SlideShare a Scribd company logo
1 of 10
Download to read offline
Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the
U.S. and other countries.
IT Security at the Speed of Business:
Security Provisioning with
Symantec Data Center Security
Today’s data centers are transitioning into software-defined data centers (SDDC). In the SDDC, the core
elements of the infrastructure—storage, server and compute, networking, databases, and business
applications—are virtualized and delivered as services. The deployment, provisioning, configuration,
management and operation of the entire infrastructure is abstracted from hardware and implemented
through software. The infrastructure resources across the stack are application-centric, and customers have
the ability to provision IT assets across their public cloud, private cloud, and on-premise domains. These
SDDC capabilities are intended to enhance an enterprise’s ability to quickly respond to new opportunities and
emerging threats.
Virtualization, cloud, and policy-
based automation and orchestration
technologies are the lynchpins of the
SDDC. The rates at which enterprises
adopt these technologies therefore
function as indicators of the rate of SDDC
migration.
Today, more than half of all server and
storage workloads are virtualized, a
number that is forecasted to reach to 86
percent by 20161
. Cloud computing is just
as popular, with a forecast annual growth
rate of 44 percent over the next five
years2
. Adoption of network virtualization
is also starting to take off, and is
forecasted to grow from $960 million in
2014 to $8 billion in 20183
. The promise
of increased IT and business agility,
lower Capex, and economies of scale in
IT operations underpins the adoption of
SDDC technologies.
20162015 2017 2018 2019 2020
44%
annual
growth rate
86%
20162015
50%
Server and storage
virtualization
Cloud Computing
4 years
Adoption of network
virtualization
$960
million $8 billion
1
CIO|Insight, August 28, 2015
2
SiliconANGLE, January 27, 2014
3
IDC Study, SDN Momentum Builds in Data Center and Enterprise Networks
Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the
U.S. and other countries.
IT Security that Keeps Up with Business and IT Operations
The adoption of software-defined technologies underscores the need for enterprises to re-evaluate their
existing security practices and to ask themselves the following:
•	 “Is security an enabler or a hindrance to business agility?”
•	 “How can security keep up with business and IT?”
•	 “What is the impact of these new technologies on my organization’s current security model?”
•	 “How do I adapt my existing security frameworks and models to account for these developments?”
•	 “How do I take advantage of these technologies to enable security across my existing and new data
center infrastructure environments?”
Enterprises today operate geographically distributed,
heterogeneous, complex, and increasingly fluid data center
infrastructures. These enterprises have not only adopted
virtualization technologies within their data centers, but are
also using a combination of public and private cloud assets
and colocation facilities. These enterprises are also enabling
partners to connect to their networks, and are allowing
their highly mobile employees to connect to their networks
using a myriad of mobile endpoints. With these capabilities,
enterprises are more agile and responsive to opportunities for
creating new revenue streams and for realizing operating
efficiencies. As a result, business owners now expect IT assets
to be quickly provisioned in a matter of hours if not minutes.
Despite these developments, security remains a laggard for many organizations. Many enterprises today
continue to utilize rigid, perimeter-centric security models that are based on physical security frameworks.
Security and provisioning for newly created workloads and applications remains a manual process
for many enterprises, and can take days or even weeks. In contrast, the process for provisioning new
workloads can take minutes or hours in modern virtualized data centers. This lag between IT operations
and security is a disadvantage in today’s fast-changing business environments. When a company wants
Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the
U.S. and other countries.
to launch a new online business or needs to scale up quickly in
response to a spike in demand for its online services, IT operations
and security must be able to deliver these services quickly or
the customer’s customers will go elsewhere. In this scenario,
enterprises have two choices:
•	 Release the new workload into production without the
appropriate security and compliance settings, or
•	 Wait for IT operations, security, business owners, and
compliance to complete their manual assessment and decide
on the appropriate security settings.
The former exposes the organization to potential security breaches and compliance violations, while the
latter approach is a potential tax on business agility and responsiveness.
These challenges are not unique to cloud environments. Even customers who have not fully adopted
virtualization and cloud technologies are under pressure to decrease overall provisioning time in order
to keep up with the pace of business, as well as to rein in rogue IT. Customers running applications on
physical and legacy platforms also have an urgent need to enhance their abilities to quickly respond to
zero-day threats and vulnerabilities, as these attacks become increasingly more sophisticated.
Enterprises now have an opportunity to adapt their security frameworks so that these are aligned with
dynamic and highly abstracted software-defined environments, yet still deliver robust hardening and
security monitoring for their legacy and physical environments. These security frameworks are enabled
by solutions that embed security into the platform, support policy-based automation and orchestration
across security domains, are application-centric, and integrate point technologies. With this application-
centric approach, enterprises no longer have to make the traditional trade-off between security and agility.
They can have both.
Business Use Case: Security That Moves at the Speed of Business
Background: The Business Unit of a Global Digital Media Company plans to pilot a new non-cable
subscription, live streaming service to customers. With this service, customers can access the live
Enterprises Have Two Choices
1.	 Release the new workload into
production without appropriate
security and compliance.
2.	 Wait for IT operations, security,
business owners, and compliance
to complete their assessment and
define appropriate security settings.
Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the
U.S. and other countries.
streaming service without a monthly cable subscription and via various multimedia devices. The Digital
Media Company also partnered with a large social media organization so that customers can sign-up for
the new service using their social media accounts.
