SlideShare a Scribd company logo
1 of 29
1Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Sample three prong diagram
• AWS division jumped 47% to $3.5B
• $926M Operating Income
• 71% Amazon’s $1.3B Operating
Income
• Symantec Cited as The Clear
Leader for Cloud Secure Gateways
• Top 7 AWS Security Issues
• Security and Compliance for Your
AWS Environment
.
• Server products and Cloud
Services revenue grew $577M or
12%
• Azure's revenue surged 93%
SUPPORTING ITEM
• Symantec Secures Office365
• Optimizing O365 with Symantec
PacketShaper
2Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Inaugural Edition
FullDayFaeder on Fridays
My cyber community has been asking for me to put something together to help sort through the “fake news”
and noise these thousands of small start-ups or even niche best of breed so called players that simply don’t
improve their security posture.
Respected cybersecurity leaders value my transparent insight and therefore I have acquiesced to their
demands.
3Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
I thought it pertinent to touch on the hot off the pres
s financial figures of the worlds 3 most impactful cloud
companies in my humble opinion.
Symantec, Amazon Web Services, and Microsoft Azure all
had outstanding quarters. It is becoming evident winners
have been chosen. Now only one of these companies is
focused solely on security.
AWS division jumped 47% to $3.5B Azure's revenue surged 93%
4Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
This week Symantec provided FullDayFaeder exclusive access to our World
Wide Solutions Architect, Mohammad Kaouk, who is a genuine genius and
dedicated to cloud security.
I personally witnessed some RSA sneak peaks as well current general
availability SKUs of the new:
Integrated Cyber Defense Platform
*Web Security Services, *Symantec CloudSOC, *Symantec DLP, *On-Premise
to Cloud DLP, *Malware Analysis Advanced Service (Full Detonation Cloud
Sandboxing), *SSL/TLS interception, managed centrally via *Hosted Reporter
10 and *Management Center (riding on a common operating environment), and
lastly all backed by *VIP multi-factor authentication. (WOW)
5Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
The great news is Symantec has partnered with Amazon Web Services to provide our customers access to
easily spin up a controlled virtual environment to play with the solutions for 2 weeks. Super easy to get going
with our Symantec Security Services Platform.
Giving this transformation to the cloud and the need for seamless multi-factor authentication for this Inaugural
edition I chose to cover our CASB/WSS/VIP story to protect users and data everywhere. Just ping me for a
free trial...
6Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
According to the Forrester report, “Blue
Coat/Symantec integrates CSG with its on-
premises secure web gateway.
The solution supports both proxy-based
and API monitoring of cloud platforms
(both AWS and Azure) and cloud
applications.
It has strong capabilities for Salesforce
and other structured data protection,
including search, sort, and filtering
operations, and offers a wide selection of
encryption and decryption policy options.
The solution’s built-in cloud application
catalog, support for Office 365, and
mobile-device-based encryption lag.”
Cloud Access Security Broker
(CASB)
PRODUCTS
8Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
New Challenges
26% of Cloud
Docs are
Broadly
Shared1
1 1H 2016 Shadow Data Report
Proliferation of Cloud Apps
Variety of Endpoints
Shadow Data Problem
Compromised Accounts
Risk Assessment
Intrusion Detection
Proxy/Firewall
DLP
Incident Response
Investigations
Malware Detection
9Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Proxy
Cloud Proxy
Events
Outside
Perimeter
Risk Assessment
Intrusion Detection
Proxy/Firewall
Incident Response
Investigations
DLP
Malware Detection
Enterprise
Perimeter
Cloud API
StreamIQ™
ContentIQ™
ThreatScore™
LIST (WEB)
10Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Management
Center
Agen
t
Single Pane of Glass
for Cloud Security
Visibility of
Shadow IT
Protection Against
Malicious Attacks
Granular Control of
Sensitive Data
10
PRODUCTS
Cloud Secure Web Gateway
PRODUCTS
12Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Shadow Cloud
IT
Consumer
Internet
Proxy
“We supply employees with mobile
devices. We need to govern their use
and protect information and users
when they are out in the world.”
Remote Sites, Mobile Devices and Users
How to Protect
PRODUCTS
13Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Symantec Web Security Service
Consumer
Internet
Shadow Cloud
IT
Proxy
Extend Web & Cloud
Governance to Mobile
Take Remote Sites Safely
“Direct to Net”
PRODUCTS
14Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
PRODUCTS
Dubai
https://www.bluecoat.com/cloud-data-center-locations/
AMERICAS
Ashburn, VA *
Santa Clara, CA
Chicago, IL *
Miami, FL
Seattle, WA *
Toronto, Ontario, Canada
Dallas, TX
Denver, CO
Buenos Aires, Argentina
Mexico City, Mexico
Sao Paulo, Brazil
New York, NY
Montreal, Quebec, Canada
EMEA
London, UK (2x) *
Frankfurt, Germany *
Paris, France*
Zurich, Switzerland
Stockholm, Sweden
Madrid, Spain
Helsinki, Finland
Milan, Italy
Johannesburg, South Africa
Oslo, Norway
Tel Aviv, Israel
Dubai, UAE
APAC
Sydney, Australia
