SlideShare a Scribd company logo
1 of 3
Download to read offline
CUSTOMER SUCCESS


Fujitsu UK and Ireland
Delivering Security from the Cloud



Everyone’s talking about the cloud―what it might do, where it might go, how it                           ORGANIZATION PROFILE

will deliver. However, there are some organizations like Fujitsu UK and Ireland                          Website: www.uk.fujitsu.com
                                                                                                         Industry: IT
that are putting the cloud to work today, saving significant amounts of money,
                                                                                                         Headquarters: Tokyo
securing their IT infrastructure in the cloud, and achieving fast deployment and                         Employees: 11,400
seamless scalability―all without making long-term resource commitments.
Indeed, since standardizing on an integrated portfolio of hosted security, data                          SYMANTEC SOLUTIONS
loss prevention, and endpoint protection solutions from Symantec, Fujitsu has                            Data Loss Prevention
                                                                                                         Endpoint Security
never looked back.                                                                                       Messaging Security
                                                                                                         Web Security

Leading provider of IT systems, services, and products

From enabling airline bookings and drivers licenses, to banking transactions, retail shopping, and
more, Fujitsu touches the lives of millions of people every day. Fujitsu UK and Ireland is a leading
provider of IT systems, services, and products, employing 14,000 people with an annual revenue
of $3.2 billion. Fujitsu UK and Ireland is part of the global Fujitsu Group, delivering IT-based busi-
ness solutions to customers in 70 countries through a workforce of 175,000 employees.

Through these uncertain economic times, Fujitsu is helping its customers to reduce costs, adapt          Why Symantec?
to change, and improve operational efficiencies through the use of IT. That applies as much to the
technology it uses for its own means as it does to the customer environments Fujitsu supports. So        · Best-of-breed,
when the company was looking for a partner to support its information security requirements, one           Tier 1 partner
name stood head and shoulders above all the others: Symantec.
                                                                                                         · Symantec product
Andy Cooke, chief information security officer, Fujitsu, explains why Symantec is such a valuable          roadmap
partner. “We need to be absolutely certain that any service we provide is stable, is fully managed,
and is fully secured, and meets the functional requirements that we are looking for in the market-       · Breadth of integrated
place. The technology partners we work with have to be Tier 1 players, and they have to be highly          security technologies
credible. They need to reflect the full set of services that Fujitsu offers, and the security spectrum
that we need to put in place as an organization. Only a small number of organizations can provide
that depth and breadth of security services and actually be recognized as leaders in the market-
place. Symantec is one of those organizations.”
CUSTOMER SUCCESS         FUJITSU UK AND IRELAND




Cloud provides greater degree of                                                                         BUSINESS VALUE AND
                                                      SOLUTIONS AT A GLANCE
business protection
                                                      Key Challenges
                                                                                                         TECHNICAL BENEFITS
In the United Kingdom, Fujitsu has moved              •   Take a more agile stance on security           •   Introduced a significantly greater degree
messaging and Web security to the cloud               •   Capitalize on the value of the cloud               of business protection via cloud security
using Symantec Hosted Services. “We made                                                                     services
                                                      •   Reduce the time and costs associated with
a strategic decision to expand our use of                 security management
                                                                                                         •   Reduced server count from 16 physical
cloud services,” says Cooke, who champi-                                                                     servers to two virtual servers
oned the cloud security initiative. “In the                                                              •   Freed up at least two full-time employees
                                                      Symantec Products                                      for other tasks
past, simple email virus screening was ade-
                                                      •   Symantec™ Endpoint Protection                      Cut two million spam emails
quate protection for an organization, but the                                                            •