Business Challenges
The Business Unit wants to launch this service within two weeks of a major sporting event. The Business
Unit will be collecting payment card information from new subscribers. The social media partner will also
collect payment information from customers who sign up for the new service with their accounts. The new
service will initially be available only to U.S. customers, but there are plans to expand this live streaming
service to other global regions.
Demand for the new service is forecast to initially fluctuate, with higher than normal volumes expected
during major sports events. Since this new service targets a new market segment, there is a lot of pressure
to ensure that there are no service interruptions.
Global Digital Media Company has an existing automated business service requisition process, which
is rolled into its IT service provisioning and change control process. Here, the Business Unit fills out the
relevant forms requesting IT assets and defining the business requirements to support this new live
streaming service. These business requirements are fed into an IT service provisioning, automation, and
service orchestration tool like VMware vCenter.
Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the
U.S. and other countries.
IT Operations leverages vCenter templates to automate the provisioning of the guest virtual machines.
Although the company’s business service provisioning process is automated, security provisioning and
compliance assessments remain manual processes.
IT Security Challenge: Manual Security Provisioning Process Impedes Business Agility
Once VMware vCenter provisions the virtual application, the Server
Operations team notifies the Security Operations team to initiate
security provisioning and compliance assessments. Security
Operations works with the IT Compliance team to review the security
and compliance requirements, and will recommend the appropriate
security policies and controls. For many organizations, including
Global Digital Media Company, this could involve a series of face-to-
face meetings with key stakeholders. Once policies are approved,
IT tickets are raised for each individual Security Point product administrator to deploy the respective
security policies on the virtual application and configure the security point products to monitor/protect the
application. Once security provisioning is completed, the new service will then be released into production.
In this model, provisioning could take several days (if not weeks). This disconnect between the time it
takes to provision IT business services and to provide the necessary security is a tax on business agility
and time-to-market.
Meeting Compliance Requirements
Given the types of data transmitted, the Global Digital Media Company is concerned with PCI-DSS,
consumer privacy, and intellectual property. As the service rolls out globally, local data protection, and IP
and content distribution rights will introduce additional controls that must be applied on the applications.
The current manual process for compliance and security provisioning introduces more delays.
Static Security Zones Tax IT Resource Optimization
The Global Digital Media’s current security practice relies on a hardware-based, perimeter-centric security
framework. In this model, the customer’s virtual applications are organized into security zones that mimic
their hardware-based networks. This static perimeter-centric model means that the customer has to
ensure that its virtual applications can only vMotion (for load balancing and scale out) to another physical
server or to networks with similar security and compliance profiles. This approach can hamper IT resource
optimization objectives.
Provisioning Takes Time
The disconnect between the time
it takes to provision IT business
services and to provision security
is a tax on business agility and
time-to-market.
Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the
U.S. and other countries.
The Solution
Automate Security Provisioning with Symantec Data Center Security for Always-on Infrastructure
Hardening and Protection
With Symantec Data Center Security (DCS): Server Advanced, the Global Digital Media Company is able
to dramatically simplify and streamline the security provisioning process for newly created workloads.
Symantec DCS 6.5 enables policy-based security orchestration through Operations Director. This recently
introduced feature addresses the security provisioning dilemma by enabling customers to automate the
provisioning of multiple security services for virtual environments, and align these activities with the IT
provisioning process. These security services include anti-malware; server, device, OS and application
hardening; firewall; and network intrusion prevention. The next release will add vulnerability scanning
and threat assessment.
Using the Operations Director feature of DCS: Server Advanced, a typical automated workflow for security
provisioning of new created virtual assets will have the following activities:
1.	 During the application request process, the Business Unit will answer a brief security assessment
in addition to defining the business requirements. Once an application request is submitted by
the Business Unit, the Operations Director feature in Symantec Data Center Security (DCS): Server
Advanced will determine the security requirements using the information provided about the nature of
the data processed by the application, its location, overall service level requirements, and security and
compliance mandates governing the data and the application.
2.	 Operations Director will use the results of the security survey to recommend the relevant security
policies and security controls that need to be applied to the workload. The policies, security
assessment questionnaire, and requisite mapping to security standards and technical controls
across security tools are set up ahead of time by the customer’s security team, in accordance with
the organization’s security and compliance best practices. By automating the process across new
application and security provisioning, the customer’s security and IT organizations are able to
eliminate or minimize the time and effort spent on manual security assessments, reviews, and
approvals.
Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the
U.S. and other countries.
3.	 Once the application is started, Operations Director will detect the application and will orchestrate the
application of the relevant security settings across security products. Operations Director will then
orchestrate security monitoring and hardening settings for the virtual applications that are protected
by DCS: Server Advanced.
4.	 For customers that have VMware NSX, Operations Director will support security provisioning across the
following security products:
Security monitoring, server hardening, and host-based
IPS/IDS policies with DCS: Server Advanced.
Agentless anti-malware, agentless network IPS, and