Auckland, New Zealand
Republic of Singapore*
Tokyo, Japan
Shanghai, China
Hong Kong, China
Taipei, Taiwan
Seoul, Korea
Mumbai, India
Chennai, India
* Core site
Blue Coat Global Data Center Footprint
SSAE16ISO 27001
• Coverage across 6 continents
• Hosted at Top Tier infrastructure providers
• Redundant within and between locations
• Connect to any/closest Data Center
• Fully meshed /redundant network
• 40 Data Centers
15Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Secure Web Access in the Cloud
Proxy Enabled Web Security Service
Prox
y
Proxy All Endpoints
• Terminate and decrypt traffic
• Emulate all device types
• Extract content for inspection
• Integrate authentication
Control Web & Cloud Governance
• Discover shadow IT risk
• Block web-borne threats
• Enforce access policy & audit
usage
of web & cloud
W W W . W E B S I T E . C O M
Prevent Threats & Orchestrate
Content• Pre-filter sandbox with advanced content
inspection
• Send content to DLP, sandbox, analytics,
etc..
• Open integration architecture to quickly
add new services.JAR .EXE
Sandbox Malware to
Identify Advanced
Threats• Multi-factor file analysis
• Real time operation – prevent file
delivery until sandbox analysis
complete
Web
PRODUCTS
16Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Web Security Service with Malware Analysis
Service Add-On
Web Security Service (WSS)
• ProxySG Secure Web Gateway
• Dual Anti-Virus Scanning
• Global Intelligence Network
• URL Filtering and Categorization
• Comprehensive Reporting
• SSL Interception/Policy-Based Decryption
• CASB Audit Integration
Malware Analysis Service (MAS)
• Static Code Analysis
• YARA Rules Analysis
• Behavioral Analysis
• Emulation of Windows Processes
• Inline, Real-Time Blocking
• File and URL Reputation
MAS prevents first-client infection from unknown malware
PRODUCTS
17Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Malware Analysis Service: Standard vs
Advanced
Key Capabilities Standard Advanced
Static Code Analysis ✔ ✔
YARA Rule Analysis ✔ ✔
Behavioral Analysis ✔ ✔
Emulation of Windows Platform ✔ ✔
Inline, Real-time Blocking ✔ ✔
File and URL Reputation ✔ ✔
Windows Emulation ✔ ✔
Full Windows OS Detonation ✗ ✔
EXE and DLL Support ✔ ✔
Office Documents and PDF Support ✗ ✔
+JAVA, MSI, RTF, ZIP
Full Detonation Report ✗ ✔
18Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Email
Web
Access
Cloud
Apps
User Security
Information
Protection
Advanced
Threat Protection
Protect Across Web, Mail and Cloud App Vectors
PRODUCTS
Cloud Data Protection
PRODUCTS
20Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
IN TRANSIT AT REST IN USE
ZZ
Cloud Data Flow
“귏企専吁企倁ᐋ가귉”
“企専吁企倁ᐋ”
“가귉귏企専吁企倁”
“ᐋ귏企専吁企倁가귉”
TOKEN
“귏企専吁企倁ᐋ가귉”
“企専吁企倁ᐋ”
“가귉귏企専吁企倁”
“ᐋ귏企専吁企倁가귉”
TOKEN
“귏企専吁企倁ᐋ가귉”
“企専吁企倁ᐋ”
“가귉귏企専吁企倁”
“ᐋ귏企専吁企倁가귉”
TOKEN
“귏企専吁企倁ᐋ가귉”
“企専吁企倁ᐋ”
“가귉귏企専吁企倁”
“ᐋ귏企専吁企倁가귉”
TOKEN
PRODUCTS
21Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Symantec CDP Data Protection Process
Symantec
Cloud Data Protection
Gateway
Cloud Data Protection
Token Map Repository
User Cloud App
Cloud
Application
Example: enterprise defined a
policy to protect FIRST
NAME And LAST NAME Fields
In ServiceNow
Without impacting the cloud apps’
functionality (e.g. search, sort e-mail)
22Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Cloud Data Protection Steps
Data Governance
Determines Info
Sensitivity
Classification
Cross-Cloud
Data Protection
Policies Defined
CDP Enforces
Policies
in Real-Time
Without impacting the cloud application’s functionality (e.g. search, sort e-mail)
Mobile
Users
Remote
Workers
Enterprise
SaaS SaaS
SaaSPaaS
PRODUCTS
23Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Cloud Data ProtectionInfo Stored & Processed in the Cloud
Unauthorized users
see only tokenized
replacement values
Unauthorized
Users
Direct Connection
to ServiceNow
Authorized users see
all sensitive data
in the clear
Makes the move to the
cloud possible for all sorts
of regulated use cases
PRODUCTS
VIP and VIP Access Manager
PRODUCTS
25Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Symantec Identity Access Management
• Two-Factor
Authenticatio
n (2FA)
• Single Sign
On (SSO)
• For
Enterprises,
Consumers,
& Cloud Apps
VIP and VIP Access Manager
Network
(Enterprise Gateway)
Cloud Applications
(Access Manager)
Consumer
(CDK/API)
PRODUCTS
26Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Every Organization Needs Strong Authentication
63% of Confirmed Data Breaches Involve Leveraging Weak, Default or Stolen
Passwords
1. Something
you KNOW
2. Something
you HAVE3. Something
you ARE
PRODUCTS
27Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Identity & Access Control
Secure Access for the Entire User Base
Identity &
Access Control
SS
O
Access Manager
Internal Users
(Employees)
External Users
(Partners/Contractors)
Corporate Network Cloud Apps
PKI
Customers
Remote
Workers
PRODUCTS
28Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
VIP Deployment and Integration
Cloud-based and zero capital investment
(Bring-Your-Own-Credential)
Easy Deployment
All-in-one pricing, many credential
modalities, and even for consumers
Tap your finger to authenticate:
password-less authentication
Multi-platform Support Designed to Integrate
With the security and trust you expect from Symantec
API
CDK
FIDO
OATH
PUSH
B2C
B2E
Radius
SAML
PRODUCTS
Data Loss Prevention Next Week
PRODUCTS