advent of more active threats such as                 •   MessageLabs™ Hosted Email Security             •   Reduce annual costs associated with Inter-
phishing, malware, and high-volume spam               •   MessageLabs™ Hosted Web Security                   net bandwidth consumption.
has driven the need for increased functional-         •   Symantec™ Data Loss Prevention                 •   Introduced cloud-based computing and
ity. Using the cloud, we will be able to provide                                                             storage infrastructures to customers as well
                                                                                                             as its own IT
a far greater degree of protection for our            Technology Environment
business.”                                                                                               •   Guarded against loss of sensitive data
                                                      •   Users: 14,000
                                                                                                         •   Reduced proliferation of confidential data
Like many organizations, more than 90                                                                        across the organization
percent of Fujitsu’s incoming email is spam.                                                             •   Protected communications of sensitive
“Previously, we were getting nearly two mil-                                                                 content to public websites
lion spam messages per day, consuming
bandwidth, storage, and time,” explains
Francis Cripps, messaging and unified com-
munications lead. “It became obvious that
the content filtering shouldn’t be on premise,
and it made a lot more sense to move it to the
cloud.”

The company had planned to expand its
email gateway to cope with the sheer volume
of email coming in, but with MessageLabs™
Hosted Email Security from Symantec in
place, that’s no longer necessary. “We’re
consolidating multiple physical servers into
two virtual servers. We’ve released at least
two full-time employees for other tasks, and
the two million emails a day have dropped to
approximately 150,000 a day. This has en-
abled us to significantly reduce the annual
costs associated with our Internet bandwidth
consumption.”

Protection from fraudulent and
rogue websites                                     Besides consuming cloud services, Fujitsu          “We’re consolidating multiple physical
                                                   also provides them. The company is putting         servers into two virtual servers.
Fujitsu recently decided to use MessageLabs™       its substantial data center resources to work
Hosted Web Security from Symantec as well.         to provide cloud-based computing and stor-         We’ve released at least two full-time
“It’s a core service in the cloud that is being    age infrastructures to customers as well as        employees for other tasks, and the two
constantly updated and requires no mainte-         its own IT. This allows internal and external      million emails a day have dropped
nance on our part,” Cooke says. “We need to        customers to access virtual servers and use
protect the organization against the rapidly       only the resources they need, on demand,           to approximately 150,000 a day.           ”
growing number of fraudulent and rogue             without having to deploy, maintain, power,
websites that consistently threaten to             and cool their own development or                  Francis Cripps
damage our business.”                              production infrastructures.                        Messaging and Unified Communications Lead
                                                                                                      Fujitsu UK and Ireland
CUSTOMER SUCCESS                  FUJITSU UK AND IRELAND




“Using our cloud services for ourselves pro-                           “We began the Endpoint Protection deploy-                            “[MessageLabs Hosted Web Security
vides an additional level of assurance for our                         ment with antivirus protection,” explains                              is] a core service in the cloud that is
customers,” explains David Smith, chief in-                            Cripps. “That ensures we can provide far
formation officer, Fujitsu. “We recognize that                         better protection to the organization. A large                         being constantly updated and requires
in some areas we need to work with our alli-                           proportion of Fujitsu’s workforce are mobile                           no maintenance on our part.                   ”
ance partners such as Symantec to ensure                               which carries with it the potential hazard of
that we’re providing all the required security                         laptops that can be out of step from the cur-                          Andy Cooke
solution components.”                                                  rent antivirus signatures that are available                           Chief Information Security Officer
                                                                       because they’ve not been able to take advan-                           Fujitsu UK and Ireland
Data Loss Prevention will enable the organi-                           tage of the automatic updates that are sent
zation to discover, monitor, and protect con-                          out on the corporate network.”
fidential data wherever it is stored or used.
This will help Fujitsu to reduce the prolifera-                        The enforcement functionality allows the
tion of confidential data across its data cen-                         team to identify any device that’s attached to
ters, client systems, remote offices, and                              the corporate network, quarantine it, and
end-user systems. It will help identify broken                         then update the device to the latest patch
business processes transmitting confidential                           levels. Looking ahead, Endpoint Protection
data. And it will monitor and protect com-                             will also be used in conjunction with Web
munications of sensitive content to public                             Services to help protect the organization
websites.                                                              against the sort of ongoing and ever-increas-
                                                                       ing fraudulent and rogue websites that con-
Endpoint Protection consolidates                                       tinue to threaten the business. “Mainly what
disparate security services                                            we want to do is to increase capabilities
                                                                       around areas such as email antivirus, anti-
Symantec Endpoint Protection already has a                             malware, and anti-phishing type capabili-
crucial role to play in the organization, pro-                         ties,” says Cripps.
tecting up to 14,000 internal endpoints.
Endpoint Protection was introduced to con-                             Endpoint Protection has also freed up valu-                          “Using our cloud services for ourselves
solidate many disparate security services, all                         able organizational resources. Previously, a                           provides an additional level of
of which required their own management                                 number of specialist teams were required
tools, their own updating, and their own bud-                          because a lot of the older, fragmented secu-                           assurance for our customers.                   ”
get. Traditionally they have been disparate,                           rity technologies required special expertise
focused applications, supporting the per-                              to run them. By standardizing on the                                   David Smith
sonal firewalls, antivirus, anti-malware, and                          Symantec solution, Fujitsu has significantly                           Chief Information Officer and
network access control. Endpoint Protection                            reduced the number of support personnel,                               Chief Technology Officer
unifies these into one product with one man-                           while confidence levels in the security capa-                          Fujitsu UK and Ireland
agement interface and one means of updat-                              bilities have increased exponentially. “We
ing it. It appears to Fujitsu as a single line                         now have one product set to report. There is
item, which also streamlines planning and                              one portal. There is one alerting system. So
budgetary management.                                                  if there is a problem, for instance, with the
                                                                       update mechanism, we can identify and re-
                                                                       solve it very quickly.”

