Fixed contracts – Fixed price agreements
based on 3, 4 and 5 year periods.
Commercial in Confidence 2
Enterprise Security Services
Symantec ™ Secure Email Service
Managed risk of viruses and spyware across your organisation
Our Approach
As the approach is not product driven, Symantec
take a methodical process oriented approach to
ensure success. This involves:
An analysis of the customer’s current network
and internal processes.
Establishment of a transition plan for moving
to the new service.
Design, build, test and transition to the
service.
Perform reporting, maintenance, monitoring
and incident response services ongoing.
To achieving this in a cost effective manner,
Symantec:
Establishes automated processes and
capability through world leading technology.
Utilises the best industry experts to rapidly
and efficiently manage the service.
Symantec ensures this approach is globally
consistent and repeatable with a quality outcome
by:
Using Symantec tried and tested practices
integrated into your business processes.
Establishment of automated workflow to
manage programs of work.
Simply put, all year round Symantec utilise best of
breed technology, expert people and proven
processes to establish an integrated management
practice. This approach can be demonstrated by
Figure 2.
Figure 2 - Symantec's approach
Symantec establishes and maintains three
important activities around this service:
1. 24 by 7 monitoring and incident
response – Automated services track and
notify our incident response teams of potential
and actual issues.
2. On-demand management reporting –
Baseline and risk snap shot reporting for
operational and executive management.
3. Workflow management – Automated
remediation and activity tracking integrated
into major helpdesk ticketing systems (e.g.:
Peregrine, Remedy etc).
These activities are delivered by expert staff
trained and experienced in security risk
management to ensure relevance to your business.
About Symantec
Symantec is the global leader in information
security providing services designed to help mid-
sized businesses and large enterprises secure and
manage their IT infrastructure.
Symantec Australia Head Quarters
Riverside Corporate Park
Level 2, 1 Julius Avenue
North Ryde NSW 2113
More Information
Telstra/KAZ Account Manager
Richard Dufty
Email: richard_dufty@symantec.com
Phone: 02 8220 7035
Mobile: 0414 754 325
Telstra/KAZ Business Development Manager
Glenn Hurn
Email: glenn_hurn@symantec.com
Phone: 03 9864 2629
Mobile: 0407 775 672

More Related Content

What's hot

IFCA Congress How the post-pandemic will shape the compliance agenda
IFCA Congress How the post-pandemic will shape the compliance agendaIFCA Congress How the post-pandemic will shape the compliance agenda
IFCA Congress How the post-pandemic will shape the compliance agendaHernan Huwyler, MBA CPA
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresSamuel Loomis
 
How ThreatModeler Benefits Key Stakeholders
How ThreatModeler Benefits Key StakeholdersHow ThreatModeler Benefits Key Stakeholders
How ThreatModeler Benefits Key Stakeholdersreeftim
 
Joseph Sukhbir, Global Head of Technology Risk at EMI Group - Business Contin...
Joseph Sukhbir, Global Head of Technology Risk at EMI Group - Business Contin...Joseph Sukhbir, Global Head of Technology Risk at EMI Group - Business Contin...
Joseph Sukhbir, Global Head of Technology Risk at EMI Group - Business Contin...Global Business Events
 
ISACA Indonesia Special Technical Session feat Erik Guldentops Panelist Widha...
ISACA Indonesia Special Technical Session feat Erik Guldentops Panelist Widha...ISACA Indonesia Special Technical Session feat Erik Guldentops Panelist Widha...
ISACA Indonesia Special Technical Session feat Erik Guldentops Panelist Widha...rahmatmoelyana
 
Information Systems Security Review 2004
Information Systems Security Review 2004Information Systems Security Review 2004
Information Systems Security Review 2004Donald E. Hester
 
Intelligent Remote Monitoring
Intelligent Remote MonitoringIntelligent Remote Monitoring
Intelligent Remote Monitoringthesecuritygroup
 
Integrated Risk Management
Integrated Risk ManagementIntegrated Risk Management
Integrated Risk ManagementOmicron Systems
 
Digital defence ds-vciso-supplychain
Digital defence ds-vciso-supplychainDigital defence ds-vciso-supplychain
Digital defence ds-vciso-supplychainShawn Brown
 
The Future of Your Security Operations - Part 2: Tech Integration
The Future of Your Security Operations - Part 2: Tech IntegrationThe Future of Your Security Operations - Part 2: Tech Integration
The Future of Your Security Operations - Part 2: Tech IntegrationResolver Inc.
 