More Related Content

What's hot

A Tale of Security & Ops Teamwork for Rapid Security Incident Resolution
A Tale of Security & Ops Teamwork for Rapid Security Incident ResolutionA Tale of Security & Ops Teamwork for Rapid Security Incident Resolution
A Tale of Security & Ops Teamwork for Rapid Security Incident ResolutionAmazon Web Services
 
Barracuda in Microsoft Azure
Barracuda in Microsoft AzureBarracuda in Microsoft Azure
Barracuda in Microsoft AzureresponsiveX
 
AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016Gaurav "GP" Pal
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...Cloudflare
 
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...Plain Concepts
 
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...Amazon Web Services
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsCloudflare
 
Dissecting ssl threats
Dissecting ssl threatsDissecting ssl threats
Dissecting ssl threatsZscaler
 
Protección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
Protección y acceso a tu información y aplicaciones en Azure y O365 – BarracudaProtección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
Protección y acceso a tu información y aplicaciones en Azure y O365 – BarracudaPlain Concepts
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastCloudflare
 
Unified Protection for Multi-Cloud Infrastructure
Unified Protection for Multi-Cloud InfrastructureUnified Protection for Multi-Cloud Infrastructure
Unified Protection for Multi-Cloud InfrastructureMarketingArrowECS_CZ
 
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeCloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeHimani Singh
 
Introducing Azure Bastion
Introducing Azure BastionIntroducing Azure Bastion
Introducing Azure BastionAmmar Hasayen
 
Cisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of AttackCisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of AttackCisco Canada
 
Advanced Techniques for Securing Web Applications
Advanced Techniques for Securing Web ApplicationsAdvanced Techniques for Securing Web Applications
Advanced Techniques for Securing Web ApplicationsAmazon Web Services
 
Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Cloudflare
 
Launching a Highly-regulated Startup in the Public Cloud
Launching a Highly-regulated Startup in the Public CloudLaunching a Highly-regulated Startup in the Public Cloud
Launching a Highly-regulated Startup in the Public CloudPoornaprajna Udupi
 
Practical AWS Security - Scott Hogg
Practical AWS Security - Scott HoggPractical AWS Security - Scott Hogg
Practical AWS Security - Scott HoggTrish McGinity, CCSK
 
Esg lab-validation-check-point-cloud guard-mar-2018
Esg lab-validation-check-point-cloud guard-mar-2018Esg lab-validation-check-point-cloud guard-mar-2018
Esg lab-validation-check-point-cloud guard-mar-2018Alejandro Daricz
 

What's hot (20)

A Tale of Security & Ops Teamwork for Rapid Security Incident Resolution
A Tale of Security & Ops Teamwork for Rapid Security Incident ResolutionA Tale of Security & Ops Teamwork for Rapid Security Incident Resolution
A Tale of Security & Ops Teamwork for Rapid Security Incident Resolution
 
Barracuda in Microsoft Azure
Barracuda in Microsoft AzureBarracuda in Microsoft Azure
Barracuda in Microsoft Azure
 
AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
 
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...
 
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teams
 
Dissecting ssl threats
Dissecting ssl threatsDissecting ssl threats
Dissecting ssl threats
 
Protección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
Protección y acceso a tu información y aplicaciones en Azure y O365 – BarracudaProtección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
Protección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
Unified Protection for Multi-Cloud Infrastructure
Unified Protection for Multi-Cloud InfrastructureUnified Protection for Multi-Cloud Infrastructure
Unified Protection for Multi-Cloud Infrastructure
 
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeCloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
 
Introducing Azure Bastion
Introducing Azure BastionIntroducing Azure Bastion
Introducing Azure Bastion
 
Cisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of AttackCisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of Attack
 
Advanced Techniques for Securing Web Applications
Advanced Techniques for Securing Web ApplicationsAdvanced Techniques for Securing Web Applications
Advanced Techniques for Securing Web Applications
 
Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...
 