                                                                       By partnering with Symantec for its security
                                                                       management, Fujitsu is protecting its own
                                                                       business interactions, information and IT
                                                                       infrastructure―as well as that belonging to
                                                                       its customers.




Copyright © 2010 Symantec Corporation. All rights reserved. Symantec, the Symantec logo, and MessageLabs are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and
other countries. Other names may be trademarks of their respective owners. All product information is subject to change without notice.

More Related Content

What's hot

Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network SecurityDjadja Sardjana
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2JD Sherry
 
eircom Managed Security
eircom Managed Securityeircom Managed Security
eircom Managed Securityeircom
 
Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2Azlan NL
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15finalMahmoud Moustafa
 
How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...Agora Group
 
Mc afee saas web protection-rackaid
Mc afee saas web protection-rackaidMc afee saas web protection-rackaid
Mc afee saas web protection-rackaidrackAID Support
 
Tech editors conf tucker yen-jacoby revised final for may 24 2012
Tech editors conf tucker yen-jacoby revised final  for may 24 2012Tech editors conf tucker yen-jacoby revised final  for may 24 2012
Tech editors conf tucker yen-jacoby revised final for may 24 2012Cisco Public Relations
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityAndrew Wong
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntelAPAC
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)itforum-roundtable
 
Rapid Integration of Software-as-a-Service with On-Premise Applications Using...
Rapid Integration of Software-as-a-Service with On-Premise Applications Using...Rapid Integration of Software-as-a-Service with On-Premise Applications Using...
Rapid Integration of Software-as-a-Service with On-Premise Applications Using...Prolifics
 
Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?doan_slideshares
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmgNeha Dhawan
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guideYury Chemerkin
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep securityTrend Micro
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Securityanniebrowny
 

What's hot (19)

Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network Security
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2
 
eircom Managed Security
eircom Managed Securityeircom Managed Security
eircom Managed Security
 
Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
 
How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...
 