Proventiv Web Presentation
Proventiv Web PresentationProventiv Web Presentation
Proventiv Web PresentationMSI Services
 
Master Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolMaster Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolHernan Huwyler, MBA CPA
 
Presentation Of The On Line System
Presentation Of The On Line SystemPresentation Of The On Line System
Presentation Of The On Line Systembeaconfire
 
Metric stream elevating your compliance program with technology
Metric stream elevating your compliance program with technologyMetric stream elevating your compliance program with technology
Metric stream elevating your compliance program with technologyHernan Huwyler, MBA CPA
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standardsprimeteacher32
 
Lunch and Learn: June 29, 2010
Lunch and Learn: June 29, 2010Lunch and Learn: June 29, 2010
Lunch and Learn: June 29, 2010prevalentnetworks
 
TrustedAgent GRC for Vulnerability Management and Continuous Monitoring
TrustedAgent GRC for Vulnerability Management and Continuous MonitoringTrustedAgent GRC for Vulnerability Management and Continuous Monitoring
TrustedAgent GRC for Vulnerability Management and Continuous MonitoringTri Phan
 

What's hot (20)

IFCA Congress How the post-pandemic will shape the compliance agenda
IFCA Congress How the post-pandemic will shape the compliance agendaIFCA Congress How the post-pandemic will shape the compliance agenda
IFCA Congress How the post-pandemic will shape the compliance agenda
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_Procedures
 
How ThreatModeler Benefits Key Stakeholders
How ThreatModeler Benefits Key StakeholdersHow ThreatModeler Benefits Key Stakeholders
How ThreatModeler Benefits Key Stakeholders
 
CoreSecurity
CoreSecurityCoreSecurity
CoreSecurity
 
Joseph Sukhbir, Global Head of Technology Risk at EMI Group - Business Contin...
Joseph Sukhbir, Global Head of Technology Risk at EMI Group - Business Contin...Joseph Sukhbir, Global Head of Technology Risk at EMI Group - Business Contin...
Joseph Sukhbir, Global Head of Technology Risk at EMI Group - Business Contin...
 
ISACA Indonesia Special Technical Session feat Erik Guldentops Panelist Widha...
ISACA Indonesia Special Technical Session feat Erik Guldentops Panelist Widha...ISACA Indonesia Special Technical Session feat Erik Guldentops Panelist Widha...
ISACA Indonesia Special Technical Session feat Erik Guldentops Panelist Widha...
 
Information Systems Security Review 2004
Information Systems Security Review 2004Information Systems Security Review 2004
Information Systems Security Review 2004
 
Intelligent Remote Monitoring
Intelligent Remote MonitoringIntelligent Remote Monitoring
Intelligent Remote Monitoring
 
Integrated Risk Management
Integrated Risk ManagementIntegrated Risk Management
Integrated Risk Management
 
Grc and is audit
Grc and is auditGrc and is audit
Grc and is audit
 
Digital defence ds-vciso-supplychain
Digital defence ds-vciso-supplychainDigital defence ds-vciso-supplychain
Digital defence ds-vciso-supplychain
 
The Future of Your Security Operations - Part 2: Tech Integration
The Future of Your Security Operations - Part 2: Tech IntegrationThe Future of Your Security Operations - Part 2: Tech Integration
The Future of Your Security Operations - Part 2: Tech Integration
 
Net Monitor Presentation
Net Monitor PresentationNet Monitor Presentation
Net Monitor Presentation
 
Proventiv Web Presentation
Proventiv Web PresentationProventiv Web Presentation
Proventiv Web Presentation
 
Master Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolMaster Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines School
 
Presentation Of The On Line System
Presentation Of The On Line SystemPresentation Of The On Line System
Presentation Of The On Line System
 
Metric stream elevating your compliance program with technology
Metric stream elevating your compliance program with technologyMetric stream elevating your compliance program with technology
Metric stream elevating your compliance program with technology
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Lunch and Learn: June 29, 2010
Lunch and Learn: June 29, 2010Lunch and Learn: June 29, 2010
Lunch and Learn: June 29, 2010
 
TrustedAgent GRC for Vulnerability Management and Continuous Monitoring
TrustedAgent GRC for Vulnerability Management and Continuous MonitoringTrustedAgent GRC for Vulnerability Management and Continuous Monitoring
TrustedAgent GRC for Vulnerability Management and Continuous Monitoring
 