in-guest file quarantine delivered by Symantec DCS: Server.
Firewall policies with Palo Alto Networks VM Series Firewall appliances.
5.	 Operations Director is flexible and allows the security operations team to choose the level of
automation they would allow in the security provisioning process. Customers can design the
Operations Director workflows so that:
•	 The security provisioning process for common application requests can be fully automated, or
•	 The Security Operations team can review the recommend policies and security settings and
override any policies that cater to any exemptions that need to be applied.
6.	 Once the security settings are applied, the security and server teams are notified that the application is
ready to be added to the production network.
7.	 The security settings applied to the virtual application are defined at an application-level, allowing
virtual applications with different trust levels to securely co-exist within a host.
The workflow described in the previous section illustrates the power of DCS: Server Advanced to accelerate
business agility and responsiveness by eliminating manual processes associated with the security review
and provisioning process. Using the Operations Director functionality, customers are able execute the
security provisioning for new virtual workloads in a matter of minutes- Truly, security at the need of speed!
Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the
U.S. and other countries.
Orchestrating Security Across Third-Party Security Tools
Symantec Data Center Security: Server Advanced orchestrates security across third-party products via
REST API-based connections. The current version has built-in integration with VMware NSX, VMware’s
networking platform, allowing Operations Director to orchestrate any security product integrated with the
VMware NSX ecosystem, starting with Palo Alto Networks Next Generation Firewalls. Future releases will
allow Operations Director to orchestrate security across a broader set of certified NSX-compatible security
tools.
Benefits of Security Microsegmentation
Symantec Data Center Security: Server Advanced also leverages the new Operations Director functionality
to execute a security microsegmentation model, thus eliminating the limitations of static security zones.
With microsegmentation, customers can create discrete security containers or profiles per application
instance. Relevant security policies are then applied to these discrete security containers, based on the
application’s security and compliance characteristics. Application instances with varied security profiles
and trust levels can, therefore, co-exist securely within a physical host. Even if one of the applications is
compromised, the rest of the application instances on the host and network are isolated and protected.
Using microsegmentation, customers will also be able to move a virtual application to another physical
host using vMotion, and ensure that the security policies and settings are maintained. The vMotioned
virtual application is still able to co-exist with other applications with different trust levels within the new
physical host and network environment- thus delivering Always on Protection and Hardening!
In addition to delivering unprecedented automation of security for VMware environments, Symantec Data
Center Security: Server Advanced also delivers microsegmented security provisioning for physical server
assets and non-VMware virtual environments. Customers can do this by utilizing a rich set of APIs to
enable Chef/Puppet integration and full automation of the security provisioning process in these non-
VMware environments.
Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the
U.S. and other countries.
Security at the Speed of Business
Speed or Security? It is a False Choice.
Symantec Data Center Security: Server Advanced will enable organizations like the Global Digital Media
Company to deliver security that is able to keep up with the pace of business and IT. It enables businesses
to quickly provision application-level security for newly provisioned workloads by automating several
manual steps.
Today, customers will have the ability to automate and orchestrate micro-segmented security provisioning
across heterogeneous environments—Cloud, VMware, OpenStack, and physical servers on any
platform. Customers can choose the security automation and orchestration approach that best fits their
environment. They can:
•	 Leverage Symantec Data Center Security: Operations
Director to automate and orchestrate security
provisioning for VMware environments and streamline
this process with the new security provisioning workflow
integrated into VMware vCenter.
•	 Take advantage of fully instrumented rest APIs to
integrate security provisioning into any data center
security automation frameworks (like Chef or Puppet).
Both options offer customers the ability to define and apply security policies at the application level, thus
doing away with the inefficiencies associated with static, perimeter-centric network security zones.
Symantec Data Center Security: Server Advanced demonstrates Symantec’s commitment to enable
customers to securely migrate their existing data centers into the SDDC by embedding security into the
platform, integrating point security technologies, and automating and orchestrating security.
Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the
U.S. and other countries.
Symantec Data Center Security: Server Advanced - Features
Symantec Data Center Security: Server Advanced delivers the following protection capabilities:
•	 Out of the Box Host IDS and IPS Policies to monitor and prevent suspicious server activity.
•	 Sandboxing and Process Access Control (PAC) offers prevention against a new class of threats.
•	 Host Firewall, to control inbound and outbound network traffic to and from servers.
•	 Compensating HIPS Controls restricts application and operating system behavior using policy-based
least privilege access control.
•	 File and System Tamper Prevention locks down configuration, settings, and files.
•	 Application and Device Control locks down configuration settings, file systems, and use of removable
media.
•	 Security monitoring and hardening of OpenStack Keystone.
•	 Security monitoring across physical and virtual servers and across AWS and all OpenStack modules.
Customers of Data Center Security: Server Advanced will also have access to the features available in
Symantec™ Data Center Security: Server including the following:
•	 Agentless anti-malware, agentless network IPS and file reputation services
•	 Auto-deployment and provision of Security Virtual Appliance to ESX host in a cluster
•	 Network based threat detection and protection (Network IPS)
•	 Operations Director to automate and orchestrate security provisioning for newly created workloads
•	 Unified Management Console (UMC) delivers a consistent management experience across Data Center
Security products