Cloud Seeding
Cloud SeedingCloud Seeding
Cloud Seeding
 
Launching a Highly-regulated Startup in the Public Cloud
Launching a Highly-regulated Startup in the Public CloudLaunching a Highly-regulated Startup in the Public Cloud
Launching a Highly-regulated Startup in the Public Cloud
 
Practical AWS Security - Scott Hogg
Practical AWS Security - Scott HoggPractical AWS Security - Scott Hogg
Practical AWS Security - Scott Hogg
 
Esg lab-validation-check-point-cloud guard-mar-2018
Esg lab-validation-check-point-cloud guard-mar-2018Esg lab-validation-check-point-cloud guard-mar-2018
Esg lab-validation-check-point-cloud guard-mar-2018
 

Similar to FullDay Faeder on Friday

Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaCristian Garcia G.
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Keith Kraus
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copperscoopnewsgroup
 
A Cloud Security Ghost Story Craig Balding
A Cloud Security Ghost Story   Craig BaldingA Cloud Security Ghost Story   Craig Balding
A Cloud Security Ghost Story Craig Baldingcraigbalding
 
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)Vince Garr
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesKai Wähner
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudZscaler
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...Amazon Web Services Korea
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?Zscaler
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Connect Halifax 2018   Anatomy of attackCisco Connect Halifax 2018   Anatomy of attack
Cisco Connect Halifax 2018 Anatomy of attackCisco Canada
 
Maximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerMaximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerZscaler
 
Maximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerMaximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerAnkit Dua
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsRightScale
 
Security TechTalk | AWS Public Sector Summit 2016
Security TechTalk | AWS Public Sector Summit 2016Security TechTalk | AWS Public Sector Summit 2016
Security TechTalk | AWS Public Sector Summit 2016Amazon Web Services
 
01-Chapter 01-Introduction to CASB and Netskope.pptx
01-Chapter 01-Introduction to CASB and Netskope.pptx01-Chapter 01-Introduction to CASB and Netskope.pptx
01-Chapter 01-Introduction to CASB and Netskope.pptxssuser4c54af
 
Best practices for privileged access & secrets management in the cloud - DEM0...
Best practices for privileged access & secrets management in the cloud - DEM0...Best practices for privileged access & secrets management in the cloud - DEM0...
Best practices for privileged access & secrets management in the cloud - DEM0...Amazon Web Services
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSTrend Micro
 

Similar to FullDay Faeder on Friday (20)

Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copper
 
A Cloud Security Ghost Story Craig Balding
A Cloud Security Ghost Story   Craig BaldingA Cloud Security Ghost Story   Craig Balding
A Cloud Security Ghost Story Craig Balding
 
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Connect Halifax 2018   Anatomy of attackCisco Connect Halifax 2018   Anatomy of attack
Cisco Connect Halifax 2018 Anatomy of attack
 
Maximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerMaximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and Zscaler
 
Maximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerMaximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and Zscaler
 
Presd1 10
Presd1 10Presd1 10
Presd1 10
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid Clouds
 
Security TechTalk | AWS Public Sector Summit 2016
Security TechTalk | AWS Public Sector Summit 2016Security TechTalk | AWS Public Sector Summit 2016
Security TechTalk | AWS Public Sector Summit 2016
 
01-Chapter 01-Introduction to CASB and Netskope.pptx
01-Chapter 01-Introduction to CASB and Netskope.pptx01-Chapter 01-Introduction to CASB and Netskope.pptx
01-Chapter 01-Introduction to CASB and Netskope.pptx
 
Best practices for privileged access & secrets management in the cloud - DEM0...
Best practices for privileged access & secrets management in the cloud - DEM0...Best practices for privileged access & secrets management in the cloud - DEM0...
Best practices for privileged access & secrets management in the cloud - DEM0...
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWS
 

Recently uploaded

Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779Delhi Call girls
 
"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's go"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's goSocioCosmos
 
Learn About the Rise of Instagram Pro in 2024
Learn About the Rise of Instagram Pro in 2024Learn About the Rise of Instagram Pro in 2024
Learn About the Rise of Instagram Pro in 2024Islam Fit
 
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call MeCall^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call MeMs Riya
 
Angela Killian | Operations Director | Dallas
Angela Killian | Operations Director | DallasAngela Killian | Operations Director | Dallas
Angela Killian | Operations Director | DallasAngela Killian
 
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779Delhi Call girls
 
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxDickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxednyonat
 
MODERN PODCASTING ,CREATING DREAMS TODAY.
MODERN PODCASTING ,CREATING DREAMS TODAY.MODERN PODCASTING ,CREATING DREAMS TODAY.
MODERN PODCASTING ,CREATING DREAMS TODAY.AFFFILIATE
 
O9654467111 Call Girls In Dwarka Women Seeking Men
O9654467111 Call Girls In Dwarka Women Seeking MenO9654467111 Call Girls In Dwarka Women Seeking Men
O9654467111 Call Girls In Dwarka Women Seeking MenSapana Sha
 
Improve Your Brand in Waco with a Professional Social Media Marketing Company
Improve Your Brand in Waco with a Professional Social Media Marketing CompanyImprove Your Brand in Waco with a Professional Social Media Marketing Company
Improve Your Brand in Waco with a Professional Social Media Marketing CompanyWSI INTERNET PARTNER
 
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...AJHSSR Journal
 
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy GirlsCall Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy GirlsPooja Nehwal
 