Mc afee saas web protection-rackaid
Mc afee saas web protection-rackaidMc afee saas web protection-rackaid
Mc afee saas web protection-rackaid
 
Tech editors conf tucker yen-jacoby revised final for may 24 2012
Tech editors conf tucker yen-jacoby revised final  for may 24 2012Tech editors conf tucker yen-jacoby revised final  for may 24 2012
Tech editors conf tucker yen-jacoby revised final for may 24 2012
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)
 
Hosted Contact Centre Security
Hosted Contact Centre SecurityHosted Contact Centre Security
Hosted Contact Centre Security
 
Rapid Integration of Software-as-a-Service with On-Premise Applications Using...
Rapid Integration of Software-as-a-Service with On-Premise Applications Using...Rapid Integration of Software-as-a-Service with On-Premise Applications Using...
Rapid Integration of Software-as-a-Service with On-Premise Applications Using...
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmg
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guide
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Security
 

Similar to Delivering Security from the Cloud with Symantec

The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsCisco Security
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud pptSana Nasar
 
Intergen Twilight Seminar: Constructive Disruption with Cloud Technologies
Intergen Twilight Seminar: Constructive Disruption with Cloud TechnologiesIntergen Twilight Seminar: Constructive Disruption with Cloud Technologies
Intergen Twilight Seminar: Constructive Disruption with Cloud TechnologiesIntergen
 
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...IRJET Journal
 
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...Data center 2.0: The journey to the cloud from the datacenter perspertive by ...
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...HKISPA
 
IBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudIBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudChris Pepin
 
Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Reportfinance40
 
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines ComplianceUSB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines ComplianceNetwrix Corporation
 
Are you ready for the private cloud? [WHITEPAPER]
Are you ready for the  private cloud? [WHITEPAPER]Are you ready for the  private cloud? [WHITEPAPER]
Are you ready for the private cloud? [WHITEPAPER]KVH Co. Ltd.
 
Centuric Overview
Centuric OverviewCenturic Overview
Centuric OverviewCenturic
 

Similar to Delivering Security from the Cloud with Symantec (20)

The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
 
Noble Foods- Cisco
Noble Foods- CiscoNoble Foods- Cisco
Noble Foods- Cisco
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud ppt
 
Yakhouba
YakhoubaYakhouba
Yakhouba
 
Advance Group
Advance Group Advance Group
Advance Group
 
MMPL corporate overview mail
MMPL corporate overview mailMMPL corporate overview mail
MMPL corporate overview mail
 
Arup
ArupArup
Arup
 
Intergen Twilight Seminar: Constructive Disruption with Cloud Technologies
Intergen Twilight Seminar: Constructive Disruption with Cloud TechnologiesIntergen Twilight Seminar: Constructive Disruption with Cloud Technologies
Intergen Twilight Seminar: Constructive Disruption with Cloud Technologies
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
 
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...Data center 2.0: The journey to the cloud from the datacenter perspertive by ...
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...
 
Value Stories - 7th Issue
Value Stories - 7th Issue Value Stories - 7th Issue
Value Stories - 7th Issue
 
IBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudIBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM Cloud
 
Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Report
 
IBM Cloud: Rethink IT. Reinvent business.
IBM Cloud: Rethink IT. Reinvent business.IBM Cloud: Rethink IT. Reinvent business.
IBM Cloud: Rethink IT. Reinvent business.
 
Swisscom
Swisscom Swisscom
Swisscom
 
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines ComplianceUSB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
 
Are you ready for the private cloud? [WHITEPAPER]
Are you ready for the  private cloud? [WHITEPAPER]Are you ready for the  private cloud? [WHITEPAPER]
Are you ready for the private cloud? [WHITEPAPER]
 
Centuric Overview
Centuric OverviewCenturic Overview
Centuric Overview
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 

