SlideShare a Scribd company logo
1Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Sample three prong diagram
• AWS division jumped 47% to $3.5B
• $926M Operating Income
• 71% Amazon’s $1.3B Operating
Income
• Symantec Cited as The Clear
Leader for Cloud Secure Gateways
• Top 7 AWS Security Issues
• Security and Compliance for Your
AWS Environment
.
• Server products and Cloud
Services revenue grew $577M or
12%
• Azure's revenue surged 93%
SUPPORTING ITEM
• Symantec Secures Office365
• Optimizing O365 with Symantec
PacketShaper
2Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Inaugural Edition
FullDayFaeder on Fridays
My cyber community has been asking for me to put something together to help sort through the “fake news”
and noise these thousands of small start-ups or even niche best of breed so called players that simply don’t
improve their security posture.
Respected cybersecurity leaders value my transparent insight and therefore I have acquiesced to their
demands.
3Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
I thought it pertinent to touch on the hot off the pres
s financial figures of the worlds 3 most impactful cloud
companies in my humble opinion.
Symantec, Amazon Web Services, and Microsoft Azure all
had outstanding quarters. It is becoming evident winners
have been chosen. Now only one of these companies is
focused solely on security.
AWS division jumped 47% to $3.5B Azure's revenue surged 93%
4Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
This week Symantec provided FullDayFaeder exclusive access to our World
Wide Solutions Architect, Mohammad Kaouk, who is a genuine genius and
dedicated to cloud security.
I personally witnessed some RSA sneak peaks as well current general
availability SKUs of the new:
Integrated Cyber Defense Platform
*Web Security Services, *Symantec CloudSOC, *Symantec DLP, *On-Premise
to Cloud DLP, *Malware Analysis Advanced Service (Full Detonation Cloud
Sandboxing), *SSL/TLS interception, managed centrally via *Hosted Reporter
10 and *Management Center (riding on a common operating environment), and
lastly all backed by *VIP multi-factor authentication. (WOW)
5Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
The great news is Symantec has partnered with Amazon Web Services to provide our customers access to
easily spin up a controlled virtual environment to play with the solutions for 2 weeks. Super easy to get going
with our Symantec Security Services Platform.
Giving this transformation to the cloud and the need for seamless multi-factor authentication for this Inaugural
edition I chose to cover our CASB/WSS/VIP story to protect users and data everywhere. Just ping me for a
free trial...
6Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
According to the Forrester report, “Blue
Coat/Symantec integrates CSG with its on-
premises secure web gateway.
The solution supports both proxy-based
and API monitoring of cloud platforms
(both AWS and Azure) and cloud
applications.
It has strong capabilities for Salesforce
and other structured data protection,
including search, sort, and filtering
operations, and offers a wide selection of
encryption and decryption policy options.
The solution’s built-in cloud application
catalog, support for Office 365, and
mobile-device-based encryption lag.”
Cloud Access Security Broker
(CASB)
PRODUCTS
8Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
New Challenges
26% of Cloud
Docs are
Broadly
Shared1
1 1H 2016 Shadow Data Report
Proliferation of Cloud Apps
Variety of Endpoints
Shadow Data Problem
Compromised Accounts
Risk Assessment
Intrusion Detection
Proxy/Firewall
DLP
Incident Response
Investigations
Malware Detection
9Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Proxy
Cloud Proxy
Events
Outside
Perimeter
Risk Assessment
Intrusion Detection
Proxy/Firewall
Incident Response
Investigations
DLP
Malware Detection
Enterprise
Perimeter
Cloud API
StreamIQ™
ContentIQ™
ThreatScore™
LIST (WEB)
10Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Management
Center
Agen
t
Single Pane of Glass
for Cloud Security
Visibility of
Shadow IT
Protection Against
Malicious Attacks
Granular Control of
Sensitive Data
10
PRODUCTS
Cloud Secure Web Gateway
PRODUCTS
12Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Shadow Cloud
IT
Consumer
Internet
Proxy
“We supply employees with mobile
devices. We need to govern their use
and protect information and users
when they are out in the world.”
Remote Sites, Mobile Devices and Users
How to Protect
PRODUCTS
13Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Symantec Web Security Service
Consumer
Internet
Shadow Cloud
IT
Proxy
Extend Web & Cloud
Governance to Mobile
Take Remote Sites Safely
“Direct to Net”
PRODUCTS
14Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
PRODUCTS
Dubai
https://www.bluecoat.com/cloud-data-center-locations/
AMERICAS
Ashburn, VA *
Santa Clara, CA
Chicago, IL *
Miami, FL
Seattle, WA *
Toronto, Ontario, Canada
Dallas, TX
Denver, CO
Buenos Aires, Argentina
Mexico City, Mexico
Sao Paulo, Brazil
New York, NY
Montreal, Quebec, Canada
EMEA
London, UK (2x) *
Frankfurt, Germany *
Paris, France*
Zurich, Switzerland
Stockholm, Sweden
Madrid, Spain
Helsinki, Finland
Milan, Italy
Johannesburg, South Africa
Oslo, Norway
Tel Aviv, Israel
Dubai, UAE
APAC
Sydney, Australia
Auckland, New Zealand