Top Call Girls In Telibagh ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Telibagh ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Telibagh ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Telibagh ( Lucknow ) 🔝 8923113531 🔝 Cash Paymentanilsa9823
 
Ready to get noticed? Partner with Sociocosmos
Ready to get noticed? Partner with SociocosmosReady to get noticed? Partner with Sociocosmos
Ready to get noticed? Partner with SociocosmosSocioCosmos
 
Top Call Girls In Charbagh ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Charbagh ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Charbagh ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Charbagh ( Lucknow ) 🔝 8923113531 🔝 Cash Paymentanilsa9823
 
Social media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketingSocial media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketingSheikhSaifAli1
 
Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779
Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779
Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779Delhi Call girls
 

Recently uploaded (20)

Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
 
Bicycle Safety in Focus: Preventing Fatalities and Seeking Justice
Bicycle Safety in Focus: Preventing Fatalities and Seeking JusticeBicycle Safety in Focus: Preventing Fatalities and Seeking Justice
Bicycle Safety in Focus: Preventing Fatalities and Seeking Justice
 
"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's go"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's go
 
Learn About the Rise of Instagram Pro in 2024
Learn About the Rise of Instagram Pro in 2024Learn About the Rise of Instagram Pro in 2024
Learn About the Rise of Instagram Pro in 2024
 
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call MeCall^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
 
Angela Killian | Operations Director | Dallas
Angela Killian | Operations Director | DallasAngela Killian | Operations Director | Dallas
Angela Killian | Operations Director | Dallas
 
9953056974 Young Call Girls In Kirti Nagar Indian Quality Escort service
9953056974 Young Call Girls In  Kirti Nagar Indian Quality Escort service9953056974 Young Call Girls In  Kirti Nagar Indian Quality Escort service
9953056974 Young Call Girls In Kirti Nagar Indian Quality Escort service
 
Russian Call Girls Rohini Sector 37 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Rohini Sector 37 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...Russian Call Girls Rohini Sector 37 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Rohini Sector 37 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
 
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
 
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxDickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
 
MODERN PODCASTING ,CREATING DREAMS TODAY.
MODERN PODCASTING ,CREATING DREAMS TODAY.MODERN PODCASTING ,CREATING DREAMS TODAY.
MODERN PODCASTING ,CREATING DREAMS TODAY.
 
O9654467111 Call Girls In Dwarka Women Seeking Men
O9654467111 Call Girls In Dwarka Women Seeking MenO9654467111 Call Girls In Dwarka Women Seeking Men
O9654467111 Call Girls In Dwarka Women Seeking Men
 
Improve Your Brand in Waco with a Professional Social Media Marketing Company
Improve Your Brand in Waco with a Professional Social Media Marketing CompanyImprove Your Brand in Waco with a Professional Social Media Marketing Company
Improve Your Brand in Waco with a Professional Social Media Marketing Company
 
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
 
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy GirlsCall Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
 
Top Call Girls In Telibagh ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Telibagh ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Telibagh ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Telibagh ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
 
Ready to get noticed? Partner with Sociocosmos
Ready to get noticed? Partner with SociocosmosReady to get noticed? Partner with Sociocosmos
Ready to get noticed? Partner with Sociocosmos
 
Top Call Girls In Charbagh ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Charbagh ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Charbagh ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Charbagh ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
 
Social media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketingSocial media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketing
 
Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779
Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779
Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779
 