Delivering Security from the Cloud with Symantec

  • 1. CUSTOMER SUCCESS Fujitsu UK and Ireland Delivering Security from the Cloud Everyone’s talking about the cloud―what it might do, where it might go, how it ORGANIZATION PROFILE will deliver. However, there are some organizations like Fujitsu UK and Ireland Website: www.uk.fujitsu.com Industry: IT that are putting the cloud to work today, saving significant amounts of money, Headquarters: Tokyo securing their IT infrastructure in the cloud, and achieving fast deployment and Employees: 11,400 seamless scalability―all without making long-term resource commitments. Indeed, since standardizing on an integrated portfolio of hosted security, data SYMANTEC SOLUTIONS loss prevention, and endpoint protection solutions from Symantec, Fujitsu has Data Loss Prevention Endpoint Security never looked back. Messaging Security Web Security Leading provider of IT systems, services, and products From enabling airline bookings and drivers licenses, to banking transactions, retail shopping, and more, Fujitsu touches the lives of millions of people every day. Fujitsu UK and Ireland is a leading provider of IT systems, services, and products, employing 14,000 people with an annual revenue of $3.2 billion. Fujitsu UK and Ireland is part of the global Fujitsu Group, delivering IT-based busi- ness solutions to customers in 70 countries through a workforce of 175,000 employees. Through these uncertain economic times, Fujitsu is helping its customers to reduce costs, adapt Why Symantec? to change, and improve operational efficiencies through the use of IT. That applies as much to the technology it uses for its own means as it does to the customer environments Fujitsu supports. So · Best-of-breed, when the company was looking for a partner to support its information security requirements, one Tier 1 partner name stood head and shoulders above all the others: Symantec. · Symantec product Andy Cooke, chief information security officer, Fujitsu, explains why Symantec is such a valuable roadmap partner. “We need to be absolutely certain that any service we provide is stable, is fully managed, and is fully secured, and meets the functional requirements that we are looking for in the market- · Breadth of integrated place. The technology partners we work with have to be Tier 1 players, and they have to be highly security technologies credible. They need to reflect the full set of services that Fujitsu offers, and the security spectrum that we need to put in place as an organization. Only a small number of organizations can provide that depth and breadth of security services and actually be recognized as leaders in the market- place. Symantec is one of those organizations.”
  • 2. CUSTOMER SUCCESS FUJITSU UK AND IRELAND Cloud provides greater degree of BUSINESS VALUE AND SOLUTIONS AT A GLANCE business protection Key Challenges TECHNICAL BENEFITS In the United Kingdom, Fujitsu has moved • Take a more agile stance on security • Introduced a significantly greater degree messaging and Web security to the cloud • Capitalize on the value of the cloud of business protection via cloud security using Symantec Hosted Services. “We made services • Reduce the time and costs associated with a strategic decision to expand our use of security management • Reduced server count from 16 physical cloud services,” says Cooke, who champi- servers to two virtual servers oned the cloud security initiative. “In the • Freed up at least two full-time employees Symantec Products for other tasks past, simple email virus screening was ade- • Symantec™ Endpoint Protection Cut two million spam emails quate protection for an organization, but the • advent of more active threats such as • MessageLabs™ Hosted Email Security • Reduce annual costs associated with Inter- phishing, malware, and high-volume spam • MessageLabs™ Hosted Web Security net bandwidth consumption. has driven the need for increased functional- • Symantec™ Data Loss Prevention • Introduced cloud-based computing and ity. Using the cloud, we will be able to provide storage infrastructures to customers as well as its own IT a far greater degree of protection for our Technology Environment business.” • Guarded against loss of sensitive data • Users: 14,000 • Reduced proliferation of confidential data Like many organizations, more than 90 across the organization percent of Fujitsu’s incoming email is spam. • Protected communications of sensitive “Previously, we were getting nearly two mil- content to public websites lion spam messages per day, consuming bandwidth, storage, and time,” explains Francis Cripps, messaging and unified com- munications lead. “It became obvious that the content filtering shouldn’t be on premise, and it made a lot more sense to move it to the cloud.” The company had planned to expand its email gateway to cope with the sheer volume of email coming in, but with MessageLabs™ Hosted Email Security from Symantec in place, that’s no longer necessary. “We’re consolidating multiple physical servers into two virtual servers. We’ve released at least two full-time employees for other tasks, and the two million emails a day have dropped to approximately 150,000 a day. This has en- abled us to significantly reduce the annual costs associated