Republic of Singapore*
Tokyo, Japan
Shanghai, China
Hong Kong, China
Taipei, Taiwan
Seoul, Korea
Mumbai, India
Chennai, India
* Core site
Blue Coat Global Data Center Footprint
SSAE16ISO 27001
• Coverage across 6 continents
• Hosted at Top Tier infrastructure providers
• Redundant within and between locations
• Connect to any/closest Data Center
• Fully meshed /redundant network
• 40 Data Centers
15Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Secure Web Access in the Cloud
Proxy Enabled Web Security Service
Prox
y
Proxy All Endpoints
• Terminate and decrypt traffic
• Emulate all device types
• Extract content for inspection
• Integrate authentication
Control Web & Cloud Governance
• Discover shadow IT risk
• Block web-borne threats
• Enforce access policy & audit
usage
of web & cloud
W W W . W E B S I T E . C O M
Prevent Threats & Orchestrate
Content• Pre-filter sandbox with advanced content
inspection
• Send content to DLP, sandbox, analytics,
etc..
• Open integration architecture to quickly
add new services.JAR .EXE
Sandbox Malware to
Identify Advanced
Threats• Multi-factor file analysis
• Real time operation – prevent file
delivery until sandbox analysis
complete
Web
PRODUCTS
16Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Web Security Service with Malware Analysis
Service Add-On
Web Security Service (WSS)
• ProxySG Secure Web Gateway
• Dual Anti-Virus Scanning
• Global Intelligence Network
• URL Filtering and Categorization
• Comprehensive Reporting
• SSL Interception/Policy-Based Decryption
• CASB Audit Integration
Malware Analysis Service (MAS)
• Static Code Analysis
• YARA Rules Analysis
• Behavioral Analysis
• Emulation of Windows Processes
• Inline, Real-Time Blocking
• File and URL Reputation
MAS prevents first-client infection from unknown malware
PRODUCTS
17Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Malware Analysis Service: Standard vs
Advanced
Key Capabilities Standard Advanced
Static Code Analysis ✔ ✔
YARA Rule Analysis ✔ ✔
Behavioral Analysis ✔ ✔
Emulation of Windows Platform ✔ ✔
Inline, Real-time Blocking ✔ ✔
File and URL Reputation ✔ ✔
Windows Emulation ✔ ✔
Full Windows OS Detonation ✗ ✔
EXE and DLL Support ✔ ✔
Office Documents and PDF Support ✗ ✔
+JAVA, MSI, RTF, ZIP
Full Detonation Report ✗ ✔
18Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Email
Web
Access
Cloud
Apps
User Security
Information
Protection
Advanced
Threat Protection
Protect Across Web, Mail and Cloud App Vectors
PRODUCTS
Cloud Data Protection
PRODUCTS
20Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
IN TRANSIT AT REST IN USE
ZZ
Cloud Data Flow
“귏企専吁企倁ᐋ가귉”
“企専吁企倁ᐋ”
“가귉귏企専吁企倁”
“ᐋ귏企専吁企倁가귉”
TOKEN
“귏企専吁企倁ᐋ가귉”
“企専吁企倁ᐋ”
“가귉귏企専吁企倁”
“ᐋ귏企専吁企倁가귉”
TOKEN
“귏企専吁企倁ᐋ가귉”
“企専吁企倁ᐋ”
“가귉귏企専吁企倁”
“ᐋ귏企専吁企倁가귉”
TOKEN
“귏企専吁企倁ᐋ가귉”
“企専吁企倁ᐋ”
“가귉귏企専吁企倁”
“ᐋ귏企専吁企倁가귉”
TOKEN
PRODUCTS
21Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Symantec CDP Data Protection Process
Symantec
Cloud Data Protection
Gateway
Cloud Data Protection
Token Map Repository
User Cloud App
Cloud
Application
Example: enterprise defined a
policy to protect FIRST
NAME And LAST NAME Fields
In ServiceNow
Without impacting the cloud apps’
functionality (e.g. search, sort e-mail)
22Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Cloud Data Protection Steps
Data Governance
Determines Info
Sensitivity
Classification
Cross-Cloud
Data Protection
Policies Defined
CDP Enforces
Policies
in Real-Time
Without impacting the cloud application’s functionality (e.g. search, sort e-mail)
Mobile
Users
Remote
Workers
Enterprise
SaaS SaaS
SaaSPaaS
PRODUCTS
23Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Cloud Data ProtectionInfo Stored & Processed in the Cloud
Unauthorized users
see only tokenized
replacement values
Unauthorized
Users
Direct Connection
to ServiceNow
Authorized users see
all sensitive data
in the clear
Makes the move to the
cloud possible for all sorts
of regulated use cases
PRODUCTS
VIP and VIP Access Manager
PRODUCTS
25Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Symantec Identity Access Management
• Two-Factor
Authenticatio
n (2FA)
• Single Sign
On (SSO)
• For
Enterprises,
Consumers,
& Cloud Apps
VIP and VIP Access Manager
Network
(Enterprise Gateway)
Cloud Applications
(Access Manager)
Consumer
(CDK/API)
PRODUCTS
26Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Every Organization Needs Strong Authentication
63% of Confirmed Data Breaches Involve Leveraging Weak, Default or Stolen
Passwords
1. Something
you KNOW
2. Something
you HAVE3. Something
you ARE
PRODUCTS
27Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Identity & Access Control
Secure Access for the Entire User Base
Identity &
Access Control
SS
O
Access Manager
Internal Users
(Employees)
External Users
(Partners/Contractors)
Corporate Network Cloud Apps
PKI
Customers
Remote
Workers
PRODUCTS
28Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
VIP Deployment and Integration
Cloud-based and zero capital investment
(Bring-Your-Own-Credential)
Easy Deployment
All-in-one pricing, many credential
modalities, and even for consumers
Tap your finger to authenticate:
password-less authentication
Multi-platform Support Designed to Integrate
With the security and trust you expect from Symantec
API
CDK
FIDO
OATH
PUSH
B2C
B2E
Radius
SAML
PRODUCTS
Data Loss Prevention Next Week
PRODUCTS