FullDay Faeder on Friday

  • 1. 1Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Sample three prong diagram • AWS division jumped 47% to $3.5B • $926M Operating Income • 71% Amazon’s $1.3B Operating Income • Symantec Cited as The Clear Leader for Cloud Secure Gateways • Top 7 AWS Security Issues • Security and Compliance for Your AWS Environment . • Server products and Cloud Services revenue grew $577M or 12% • Azure's revenue surged 93% SUPPORTING ITEM • Symantec Secures Office365 • Optimizing O365 with Symantec PacketShaper
  • 2. 2Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Inaugural Edition FullDayFaeder on Fridays My cyber community has been asking for me to put something together to help sort through the “fake news” and noise these thousands of small start-ups or even niche best of breed so called players that simply don’t improve their security posture. Respected cybersecurity leaders value my transparent insight and therefore I have acquiesced to their demands.
  • 3. 3Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. I thought it pertinent to touch on the hot off the pres s financial figures of the worlds 3 most impactful cloud companies in my humble opinion. Symantec, Amazon Web Services, and Microsoft Azure all had outstanding quarters. It is becoming evident winners have been chosen. Now only one of these companies is focused solely on security. AWS division jumped 47% to $3.5B Azure's revenue surged 93%
  • 4. 4Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. This week Symantec provided FullDayFaeder exclusive access to our World Wide Solutions Architect, Mohammad Kaouk, who is a genuine genius and dedicated to cloud security. I personally witnessed some RSA sneak peaks as well current general availability SKUs of the new: Integrated Cyber Defense Platform *Web Security Services, *Symantec CloudSOC, *Symantec DLP, *On-Premise to Cloud DLP, *Malware Analysis Advanced Service (Full Detonation Cloud Sandboxing), *SSL/TLS interception, managed centrally via *Hosted Reporter 10 and *Management Center (riding on a common operating environment), and lastly all backed by *VIP multi-factor authentication. (WOW)
  • 5. 5Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. The great news is Symantec has partnered with Amazon Web Services to provide our customers access to easily spin up a controlled virtual environment to play with the solutions for 2 weeks. Super easy to get going with our Symantec Security Services Platform. Giving this transformation to the cloud and the need for seamless multi-factor authentication for this Inaugural edition I chose to cover our CASB/WSS/VIP story to protect users and data everywhere. Just ping me for a free trial...
  • 6. 6Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. According to the Forrester report, “Blue Coat/Symantec integrates CSG with its on- premises secure web gateway. The solution supports both proxy-based and API monitoring of cloud platforms (both AWS and Azure) and cloud applications. It has strong capabilities for Salesforce and other structured data protection, including search, sort, and filtering operations, and offers a wide selection of encryption and decryption policy options. The solution’s built-in cloud application catalog, support for Office 365, and mobile-device-based encryption lag.”
  • 7. Cloud Access Security Broker (CASB) PRODUCTS
  • 8. 8Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. New Challenges 26% of Cloud Docs are Broadly Shared1 1 1H 2016 Shadow Data Report Proliferation of Cloud Apps Variety of Endpoints Shadow Data Problem Compromised Accounts Risk Assessment Intrusion Detection Proxy/Firewall DLP Incident Response Investigations Malware Detection
  • 9. 9Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Proxy Cloud Proxy Events Outside Perimeter Risk Assessment Intrusion Detection Proxy/Firewall Incident Response Investigations DLP Malware Detection Enterprise Perimeter Cloud API StreamIQ™ ContentIQ™ ThreatScore™ LIST (WEB)
  • 10. 10Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Management Center Agen t Single Pane of Glass for Cloud Security Visibility of Shadow IT Protection Against Malicious Attacks Granular Control of Sensitive Data 10 PRODUCTS
  • 11. Cloud Secure Web Gateway PRODUCTS
  • 12. 12Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Shadow Cloud IT Consumer Internet Proxy “We supply employees with mobile devices. We need to govern their use and protect information and users when they are out in the world.” Remote Sites, Mobile Devices and Users How to Protect PRODUCTS
  • 13. 13Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Symantec Web Security Service Consumer Internet Shadow Cloud IT Proxy Extend Web & Cloud Governance to Mobile Take Remote Sites Safely “Direct to Net” PRODUCTS
  • 14. 14Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. PRODUCTS Dubai https://www.bluecoat.com/cloud-data-center-locations/ AMERICAS Ashburn, VA * Santa Clara, CA Chicago, IL * Miami, FL Seattle, WA * Toronto, Ontario, Canada Dallas, TX Denver, CO Buenos Aires, Argentina Mexico City, Mexico Sao Paulo, Brazil New York, NY Montreal, Quebec, Canada EMEA London, UK (2x) * Frankfurt, Germany * Paris, France* Zurich, Switzerland Stockholm, Sweden Madrid, Spain Helsinki, Finland Milan, Italy Johannesburg, South Africa Oslo, Norway Tel Aviv, Israel Dubai, UAE APAC Sydney, Australia Auckland, New Zealand Republic of Singapore* Tokyo, Japan Shanghai, China Hong Kong, China Taipei, Taiwan Seoul, Korea Mumbai, India Chennai, India * Core site Blue Coat Global Data Center Footprint SSAE16ISO 27001 • Coverage across 6 continents • Hosted at Top Tier infrastructure providers • Redundant within and between locations • Connect to any/closest Data Center • Fully meshed /redundant network • 40 Data Centers