More Related Content

What's hot

Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
Virtualization And Cloud Impact Overview Auditor Spin   Enterprise Gr Cv4Virtualization And Cloud Impact Overview Auditor Spin   Enterprise Gr Cv4
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
EnterpriseGRC Solutions, Inc.
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Doeren Mayhew
 

What's hot (20)

What's New in Ivanti Workspace Control 2020.0
What's New in Ivanti Workspace Control 2020.0 What's New in Ivanti Workspace Control 2020.0
What's New in Ivanti Workspace Control 2020.0
 
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
Virtualization and cloud impact overview auditor spin   enterprise gr-cv3Virtualization and cloud impact overview auditor spin   enterprise gr-cv3
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
 
IT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIT Service & Asset Management Better Together
IT Service & Asset Management Better Together
 
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
Virtualization And Cloud Impact Overview Auditor Spin   Enterprise Gr Cv4Virtualization And Cloud Impact Overview Auditor Spin   Enterprise Gr Cv4
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 
Not Your Mother's SD-WAN 101
Not Your Mother's SD-WAN 101Not Your Mother's SD-WAN 101
Not Your Mother's SD-WAN 101
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesPartnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
 
What's New with Ivanti Service Desk
What's New with Ivanti Service DeskWhat's New with Ivanti Service Desk
What's New with Ivanti Service Desk
 
Government Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need TodayGovernment Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need Today
 
Product engineering services at a glance
Product engineering services at a glanceProduct engineering services at a glance
Product engineering services at a glance
 
Ivanti neurons - lunch and learn
Ivanti neurons - lunch and learnIvanti neurons - lunch and learn
Ivanti neurons - lunch and learn
 
SolarWinds Public Sector Cybersecurity Survey Report 2020
SolarWinds Public Sector Cybersecurity Survey Report 2020SolarWinds Public Sector Cybersecurity Survey Report 2020
SolarWinds Public Sector Cybersecurity Survey Report 2020
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
 
Ivanti Identity Director 2020.1.
Ivanti Identity Director 2020.1.Ivanti Identity Director 2020.1.
Ivanti Identity Director 2020.1.
 