More Related Content

What's hot

A Tale of Security & Ops Teamwork for Rapid Security Incident Resolution
A Tale of Security & Ops Teamwork for Rapid Security Incident ResolutionA Tale of Security & Ops Teamwork for Rapid Security Incident Resolution
A Tale of Security & Ops Teamwork for Rapid Security Incident Resolution
Amazon Web Services
 
Barracuda in Microsoft Azure
Barracuda in Microsoft AzureBarracuda in Microsoft Azure
Barracuda in Microsoft Azure
responsiveX
 
AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016
Gaurav "GP" Pal
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
Cloudflare
 
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...
Plain Concepts
 
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
Amazon Web Services
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teams
Cloudflare
 
Dissecting ssl threats
Dissecting ssl threatsDissecting ssl threats
Dissecting ssl threats
Zscaler
 
Protección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
Protección y acceso a tu información y aplicaciones en Azure y O365 – BarracudaProtección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
Protección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
Plain Concepts
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
Cloudflare
 
Unified Protection for Multi-Cloud Infrastructure
Unified Protection for Multi-Cloud InfrastructureUnified Protection for Multi-Cloud Infrastructure
Unified Protection for Multi-Cloud Infrastructure
MarketingArrowECS_CZ
 
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeCloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Himani Singh
 
Introducing Azure Bastion
Introducing Azure BastionIntroducing Azure Bastion
Introducing Azure Bastion
Ammar Hasayen
 
Cisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of AttackCisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Canada
 
Advanced Techniques for Securing Web Applications
Advanced Techniques for Securing Web ApplicationsAdvanced Techniques for Securing Web Applications
Advanced Techniques for Securing Web Applications
Amazon Web Services
 
Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...
Cloudflare
 
Cloud Seeding
Cloud SeedingCloud Seeding
Cloud Seeding
Trish McGinity, CCSK
 
Launching a Highly-regulated Startup in the Public Cloud
Launching a Highly-regulated Startup in the Public CloudLaunching a Highly-regulated Startup in the Public Cloud
Launching a Highly-regulated Startup in the Public Cloud
Poornaprajna Udupi
 
Practical AWS Security - Scott Hogg
Practical AWS Security - Scott HoggPractical AWS Security - Scott Hogg
Practical AWS Security - Scott Hogg
Trish McGinity, CCSK
 
Esg lab-validation-check-point-cloud guard-mar-2018
Esg lab-validation-check-point-cloud guard-mar-2018Esg lab-validation-check-point-cloud guard-mar-2018
Esg lab-validation-check-point-cloud guard-mar-2018
Alejandro Daricz
 

What's hot (20)

A Tale of Security & Ops Teamwork for Rapid Security Incident Resolution
A Tale of Security & Ops Teamwork for Rapid Security Incident ResolutionA Tale of Security & Ops Teamwork for Rapid Security Incident Resolution
A Tale of Security & Ops Teamwork for Rapid Security Incident Resolution
 
Barracuda in Microsoft Azure
Barracuda in Microsoft AzureBarracuda in Microsoft Azure
Barracuda in Microsoft Azure
 
AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
 
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...
 
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teams
 
Dissecting ssl threats
Dissecting ssl threatsDissecting ssl threats
Dissecting ssl threats
 
Protección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
Protección y acceso a tu información y aplicaciones en Azure y O365 – BarracudaProtección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
Protección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
Unified Protection for Multi-Cloud Infrastructure
Unified Protection for Multi-Cloud InfrastructureUnified Protection for Multi-Cloud Infrastructure
Unified Protection for Multi-Cloud Infrastructure
 
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeCloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
 
Introducing Azure Bastion
Introducing Azure BastionIntroducing Azure Bastion
Introducing Azure Bastion
 
Cisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of AttackCisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of Attack
 
Advanced Techniques for Securing Web Applications
Advanced Techniques for Securing Web ApplicationsAdvanced Techniques for Securing Web Applications
Advanced Techniques for Securing Web Applications
 
Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...
 