with our Internet bandwidth consumption.” Protection from fraudulent and rogue websites Besides consuming cloud services, Fujitsu “We’re consolidating multiple physical also provides them. The company is putting servers into two virtual servers. Fujitsu recently decided to use MessageLabs™ its substantial data center resources to work Hosted Web Security from Symantec as well. to provide cloud-based computing and stor- We’ve released at least two full-time “It’s a core service in the cloud that is being age infrastructures to customers as well as employees for other tasks, and the two constantly updated and requires no mainte- its own IT. This allows internal and external million emails a day have dropped nance on our part,” Cooke says. “We need to customers to access virtual servers and use protect the organization against the rapidly only the resources they need, on demand, to approximately 150,000 a day. ” growing number of fraudulent and rogue without having to deploy, maintain, power, websites that consistently threaten to and cool their own development or Francis Cripps damage our business.” production infrastructures. Messaging and Unified Communications Lead Fujitsu UK and Ireland
  • 3. CUSTOMER SUCCESS FUJITSU UK AND IRELAND “Using our cloud services for ourselves pro- “We began the Endpoint Protection deploy- “[MessageLabs Hosted Web Security vides an additional level of assurance for our ment with antivirus protection,” explains is] a core service in the cloud that is customers,” explains David Smith, chief in- Cripps. “That ensures we can provide far formation officer, Fujitsu. “We recognize that better protection to the organization. A large being constantly updated and requires in some areas we need to work with our alli- proportion of Fujitsu’s workforce are mobile no maintenance on our part. ” ance partners such as Symantec to ensure which carries with it the potential hazard of that we’re providing all the required security laptops that can be out of step from the cur- Andy Cooke solution components.” rent antivirus signatures that are available Chief Information Security Officer because they’ve not been able to take advan- Fujitsu UK and Ireland Data Loss Prevention will enable the organi- tage of the automatic updates that are sent zation to discover, monitor, and protect con- out on the corporate network.” fidential data wherever it is stored or used. This will help Fujitsu to reduce the prolifera- The enforcement functionality allows the tion of confidential data across its data cen- team to identify any device that’s attached to ters, client systems, remote offices, and the corporate network, quarantine it, and end-user systems. It will help identify broken then update the device to the latest patch business processes transmitting confidential levels. Looking ahead, Endpoint Protection data. And it will monitor and protect com- will also be used in conjunction with Web munications of sensitive content to public Services to help protect the organization websites. against the sort of ongoing and ever-increas- ing fraudulent and rogue websites that con- Endpoint Protection consolidates tinue to threaten the business. “Mainly what disparate security services we want to do is to increase capabilities around areas such as email antivirus, anti- Symantec Endpoint Protection already has a malware, and anti-phishing type capabili- crucial role to play in the organization, pro- ties,” says Cripps. tecting up to 14,000 internal endpoints. Endpoint Protection was introduced to con- Endpoint Protection has also freed up valu- “Using our cloud services for ourselves solidate many disparate security services, all able organizational resources. Previously, a provides an additional level of of which required their own management number of specialist teams were required tools, their own updating, and their own bud- because a lot of the older, fragmented secu- assurance for our customers. ” get. Traditionally they have been disparate, rity technologies required special expertise focused applications, supporting the per- to run them. By standardizing on the David Smith sonal firewalls, antivirus, anti-malware, and Symantec solution, Fujitsu has significantly Chief Information Officer and network access control. Endpoint Protection reduced the number of support personnel, Chief Technology Officer unifies these into one product with one man- while confidence levels in the security capa- Fujitsu UK and Ireland agement interface and one means of updat- bilities have increased exponentially. “We ing it. It appears to Fujitsu as a single line now have one product set to report. There is item, which also streamlines planning and one portal. There is one alerting system. So budgetary management. if there is a problem, for instance, with the update mechanism, we can identify and re- solve it very quickly.” By partnering with Symantec for its security management, Fujitsu is protecting its own business interactions, information and IT infrastructure―as well as that belonging to its customers. Copyright © 2010 Symantec Corporation. All rights reserved. Symantec, the Symantec logo, and MessageLabs are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. All product information is subject to change without notice.