Similar to Symantec Secure Email Service - KAZ

Symantec Secure Web Content Service - KAZ
Symantec Secure Web Content Service - KAZSymantec Secure Web Content Service - KAZ
Symantec Secure Web Content Service - KAZGrant Chapman
 
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceEffectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceAlireza Ghahrood
 
Power your businesswith risk informed decisions
Power your businesswith risk informed decisionsPower your businesswith risk informed decisions
Power your businesswith risk informed decisionsAlireza Ghahrood
 
MCGlobalTech Enterprise Risk Management Program
MCGlobalTech Enterprise Risk Management ProgramMCGlobalTech Enterprise Risk Management Program
MCGlobalTech Enterprise Risk Management ProgramWilliam McBorrough
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 
Alignia for Business Security
Alignia for Business SecurityAlignia for Business Security
Alignia for Business SecurityLaurie LeBlanc
 
Alignia for Business Security
Alignia for Business SecurityAlignia for Business Security
Alignia for Business SecurityLaurie LeBlanc
 
security-team-guide-reducing-operational-risk.pdf
security-team-guide-reducing-operational-risk.pdfsecurity-team-guide-reducing-operational-risk.pdf
security-team-guide-reducing-operational-risk.pdfgokuforhelp
 
The ROI of Safety in Manufacturing
The ROI of Safety in Manufacturing  The ROI of Safety in Manufacturing
The ROI of Safety in Manufacturing Rob Williams
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Accounting_Whitepapers
 
Cyber TPRM - the journey ahead
Cyber TPRM - the journey aheadCyber TPRM - the journey ahead
Cyber TPRM - the journey aheadKevin Duffey
 
2010 Sc World Congress Nyc
2010 Sc World Congress Nyc2010 Sc World Congress Nyc
2010 Sc World Congress NycBob Maley
 
Aviation SMS Software for Airlines & Airports
Aviation SMS Software for Airlines & AirportsAviation SMS Software for Airlines & Airports
Aviation SMS Software for Airlines & AirportsChristopher Howell
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 

Similar to Symantec Secure Email Service - KAZ (20)

Symantec Secure Web Content Service - KAZ
Symantec Secure Web Content Service - KAZSymantec Secure Web Content Service - KAZ
Symantec Secure Web Content Service - KAZ
 
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceEffectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
 
Power your businesswith risk informed decisions
Power your businesswith risk informed decisionsPower your businesswith risk informed decisions
Power your businesswith risk informed decisions
 
RAP GC 2016
RAP GC 2016RAP GC 2016
RAP GC 2016
 
Qatar Proposal
Qatar ProposalQatar Proposal
Qatar Proposal
 
FullyManaged
FullyManagedFullyManaged
FullyManaged
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
MCGlobalTech Enterprise Risk Management Program
MCGlobalTech Enterprise Risk Management ProgramMCGlobalTech Enterprise Risk Management Program
MCGlobalTech Enterprise Risk Management Program
 
RTCM.pptx
RTCM.pptxRTCM.pptx
RTCM.pptx
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
Alignia for Business Security
Alignia for Business SecurityAlignia for Business Security
Alignia for Business Security
 
Alignia for Business Security
Alignia for Business SecurityAlignia for Business Security
Alignia for Business Security
 
security-team-guide-reducing-operational-risk.pdf
security-team-guide-reducing-operational-risk.pdfsecurity-team-guide-reducing-operational-risk.pdf
security-team-guide-reducing-operational-risk.pdf
 
The ROI of Safety in Manufacturing
The ROI of Safety in Manufacturing  The ROI of Safety in Manufacturing
The ROI of Safety in Manufacturing
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
 
Cyber TPRM - the journey ahead
Cyber TPRM - the journey aheadCyber TPRM - the journey ahead
Cyber TPRM - the journey ahead
 
2010 Sc World Congress Nyc
2010 Sc World Congress Nyc2010 Sc World Congress Nyc
2010 Sc World Congress Nyc
 
Aviation SMS Software for Airlines & Airports
Aviation SMS Software for Airlines & AirportsAviation SMS Software for Airlines & Airports
Aviation SMS Software for Airlines & Airports
 
IBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References GuideIBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References Guide
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 