Cloud Seeding
Cloud SeedingCloud Seeding
Cloud Seeding
 
Launching a Highly-regulated Startup in the Public Cloud
Launching a Highly-regulated Startup in the Public CloudLaunching a Highly-regulated Startup in the Public Cloud
Launching a Highly-regulated Startup in the Public Cloud
 
Practical AWS Security - Scott Hogg
Practical AWS Security - Scott HoggPractical AWS Security - Scott Hogg
Practical AWS Security - Scott Hogg
 
Esg lab-validation-check-point-cloud guard-mar-2018
Esg lab-validation-check-point-cloud guard-mar-2018Esg lab-validation-check-point-cloud guard-mar-2018
Esg lab-validation-check-point-cloud guard-mar-2018
 

Viewers also liked

FullDay Faeder on Friday
FullDay Faeder on Friday FullDay Faeder on Friday
FullDay Faeder on Friday
Adam Faeder
 
Casa desmontable 6x6
Casa desmontable 6x6Casa desmontable 6x6
Casa desmontable 6x6
Hana Rojas
 
Resume 2016
Resume 2016Resume 2016
Resume 2016
Michael Madison
 
不要講話
不要講話不要講話
不要講話
Adam Chih
 
Mexico trends mx 042116 (003)
Mexico trends mx 042116 (003)Mexico trends mx 042116 (003)
Mexico trends mx 042116 (003)
Jose G Rivera, MBA, CISSP, CTGA,
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
Hana Rojas
 
Construcción en Madera y Metal
Construcción en Madera y MetalConstrucción en Madera y Metal
Construcción en Madera y Metal
Hana Rojas
 
Magen CP 1
Magen CP 1Magen CP 1
Magen CP 1
Magen Security
 
Experiencia con Office 365
Experiencia con Office 365Experiencia con Office 365
Experiencia con Office 365
Hana Rojas
 
Proyecto de-vida-cris-ubv
Proyecto de-vida-cris-ubvProyecto de-vida-cris-ubv
Proyecto de-vida-cris-ubv
CRISTIAN GUANOLUISA
 
INSCRIPCIONES I-2017
INSCRIPCIONES I-2017 INSCRIPCIONES I-2017
INSCRIPCIONES I-2017
genevngs
 
Académie d'Eté : Filles et fils d'entrepreneurs familiaux à la croisée des ch...
Académie d'Eté : Filles et fils d'entrepreneurs familiaux à la croisée des ch...Académie d'Eté : Filles et fils d'entrepreneurs familiaux à la croisée des ch...
Académie d'Eté : Filles et fils d'entrepreneurs familiaux à la croisée des ch...
Laura Giallombardo
 
Manuel ingles
Manuel inglesManuel ingles
Manuel ingles
Manuel Chivico
 

Viewers also liked (13)

FullDay Faeder on Friday
FullDay Faeder on Friday FullDay Faeder on Friday
FullDay Faeder on Friday
 
Casa desmontable 6x6
Casa desmontable 6x6Casa desmontable 6x6
Casa desmontable 6x6
 
Resume 2016
Resume 2016Resume 2016
Resume 2016
 
不要講話
不要講話不要講話
不要講話
 
Mexico trends mx 042116 (003)
Mexico trends mx 042116 (003)Mexico trends mx 042116 (003)
Mexico trends mx 042116 (003)
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 
Construcción en Madera y Metal
Construcción en Madera y MetalConstrucción en Madera y Metal
Construcción en Madera y Metal
 
Magen CP 1
Magen CP 1Magen CP 1
Magen CP 1
 
Experiencia con Office 365
Experiencia con Office 365Experiencia con Office 365
Experiencia con Office 365
 
Proyecto de-vida-cris-ubv
Proyecto de-vida-cris-ubvProyecto de-vida-cris-ubv
Proyecto de-vida-cris-ubv
 
INSCRIPCIONES I-2017
INSCRIPCIONES I-2017 INSCRIPCIONES I-2017
INSCRIPCIONES I-2017
 
Académie d'Eté : Filles et fils d'entrepreneurs familiaux à la croisée des ch...
Académie d'Eté : Filles et fils d'entrepreneurs familiaux à la croisée des ch...Académie d'Eté : Filles et fils d'entrepreneurs familiaux à la croisée des ch...
Académie d'Eté : Filles et fils d'entrepreneurs familiaux à la croisée des ch...
 
Manuel ingles
Manuel inglesManuel ingles
Manuel ingles
 

Similar to FullDay on Fridays Feb. 3, 2017

Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Cristian Garcia G.
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Keith Kraus
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copper
scoopnewsgroup
 
A Cloud Security Ghost Story Craig Balding
A Cloud Security Ghost Story   Craig BaldingA Cloud Security Ghost Story   Craig Balding
A Cloud Security Ghost Story Craig Balding
craigbalding
 
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Vince Garr
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
Kai Wähner
 
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
Cloudflare_Everywhere_Security_Solution_Brief (1).pdfCloudflare_Everywhere_Security_Solution_Brief (1).pdf
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
petchphumsanit40
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
Zscaler
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
Amazon Web Services Korea
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?
Zscaler
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
Leonardo Antichi
 
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Connect Halifax 2018   Anatomy of attackCisco Connect Halifax 2018   Anatomy of attack
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Canada
 
Maximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerMaximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and Zscaler
Zscaler
 
Maximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerMaximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and Zscaler
Ankit Dua
 
Presd1 10
Presd1 10Presd1 10
Presd1 10
Niels Groeneveld
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid Clouds
RightScale
 
Security TechTalk | AWS Public Sector Summit 2016
Security TechTalk | AWS Public Sector Summit 2016Security TechTalk | AWS Public Sector Summit 2016
Security TechTalk | AWS Public Sector Summit 2016
Amazon Web Services
 
01-Chapter 01-Introduction to CASB and Netskope.pptx
01-Chapter 01-Introduction to CASB and Netskope.pptx01-Chapter 01-Introduction to CASB and Netskope.pptx
01-Chapter 01-Introduction to CASB and Netskope.pptx
ssuser4c54af
 
