Cloud computing security john abrena - chicago tour

459 views

Published on

Small Business Technology Tour 2011 - http://techtour2011chicago.eventbrite.com/

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

Cloud computing security john abrena - chicago tour

  1. 1. Using Cloud-Based Services to Secure and Manage your Information John Abrena Director, Cloud Services - En Pointe TechnologiesPresentation Identifier Goes Here 1
  2. 2. Risk = Uncertainty that Matters
  3. 3. My Security Syllogism Information has value We protect things of value Therefore: We must protect information
  4. 4. Here is Proof
  5. 5. Security vs. Privacy PRIVACY WHAT (WHY) information needs to be protected SECURITY HOW to protect information
  6. 6. Bill BoniCISO, Motorola
  7. 7. Data BreachesThe Changing Threat Landscape
  8. 8. Global Intelligence Network Identifies more threats, takes action faster & minimizes impact Calgary, Alberta Dublin, Ireland Reading, England San Francisco, CA Alexandria, VA Tokyo, Japan Mountain View, CA Chengdu, China Austin, TX Culver City, CA Taipei, Taiwan Chennai, India Pune, India Sydney, AU Worldwide Coverage Global Scope and Scale 24x7 Event Logging Rapid DetectionAttack Activity Malware Intelligence Vulnerabilities Spam/Phishing• 240,000 sensors • 130M • 32,000+ vulnerabilities • 2.5M decoy accounts • 200+ countries client, server, gateways • 11,000 vendors • 8B+ email messages/day monitored • 72,000 technologies • 1B+ web requests/day • Global coverage Preemptive Security Alerts Information Protection Threat Triggered Actions
  9. 9. Internet Security Threat Report XIVOverarching Themes • Attackers are increasingly targeting end users by compromising high-traffic, trusted websites. • Attackers are moving their operations to regions with emerging Internet infrastructures and, in some instances, developing and maintaining their own service provisioning. • Cross-functional industry cooperation in the security community is becoming imperative.
  10. 10. Internet Security Threat Report XIVData Breach Trends Data Breaches Identities Exposed
  11. 11. Threat Agents Well-meaning Insiders Malicious Insiders Hackers and Cyber-Criminals
  12. 12. How we can help…….Presentation Identifier Goes Here 12
  13. 13. Symantec & The Cloud Consume Build ExtendSimplify IT with Symantec’s Cloud-Based Solutions
  14. 14. Consuming Public Clouds Services provided by a Virtual private and Services available single entity for that entity community cloud services to the general publicHigh Private Greater Greater financialControl ownership Hybrid and technical and control: leverage: both financial scale, but and technical Community also risk PublicLow Low Leverage High Simplify IT with Symantec’s Cloud-Based Solutions 14
  15. 15. Cloud Computing – Public Clouds Outcome/Value Process Software Platform SaaS InfrastructureSimplify IT with Symantec’s Cloud-Based Solutions 15
  16. 16. Benefits for Consuming Cloud Services Easy to deploy Easy to use No hardware or software $ Pay as you go Automatic updates Easy to scaleSimplify IT with Symantec’s Cloud-Based Solutions 16
  17. 17. Symantec Solutions Information Endpoint Security Availability • Endpoint Security.cloud • Enterprise Vault.cloud • Email Continuity • Backup Exec.cloud Consume Protocol Security Cloud Service • Email Security.cloud • Web Security.cloud • IM Security.cloud Authentication Security Incident & Event Management • VeriSign Identity Protection • Managed Security ServiceSimplify IT with Symantec’s Cloud-Based Solutions 17
  18. 18. Easy to deploy Pre-integrated apps No hardware or software 24/7 customer Automatic updates support Easy to scale Industry leading SLAs $ Pay as you go 100% protection against both known Easy to use & unknown virusesSimplify IT with Symantec’s Cloud-Based Solutions
  19. 19. years 11.0 11 million security services users Providing services in the cloud 100+ 55 thousand countries security services clientsSimplify IT with Symantec’s Cloud-Based Solutions 19
  20. 20. Final Thoughts on the Importance of Security• “Security” is essential to facilitate and preserve “privacy”• There are numerous ethical issues that must be addressed as we continue to evolve our information society. Some that transcend technology and some that are manifest as a result of technologyPresentation Identifier Goes Here 20
  21. 21. Closing Thoughts Cloud services can reduce the growing complexity of IT SaaS is an easy way to start taking advantage of the cloud Symantec’s portfolio of services can assist your SaaS strategy SaaS is simple, and easy to testSimplify IT with Symantec’s Cloud-Based Solutions 21
  22. 22. Thank you!John AbrenaDirector, Cloud ServicesEn Pointe Technologies (www.enpointe.com)310-480-9549jabrena@enpointe.comCopyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates inthe U.S. and other countries. Other names may be trademarks of their respective owners.This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express orimplied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 22

×