  • 15. 15Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Secure Web Access in the Cloud Proxy Enabled Web Security Service Prox y Proxy All Endpoints • Terminate and decrypt traffic • Emulate all device types • Extract content for inspection • Integrate authentication Control Web & Cloud Governance • Discover shadow IT risk • Block web-borne threats • Enforce access policy & audit usage of web & cloud W W W . W E B S I T E . C O M Prevent Threats & Orchestrate Content• Pre-filter sandbox with advanced content inspection • Send content to DLP, sandbox, analytics, etc.. • Open integration architecture to quickly add new services.JAR .EXE Sandbox Malware to Identify Advanced Threats• Multi-factor file analysis • Real time operation – prevent file delivery until sandbox analysis complete Web PRODUCTS
  • 16. 16Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Web Security Service with Malware Analysis Service Add-On Web Security Service (WSS) • ProxySG Secure Web Gateway • Dual Anti-Virus Scanning • Global Intelligence Network • URL Filtering and Categorization • Comprehensive Reporting • SSL Interception/Policy-Based Decryption • CASB Audit Integration Malware Analysis Service (MAS) • Static Code Analysis • YARA Rules Analysis • Behavioral Analysis • Emulation of Windows Processes • Inline, Real-Time Blocking • File and URL Reputation MAS prevents first-client infection from unknown malware PRODUCTS
  • 17. 17Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Malware Analysis Service: Standard vs Advanced Key Capabilities Standard Advanced Static Code Analysis ✔ ✔ YARA Rule Analysis ✔ ✔ Behavioral Analysis ✔ ✔ Emulation of Windows Platform ✔ ✔ Inline, Real-time Blocking ✔ ✔ File and URL Reputation ✔ ✔ Windows Emulation ✔ ✔ Full Windows OS Detonation ✗ ✔ EXE and DLL Support ✔ ✔ Office Documents and PDF Support ✗ ✔ +JAVA, MSI, RTF, ZIP Full Detonation Report ✗ ✔
  • 18. 18Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Email Web Access Cloud Apps User Security Information Protection Advanced Threat Protection Protect Across Web, Mail and Cloud App Vectors PRODUCTS
  • 20. 20Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. IN TRANSIT AT REST IN USE ZZ Cloud Data Flow “귏企専吁企倁ᐋ가귉” “企専吁企倁ᐋ” “가귉귏企専吁企倁” “ᐋ귏企専吁企倁가귉” TOKEN “귏企専吁企倁ᐋ가귉” “企専吁企倁ᐋ” “가귉귏企専吁企倁” “ᐋ귏企専吁企倁가귉” TOKEN “귏企専吁企倁ᐋ가귉” “企専吁企倁ᐋ” “가귉귏企専吁企倁” “ᐋ귏企専吁企倁가귉” TOKEN “귏企専吁企倁ᐋ가귉” “企専吁企倁ᐋ” “가귉귏企専吁企倁” “ᐋ귏企専吁企倁가귉” TOKEN PRODUCTS
  • 21. 21Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Symantec CDP Data Protection Process Symantec Cloud Data Protection Gateway Cloud Data Protection Token Map Repository User Cloud App Cloud Application Example: enterprise defined a policy to protect FIRST NAME And LAST NAME Fields In ServiceNow Without impacting the cloud apps’ functionality (e.g. search, sort e-mail)
  • 22. 22Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Cloud Data Protection Steps Data Governance Determines Info Sensitivity Classification Cross-Cloud Data Protection Policies Defined CDP Enforces Policies in Real-Time Without impacting the cloud application’s functionality (e.g. search, sort e-mail) Mobile Users Remote Workers Enterprise SaaS SaaS SaaSPaaS PRODUCTS
  • 23. 23Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Cloud Data ProtectionInfo Stored & Processed in the Cloud Unauthorized users see only tokenized replacement values Unauthorized Users Direct Connection to ServiceNow Authorized users see all sensitive data in the clear Makes the move to the cloud possible for all sorts of regulated use cases PRODUCTS
  • 24. VIP and VIP Access Manager PRODUCTS
  • 25. 25Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Symantec Identity Access Management • Two-Factor Authenticatio n (2FA) • Single Sign On (SSO) • For Enterprises, Consumers, & Cloud Apps VIP and VIP Access Manager Network (Enterprise Gateway) Cloud Applications (Access Manager) Consumer (CDK/API) PRODUCTS
  • 26. 26Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Every Organization Needs Strong Authentication 63% of Confirmed Data Breaches Involve Leveraging Weak, Default or Stolen Passwords 1. Something you KNOW 2. Something you HAVE3. Something you ARE PRODUCTS
  • 27. 27Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Identity & Access Control Secure Access for the Entire User Base Identity & Access Control SS O Access Manager Internal Users (Employees) External Users (Partners/Contractors) Corporate Network Cloud Apps PKI Customers Remote Workers PRODUCTS
  • 28. 28Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. VIP Deployment and Integration Cloud-based and zero capital investment (Bring-Your-Own-Credential) Easy Deployment All-in-one pricing, many credential modalities, and even for consumers Tap your finger to authenticate: password-less authentication Multi-platform Support Designed to Integrate With the security and trust you expect from Symantec API CDK FIDO OATH PUSH B2C B2E Radius SAML PRODUCTS
  • 29. Data Loss Prevention Next Week PRODUCTS