Best practices for privileged access & secrets management in the cloud - DEM0...
Best practices for privileged access & secrets management in the cloud - DEM0...Best practices for privileged access & secrets management in the cloud - DEM0...
Best practices for privileged access & secrets management in the cloud - DEM0...
Amazon Web Services
 

Similar to FullDay on Fridays Feb. 3, 2017 (20)

Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copper
 
A Cloud Security Ghost Story Craig Balding
A Cloud Security Ghost Story   Craig BaldingA Cloud Security Ghost Story   Craig Balding
A Cloud Security Ghost Story Craig Balding
 
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
 
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
Cloudflare_Everywhere_Security_Solution_Brief (1).pdfCloudflare_Everywhere_Security_Solution_Brief (1).pdf
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Connect Halifax 2018   Anatomy of attackCisco Connect Halifax 2018   Anatomy of attack
Cisco Connect Halifax 2018 Anatomy of attack
 
Maximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerMaximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and Zscaler
 
Maximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerMaximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and Zscaler
 
Presd1 10
Presd1 10Presd1 10
Presd1 10
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid Clouds
 
Security TechTalk | AWS Public Sector Summit 2016
Security TechTalk | AWS Public Sector Summit 2016Security TechTalk | AWS Public Sector Summit 2016
Security TechTalk | AWS Public Sector Summit 2016
 
01-Chapter 01-Introduction to CASB and Netskope.pptx
01-Chapter 01-Introduction to CASB and Netskope.pptx01-Chapter 01-Introduction to CASB and Netskope.pptx
01-Chapter 01-Introduction to CASB and Netskope.pptx
 
Best practices for privileged access & secrets management in the cloud - DEM0...
Best practices for privileged access & secrets management in the cloud - DEM0...Best practices for privileged access & secrets management in the cloud - DEM0...
Best practices for privileged access & secrets management in the cloud - DEM0...
 

Recently uploaded

Transform Your Presence Now!..............
Transform Your Presence Now!..............Transform Your Presence Now!..............
Transform Your Presence Now!..............
SocioCosmos
 
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
Febless Hernane
 
Surat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculumSurat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculum
digitalcourseshop4
 
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa CreditoHOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
ClarissaAlanoCredito
 
HMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docxHMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docx
Charles Bayless
 
Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......
SocioCosmos
 
Project Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docxProject Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docx
zeqirielmedina8
 
HOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa CreditoHOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa Credito
ClarissaAlanoCredito
 
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
ryxqoswi
 
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyThe Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
Digital Marketing Lab
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAMLORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
lorraineandreiamcidl
 
Lifecycle of a GME Trader: From Newbie to Diamond Hands
Lifecycle of a GME Trader: From Newbie to Diamond HandsLifecycle of a GME Trader: From Newbie to Diamond Hands
Lifecycle of a GME Trader: From Newbie to Diamond Hands
mediavestfzllc
 
EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANE
Febless Hernane
 
Dominate Reddit Discussions.............
Dominate Reddit Discussions.............Dominate Reddit Discussions.............
Dominate Reddit Discussions.............
SocioCosmos
 

Recently uploaded (14)

Transform Your Presence Now!..............
Transform Your Presence Now!..............Transform Your Presence Now!..............
Transform Your Presence Now!..............
 
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
 
Surat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculumSurat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculum
 
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa CreditoHOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
 
HMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docxHMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docx
 
Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......
 
Project Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docxProject Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docx
 
HOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa CreditoHOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa Credito
 
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
 
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyThe Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAMLORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
 
Lifecycle of a GME Trader: From Newbie to Diamond Hands
Lifecycle of a GME Trader: From Newbie to Diamond HandsLifecycle of a GME Trader: From Newbie to Diamond Hands
Lifecycle of a GME Trader: From Newbie to Diamond Hands
 
EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANE
 
Dominate Reddit Discussions.............
Dominate Reddit Discussions.............Dominate Reddit Discussions.............
Dominate Reddit Discussions.............
 