Symantec Secure Email Service - KAZ

  • 1. Commercial in Confidence 1 Enterprise Security Services Symantec ™ Secure Email Service Managed risk of viruses and spyware across your organisation Overview In today global market, email has become a critical business tool. The nature and extent of email’s involvement in business process continues to evolve. The fact is that business email will continue to grow by 25-30% through 2009 annually, 75% of a company’s Intellectual Property is now contained in email, and 79% of companies accept email as written confirmation of approvals, orders and other transactions. The challenge though is not the use of email. As the following statistics highlight, it is the risk email is subject that challenges business: Over 60% of email is spam. Spam is growing at over 63% per year (Source Ferris Research). Spam cost businesses $4.2 Million in lost productivity annually (Source IDC). 99% of business experiences outbreaks of viruses in 2004 (Source ICSA). 80% of viruses enter through the email gateway. Due to this new landscape, managing threats to integrity and availability of email services has become paramount for businesses around the world. Symantec Email Service (SES) manages this business risk for your organisation. This service manages all malicious content (virus, spam and inappropriate content) flowing both from external sources as well as within your organisation. Figure 1 highlights the Symantec model. SPAMVIRUS CORPORATE NETWORK INTERNET EXTERNAL NETWORK CORPORATE NETWORK Figure 1 - Secure Email Service Overview This service leverages people, process and technology to deliver a capability which is more effective and cost effective than an organisation can provided with internal resources. Key Benefits The key benefits to your organisation are: Reduce operational costs – Lower cost than companies can provide internally. Reduce organisational down time – Proactive management to reduce and eliminate virus outbreaks. All year round protection – 24 hours a day, 365 days a year the service monitors and protects your business. Guaranteed service – Backed by Symantec Service Level Agreements (SLA). Predictable cost model – Fixed fee per month service based on the number of users with no capital costs. Complete visibility – With direct access to management analysis and reporting tools, clients can view status and important statistical information from anywhere they choose. Key Features Key features of the Symantec Compliance Management service are: Complete coverage – Coverage across all email services not just your gateway. Vendor independent – Manage Symantec, heterogeneous, or other major vendor products. 24 hour incident response capability – The service is monitored on a 24 hour, 365 day basis with a team ready to respond and manage issues. Management Dashboard – A secure management portal to view status of service. Reporting – Regular reporting to management on service metrics and security statistics. Service desk integration – Automatic ticketing integration with Peregrine and Remedy service desks. Fixed contracts – Fixed price agreements based on 3, 4 and 5 year periods.
  • 2. Commercial in Confidence 2 Enterprise Security Services Symantec ™ Secure Email Service Managed risk of viruses and spyware across your organisation Our Approach As the approach is not product driven, Symantec take a methodical process oriented approach to ensure success. This involves: An analysis of the customer’s current network and internal processes. Establishment of a transition plan for moving to the new service. Design, build, test and transition to the service. Perform reporting, maintenance, monitoring and incident response services ongoing. To achieving this in a cost effective manner, Symantec: Establishes automated processes and capability through world leading technology. Utilises the best industry experts to rapidly and efficiently manage the service. Symantec ensures this approach is globally consistent and repeatable with a quality outcome by: Using Symantec tried and tested practices integrated into your business processes. Establishment of automated workflow to manage programs of work. Simply put, all year round Symantec utilise best of breed technology, expert people and proven processes to establish an integrated management practice. This approach can be demonstrated by Figure 2. Figure 2 - Symantec's approach Symantec establishes and maintains three important activities around this service: 1. 24 by 7 monitoring and incident response – Automated services track and notify our incident response teams of potential and actual issues. 2. On-demand management reporting – Baseline and risk snap shot reporting for operational and executive management. 3. Workflow management – Automated remediation and activity tracking integrated into major helpdesk ticketing systems (e.g.: Peregrine, Remedy etc). These activities are delivered by expert staff trained and experienced in security risk management to ensure relevance to your business. About Symantec Symantec is the global leader in information security providing services designed to help mid- sized businesses and large enterprises secure and manage their IT infrastructure. Symantec Australia Head Quarters Riverside Corporate Park Level 2, 1 Julius Avenue North Ryde NSW 2113 More Information Telstra/KAZ Account Manager Richard Dufty Email: richard_dufty@symantec.com Phone: 02 8220 7035 Mobile: 0414 754 325 Telstra/KAZ Business Development Manager Glenn Hurn Email: glenn_hurn@symantec.com Phone: 03 9864 2629 Mobile: 0407 775 672