Editor's Notes

  1. I’m Eric Andrews . . . . And on stage with me is Leeron . . .. (over 1 year)
  2. Organizations are seeing a greater amount of content migrating to cloud apps and services And this content is being access be a variety of devices, laptops, mobile, etc.. This communication is often direct-to-net, not hairpinning back to HQ through the traditional security stack, creating a blind spot. Even when you’ve adopted a sanctioned app, it is hard to track how your users are using this app and what type of content they are sharing. We call this problem Shadow Data Finally, with thousands of credentials floating around in your organization, an increasing concern is how a compromise of any one of these accounts may lead to a costly data breach.
  3. Describe solution Describe differentiation, best in class, data science, UI
  4. We provide a range of solutions to address these challenges, including visibility of Shadow IT, Granular controls, and monitoring of user accounts to prevent compromised credentials. All of these solutions come bundled in an elegant platform, often referred to as the best UI in the industry, even by our competitors. ==== Most important point is not that Skyhigh said this, but that it is coming directly from customers. We here, but they are hearing it too. Note Skyhigh had nasty things to say too. Not just pretty looking, but functional. Well thought out. Designed to accommodate workflows that real users want. Netskope has lots of information, but clunky UI, no workflows, not thought through. Skyhigh challenging to navigate. Video
  5. Block web threats & ATP C/C Feed documents to sandbox Enforce security policy
  6. Block web threats & ATP C/C Feed documents to sandbox Enforce security policy
  7. Blue Coat has a fully meshed and redundant infrastructure spanning 6 continents with over 40 data centers. With many years and strong investment, Blue Coat offers Core sites shown here with an asterisk. These sites have 10GB throughput capacity already in place and infrastructure in place to allow 4x expansion. All Blue Coat data centers are accessible by all Blue Coat Cloud customers – we don’t advertise (or have) any data centers that are not available to all customers unlike other vendors Another critical requirement for a enterprise grade service and supporting infrastructure are the ISO 27001 and SSAE16 certifications, which Blue Coat holds for all of its data centers, infrastructure, controls and processes. We also require that all of our tier 1 hosting partners carry the same certifications. Other vendors will advertise global presence and data centers, but these can typically be racks sitting in an SE’s basement. Blue Coat stands behind its secure and scalable global infrastructure If you get a question around data privacy. Arch: store data within region. separation. Config: dc primary/ backup Access control: ssae16/ iso27001
  8. Architecture for Content Inspection, Tool Integration & Policy Control
  9. 20
  10. This slide gives a quick overview of the process. Assume this is an HR app where First Name and Last Name fields have been designated to be tokenized via the policies the enterprise has defined. When a user enters a record for Brian Shaw, the record transaction gets intercepted by the CDP gateway and a replacement token is generated for both fields The replacement values are: What gets sent to the cloud application for storage and processing Stored locally in a CDP database to be used to bring information back into the clear when authorized users access the ServiceNow instance via the gateway End users can still use the data as if it was actually stored in the cloud. For example, they can search and sort on data that has been encrypted or tokenized.
  11. There are three high-level steps an enterprise takes when using CDP The 1st step is determining what data elements need the additional protection. For example, a healthcare provider may choose to encrypt the handful of fields in their customer service cloud application that are governed by HIPAA. Once the data protection requirements are defines, a security analyst uses the applications admin console to write the policies that need to be enforced. It’s a point and click exercise, tokenize this field, encrypt al attachments, etc.. From there the policies are deployed into a run-time environment in the CDP gateway server, where the data protection polices ae enforced real-time. One final point – the end users of the cloud application maintain application functionality. For instance, they can perform searches and send e-mails on data that has been tokenized.
  12. Here is an interesting way to illustrate the concept. Imagine that data has been put up in your Servicenow instance and you have some policies in place with CDP that protects various fields and attachments. If any unauthorized users got a look at that data directly in the cloud, all they would see is meaningless replacement values But now look at that same screen when viewed by authorized users accessing the cloud org via the Symantec Cloud Data Protection gateway. They see everything in the clear and have full usability of the cloud app. This critical capability opens up a whole host of new powerful cloud application use cases for the enterprise, since it ensures that regulated data uniquely remains in the hands of the enterprise at all times (at-rest and in-use in the cloud). And the enterprise maintains full physical control over encryption keys and token vaults. Note: Cloud provider-based solutions have two critical flaws: (1) they only encrypt data while at-rest. It is fully exposed during processing in the cloud app (2) the encryption/decryption occurs in the cloud app…so the keys, at some point, need to be in the app providers infrastructure.
  13. Traditionally, 2FA addresses something know, have and are.. With VIP and added features, you can eliminate the dependency on something you know (UN/PW), and simple rely on something you have (phone) and something you are (fingerprint)
  14. The foundation of authentication platform is the access control – to make sure only the right person can access your network. And it creates a central control point to manage your users, set up your policies, and monitor your apps. Symantec VIP Access Manager is an Enterprise Grade cloud security access control platform, which leverages existing user directories and allows internal/external users to single sign-on to preconfigured web applications based on policy settings On the one-hand, it helps reduce IT burden since IT can use single console to monitor and control all the access points. On the other hand, it helps improve user experience – with just one password, you can access all your applications.
  15. End with why VIP is the clear choice? Use this slide as more than just 3 reason to use VIP, but help quantify the reason Refer to the appendix and slide on “IS RSA WORTH THE COST?” where we quantify a 33% savings using VIP which ties back to EASY TO DEPLOY Mobile APP is not only free but easy and convenient for user which ties back to EASY TO USE. You may be able to quantify ease of use be reducing PW reset which about $70/call or cost of hardware Integration to a variety of use cases so investment in VIP can give you return with integration with consumer app (CDK), cloud apps (SSO) and network VPN (Radius), so rather than having separate solutions and vendors for each of the use cases, you have one to deliver all these! --------------------------------------- Easy to deploy with zero backend infrastructure or hardware cost (given solution is cloud based and credentials options can be mobile which is free) Easy to use whereby users can simple leverage their mobile device as a credential and simple use your fingerprint or accepting a push notification for authentication Easy to integrate where your investment can extend to different use cases such as SSO, VPN, B2C applications, etc. ------ Provide strong authentication and easy access for employees, partners and customers to corporate networks and applications from any device or location while complying with regulations, reducing risks to corporate assets, and keeping infrastructure costs low. Get the latest software without updates and upgrades – always relevant to protect you against attacks and provide the latest and greatest.