FullDay on Fridays Feb. 3, 2017

  • 1. 1Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Sample three prong diagram • AWS division jumped 47% to $3.5B • $926M Operating Income • 71% Amazon’s $1.3B Operating Income • Symantec Cited as The Clear Leader for Cloud Secure Gateways • Top 7 AWS Security Issues • Security and Compliance for Your AWS Environment . • Server products and Cloud Services revenue grew $577M or 12% • Azure's revenue surged 93% SUPPORTING ITEM • Symantec Secures Office365 • Optimizing O365 with Symantec PacketShaper
  • 2. 2Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Inaugural Edition FullDayFaeder on Fridays My cyber community has been asking for me to put something together to help sort through the “fake news” and noise these thousands of small start-ups or even niche best of breed so called players that simply don’t improve their security posture. Respected cybersecurity leaders value my transparent insight and therefore I have acquiesced to their demands.
  • 3. 3Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. I thought it pertinent to touch on the hot off the pres s financial figures of the worlds 3 most impactful cloud companies in my humble opinion. Symantec, Amazon Web Services, and Microsoft Azure all had outstanding quarters. It is becoming evident winners have been chosen. Now only one of these companies is focused solely on security. AWS division jumped 47% to $3.5B Azure's revenue surged 93%
  • 4. 4Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. This week Symantec provided FullDayFaeder exclusive access to our World Wide Solutions Architect, Mohammad Kaouk, who is a genuine genius and dedicated to cloud security. I personally witnessed some RSA sneak peaks as well current general availability SKUs of the new: Integrated Cyber Defense Platform *Web Security Services, *Symantec CloudSOC, *Symantec DLP, *On-Premise to Cloud DLP, *Malware Analysis Advanced Service (Full Detonation Cloud Sandboxing), *SSL/TLS interception, managed centrally via *Hosted Reporter 10 and *Management Center (riding on a common operating environment), and lastly all backed by *VIP multi-factor authentication. (WOW)
  • 5. 5Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. The great news is Symantec has partnered with Amazon Web Services to provide our customers access to easily spin up a controlled virtual environment to play with the solutions for 2 weeks. Super easy to get going with our Symantec Security Services Platform. Giving this transformation to the cloud and the need for seamless multi-factor authentication for this Inaugural edition I chose to cover our CASB/WSS/VIP story to protect users and data everywhere. Just ping me for a free trial...
  • 6. 6Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. According to the Forrester report, “Blue Coat/Symantec integrates CSG with its on- premises secure web gateway. The solution supports both proxy-based and API monitoring of cloud platforms (both AWS and Azure) and cloud applications. It has strong capabilities for Salesforce and other structured data protection, including search, sort, and filtering operations, and offers a wide selection of encryption and decryption policy options. The solution’s built-in cloud application catalog, support for Office 365, and mobile-device-based encryption lag.”
  • 7. Cloud Access Security Broker (CASB) PRODUCTS
  • 8. 8Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. New Challenges 26% of Cloud Docs are Broadly Shared1 1 1H 2016 Shadow Data Report Proliferation of Cloud Apps Variety of Endpoints Shadow Data Problem Compromised Accounts Risk Assessment Intrusion Detection Proxy/Firewall DLP Incident Response Investigations Malware Detection
  • 9. 9Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Proxy Cloud Proxy Events Outside Perimeter Risk Assessment Intrusion Detection Proxy/Firewall Incident Response Investigations DLP Malware Detection Enterprise Perimeter Cloud API StreamIQ™ ContentIQ™ ThreatScore™ LIST (WEB)
  • 10. 10Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Management Center Agen t Single Pane of Glass for Cloud Security Visibility of Shadow IT Protection Against Malicious Attacks Granular Control of Sensitive Data 10 PRODUCTS
  • 11. Cloud Secure Web Gateway PRODUCTS
  • 12. 12Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Shadow Cloud IT Consumer Internet Proxy “We supply employees with mobile devices. We need to govern their use and protect information and users when they are out in the world.” Remote Sites, Mobile Devices and Users How to Protect PRODUCTS
  • 13. 13Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Symantec Web Security Service Consumer Internet Shadow Cloud IT Proxy Extend Web & Cloud Governance to Mobile Take Remote Sites Safely “Direct to Net” PRODUCTS
  • 14. 14Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. PRODUCTS Dubai https://www.bluecoat.com/cloud-data-center-locations/ AMERICAS Ashburn, VA * Santa Clara, CA Chicago, IL * Miami, FL Seattle, WA * Toronto, Ontario, Canada Dallas, TX Denver, CO Buenos Aires, Argentina Mexico City, Mexico Sao Paulo, Brazil New York, NY Montreal, Quebec, Canada EMEA London, UK (2x) * Frankfurt, Germany * Paris, France* Zurich, Switzerland Stockholm, Sweden Madrid, Spain Helsinki, Finland Milan, Italy Johannesburg, South Africa Oslo, Norway Tel Aviv, Israel Dubai, UAE APAC Sydney, Australia Auckland, New Zealand Republic of Singapore* Tokyo, Japan Shanghai, China Hong Kong, China Taipei, Taiwan Seoul, Korea Mumbai, India Chennai, India * Core site Blue Coat Global Data Center Footprint SSAE16ISO 27001 • Coverage across 6 continents • Hosted at Top Tier infrastructure providers • Redundant within and between locations • Connect to any/closest Data Center • Fully meshed /redundant network • 40 Data Centers
  • 15. 15Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Secure Web Access in the Cloud Proxy Enabled Web Security Service Prox y Proxy All Endpoints • Terminate and decrypt traffic • Emulate all device types • Extract content for inspection • Integrate authentication Control Web & Cloud Governance • Discover shadow IT risk • Block web-borne threats • Enforce access policy & audit usage of web & cloud W W W . W E B S I T E . C O M Prevent Threats & Orchestrate Content• Pre-filter sandbox with advanced content inspection • Send content to DLP, sandbox, analytics, etc.. • Open integration architecture to quickly add new services.JAR .EXE Sandbox Malware to Identify Advanced Threats• Multi-factor file analysis • Real time operation – prevent file delivery until sandbox analysis complete Web PRODUCTS
  • 16. 16Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Web Security Service with Malware Analysis Service Add-On Web Security Service (WSS) • ProxySG Secure Web Gateway • Dual Anti-Virus Scanning • Global Intelligence Network • URL Filtering and Categorization • Comprehensive Reporting • SSL Interception/Policy-Based Decryption • CASB Audit Integration Malware Analysis Service (MAS) • Static Code Analysis • YARA Rules Analysis • Behavioral Analysis • Emulation of Windows Processes • Inline, Real-Time Blocking • File and URL Reputation MAS prevents first-client infection from unknown malware PRODUCTS
  • 17. 17Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Malware Analysis Service: Standard vs Advanced Key Capabilities Standard Advanced Static Code Analysis ✔ ✔ YARA Rule Analysis ✔ ✔ Behavioral Analysis ✔ ✔ Emulation of Windows Platform ✔ ✔ Inline, Real-time Blocking ✔ ✔ File and URL Reputation ✔ ✔ Windows Emulation ✔ ✔ Full Windows OS Detonation ✗ ✔ EXE and DLL Support ✔ ✔ Office Documents and PDF Support ✗ ✔ +JAVA, MSI, RTF, ZIP Full Detonation Report ✗ ✔
  • 18. 18Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Email Web Access Cloud Apps User Security Information Protection Advanced Threat Protection Protect Across Web, Mail and Cloud App Vectors PRODUCTS
  • 20. 20Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. IN TRANSIT AT REST IN USE ZZ Cloud Data Flow “귏企専吁企倁ᐋ가귉” “企専吁企倁ᐋ” “가귉귏企専吁企倁” “ᐋ귏企専吁企倁가귉” TOKEN “귏企専吁企倁ᐋ가귉” “企専吁企倁ᐋ” “가귉귏企専吁企倁” “ᐋ귏企専吁企倁가귉” TOKEN “귏企専吁企倁ᐋ가귉” “企専吁企倁ᐋ” “가귉귏企専吁企倁” “ᐋ귏企専吁企倁가귉” TOKEN “귏企専吁企倁ᐋ가귉” “企専吁企倁ᐋ” “가귉귏企専吁企倁” “ᐋ귏企専吁企倁가귉” TOKEN PRODUCTS
  • 21. 21Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Symantec CDP Data Protection Process Symantec Cloud Data Protection Gateway Cloud Data Protection Token Map Repository User Cloud App Cloud Application Example: enterprise defined a policy to protect FIRST NAME And LAST NAME Fields In ServiceNow Without impacting the cloud apps’ functionality (e.g. search, sort e-mail)
  • 22. 22Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Cloud Data Protection Steps Data Governance Determines Info Sensitivity Classification Cross-Cloud Data Protection Policies Defined CDP Enforces Policies in Real-Time Without impacting the cloud application’s functionality (e.g. search, sort e-mail) Mobile Users Remote Workers Enterprise SaaS SaaS SaaSPaaS PRODUCTS
  • 23. 23Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Cloud Data ProtectionInfo Stored & Processed in the Cloud Unauthorized users see only tokenized replacement values Unauthorized Users Direct Connection to ServiceNow Authorized users see all sensitive data in the clear Makes the move to the cloud possible for all sorts of regulated use cases PRODUCTS
  • 24. VIP and VIP Access Manager PRODUCTS
  • 25. 25Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Symantec Identity Access Management • Two-Factor Authenticatio n (2FA) • Single Sign On (SSO) • For Enterprises, Consumers, & Cloud Apps VIP and VIP Access Manager Network (Enterprise Gateway) Cloud Applications (Access Manager) Consumer (CDK/API) PRODUCTS
  • 26. 26Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Every Organization Needs Strong Authentication 63% of Confirmed Data Breaches Involve Leveraging Weak, Default or Stolen Passwords 1. Something you KNOW 2. Something you HAVE3. Something you ARE PRODUCTS
  • 27. 27Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Identity & Access Control Secure Access for the Entire User Base Identity & Access Control SS O Access Manager Internal Users (Employees) External Users (Partners/Contractors) Corporate Network Cloud Apps PKI Customers Remote Workers PRODUCTS
  • 28. 28Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. VIP Deployment and Integration Cloud-based and zero capital investment (Bring-Your-Own-Credential) Easy Deployment All-in-one pricing, many credential modalities, and even for consumers Tap your finger to authenticate: password-less authentication Multi-platform Support Designed to Integrate With the security and trust you expect from Symantec API CDK FIDO OATH PUSH B2C B2E Radius SAML PRODUCTS
  • 29. Data Loss Prevention Next Week PRODUCTS

Editor's Notes

  1. I’m Eric Andrews . . . . And on stage with me is Leeron . . .. (over 1 year)
  2. Organizations are seeing a greater amount of content migrating to cloud apps and services And this content is being access be a variety of devices, laptops, mobile, etc.. This communication is often direct-to-net, not hairpinning back to HQ through the traditional security stack, creating a blind spot. Even when you’ve adopted a sanctioned app, it is hard to track how your users are using this app and what type of content they are sharing. We call this problem Shadow Data Finally, with thousands of credentials floating around in your organization, an increasing concern is how a compromise of any one of these accounts may lead to a costly data breach.
  3. Describe solution Describe differentiation, best in class, data science, UI
  4. We provide a range of solutions to address these challenges, including visibility of Shadow IT, Granular controls, and monitoring of user accounts to prevent compromised credentials. All of these solutions come bundled in an elegant platform, often referred to as the best UI in the industry, even by our competitors. ==== Most important point is not that Skyhigh said this, but that it is coming directly from customers. We here, but they are hearing it too. Note Skyhigh had nasty things to say too. Not just pretty looking, but functional. Well thought out. Designed to accommodate workflows that real users want. Netskope has lots of information, but clunky UI, no workflows, not thought through. Skyhigh challenging to navigate. Video
  5. Block web threats & ATP C/C Feed documents to sandbox Enforce security policy
  6. Block web threats & ATP C/C Feed documents to sandbox Enforce security policy
  7. Blue Coat has a fully meshed and redundant infrastructure spanning 6 continents with over 40 data centers. With many years and strong investment, Blue Coat offers Core sites shown here with an asterisk. These sites have 10GB throughput capacity already in place and infrastructure in place to allow 4x expansion. All Blue Coat data centers are accessible by all Blue Coat Cloud customers – we don’t advertise (or have) any data centers that are not available to all customers unlike other vendors Another critical requirement for a enterprise grade service and supporting infrastructure are the ISO 27001 and SSAE16 certifications, which Blue Coat holds for all of its data centers, infrastructure, controls and processes. We also require that all of our tier 1 hosting partners carry the same certifications. Other vendors will advertise global presence and data centers, but these can typically be racks sitting in an SE’s basement. Blue Coat stands behind its secure and scalable global infrastructure If you get a question around data privacy. Arch: store data within region. separation. Config: dc primary/ backup Access control: ssae16/ iso27001
  8. Architecture for Content Inspection, Tool Integration & Policy Control
  9. 20
  10. This slide gives a quick overview of the process. Assume this is an HR app where First Name and Last Name fields have been designated to be tokenized via the policies the enterprise has defined. When a user enters a record for Brian Shaw, the record transaction gets intercepted by the CDP gateway and a replacement token is generated for both fields The replacement values are: What gets sent to the cloud application for storage and processing Stored locally in a CDP database to be used to bring information back into the clear when authorized users access the ServiceNow instance via the gateway End users can still use the data as if it was actually stored in the cloud. For example, they can search and sort on data that has been encrypted or tokenized.
  11. There are three high-level steps an enterprise takes when using CDP The 1st step is determining what data elements need the additional protection. For example, a healthcare provider may choose to encrypt the handful of fields in their customer service cloud application that are governed by HIPAA. Once the data protection requirements are defines, a security analyst uses the applications admin console to write the policies that need to be enforced. It’s a point and click exercise, tokenize this field, encrypt al attachments, etc.. From there the policies are deployed into a run-time environment in the CDP gateway server, where the data protection polices ae enforced real-time. One final point – the end users of the cloud application maintain application functionality. For instance, they can perform searches and send e-mails on data that has been tokenized.
  12. Here is an interesting way to illustrate the concept. Imagine that data has been put up in your Servicenow instance and you have some policies in place with CDP that protects various fields and attachments. If any unauthorized users got a look at that data directly in the cloud, all they would see is meaningless replacement values But now look at that same screen when viewed by authorized users accessing the cloud org via the Symantec Cloud Data Protection gateway. They see everything in the clear and have full usability of the cloud app. This critical capability opens up a whole host of new powerful cloud application use cases for the enterprise, since it ensures that regulated data uniquely remains in the hands of the enterprise at all times (at-rest and in-use in the cloud). And the enterprise maintains full physical control over encryption keys and token vaults. Note: Cloud provider-based solutions have two critical flaws: (1) they only encrypt data while at-rest. It is fully exposed during processing in the cloud app (2) the encryption/decryption occurs in the cloud app…so the keys, at some point, need to be in the app providers infrastructure.
  13. Traditionally, 2FA addresses something know, have and are.. With VIP and added features, you can eliminate the dependency on something you know (UN/PW), and simple rely on something you have (phone) and something you are (fingerprint)
  14. The foundation of authentication platform is the access control – to make sure only the right person can access your network. And it creates a central control point to manage your users, set up your policies, and monitor your apps. Symantec VIP Access Manager is an Enterprise Grade cloud security access control platform, which leverages existing user directories and allows internal/external users to single sign-on to preconfigured web applications based on policy settings On the one-hand, it helps reduce IT burden since IT can use single console to monitor and control all the access points. On the other hand, it helps improve user experience – with just one password, you can access all your applications.
  15. End with why VIP is the clear choice? Use this slide as more than just 3 reason to use VIP, but help quantify the reason Refer to the appendix and slide on “IS RSA WORTH THE COST?” where we quantify a 33% savings using VIP which ties back to EASY TO DEPLOY Mobile APP is not only free but easy and convenient for user which ties back to EASY TO USE. You may be able to quantify ease of use be reducing PW reset which about $70/call or cost of hardware Integration to a variety of use cases so investment in VIP can give you return with integration with consumer app (CDK), cloud apps (SSO) and network VPN (Radius), so rather than having separate solutions and vendors for each of the use cases, you have one to deliver all these! --------------------------------------- Easy to deploy with zero backend infrastructure or hardware cost (given solution is cloud based and credentials options can be mobile which is free) Easy to use whereby users can simple leverage their mobile device as a credential and simple use your fingerprint or accepting a push notification for authentication Easy to integrate where your investment can extend to different use cases such as SSO, VPN, B2C applications, etc. ------ Provide strong authentication and easy access for employees, partners and customers to corporate networks and applications from any device or location while complying with regulations, reducing risks to corporate assets, and keeping infrastructure costs low. Get the latest software without updates and upgrades – always relevant to protect you against attacks and provide the latest and greatest.