E guide weathering the storm at your business
E guide weathering the storm at your businessE guide weathering the storm at your business
E guide weathering the storm at your business
 
The value of our data
The value of our dataThe value of our data
The value of our data
 
Ivanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified ITIvanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified IT
 
I Own Your Building (Management System)
I Own Your Building (Management System)I Own Your Building (Management System)
I Own Your Building (Management System)
 
Cybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabiaCybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabia
 

Viewers also liked

Декларация об обеспечении устойчивости к киберугрозам
Декларация об обеспечении устойчивости к киберугрозамДекларация об обеспечении устойчивости к киберугрозам
Декларация об обеспечении устойчивости к киберугрозам
Symantec
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
Symantec
 

Viewers also liked (13)

Point of Sale (POS) Malware: Easy to Spot, Hard to Stop
Point of Sale (POS) Malware: Easy to Spot, Hard to StopPoint of Sale (POS) Malware: Easy to Spot, Hard to Stop
Point of Sale (POS) Malware: Easy to Spot, Hard to Stop
 
Agile IT Empowers Business Success
Agile IT Empowers Business SuccessAgile IT Empowers Business Success
Agile IT Empowers Business Success
 
Symantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security SimulationSymantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security Simulation
 
INFOGRAPHIC▶Backup Exec 2014 Offsite cloud storage Options for Disaster Recov...
INFOGRAPHIC▶Backup Exec 2014 Offsite cloud storage Options for Disaster Recov...INFOGRAPHIC▶Backup Exec 2014 Offsite cloud storage Options for Disaster Recov...
INFOGRAPHIC▶Backup Exec 2014 Offsite cloud storage Options for Disaster Recov...
 
Декларация об обеспечении устойчивости к киберугрозам
Декларация об обеспечении устойчивости к киберугрозамДекларация об обеспечении устойчивости к киберугрозам
Декларация об обеспечении устойчивости к киберугрозам
 
The Forrester Wave™: Enterprise Mobile Management, 3e kwartaal 2014
The Forrester Wave™: Enterprise Mobile Management, 3e kwartaal 2014The Forrester Wave™: Enterprise Mobile Management, 3e kwartaal 2014
The Forrester Wave™: Enterprise Mobile Management, 3e kwartaal 2014
 
Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - now
 
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15
 
Infographic: Dismantling the Ramnit Botnet
Infographic: Dismantling the Ramnit BotnetInfographic: Dismantling the Ramnit Botnet
Infographic: Dismantling the Ramnit Botnet
 
WHITE PAPER▶ Symantec Security Response Presents:The Waterbug Attack Group
WHITE PAPER▶ Symantec Security Response Presents:The Waterbug Attack GroupWHITE PAPER▶ Symantec Security Response Presents:The Waterbug Attack Group
WHITE PAPER▶ Symantec Security Response Presents:The Waterbug Attack Group
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
 
Better Security Through Big Data Analytics
Better Security Through Big Data AnalyticsBetter Security Through Big Data Analytics
Better Security Through Big Data Analytics
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 

Similar to IT Security at the Speed of Business: Security Provisioning with Symantec Data Center Security

VMSDeploymentGuide_Extract1a
VMSDeploymentGuide_Extract1aVMSDeploymentGuide_Extract1a
VMSDeploymentGuide_Extract1a
Tom - Creed
 
Iaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems using
Iaetsd Iaetsd
 
Due by 11316 9pm PSTGiven the pieces of information provided i.docx
Due by 11316 9pm PSTGiven the pieces of information provided i.docxDue by 11316 9pm PSTGiven the pieces of information provided i.docx
Due by 11316 9pm PSTGiven the pieces of information provided i.docx
sagarlesley
 

Similar to IT Security at the Speed of Business: Security Provisioning with Symantec Data Center Security (20)

How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
Symantec's London vision 2014 event more details emerge on the company split
Symantec's London vision 2014 event more details emerge on the company splitSymantec's London vision 2014 event more details emerge on the company split
Symantec's London vision 2014 event more details emerge on the company split
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
 
Peter Coffee at Southland Technology Conference
Peter Coffee at Southland Technology ConferencePeter Coffee at Southland Technology Conference
Peter Coffee at Southland Technology Conference
 
How a Business-First, Agile Cloud Migration Factory Approach Powers Digital S...
How a Business-First, Agile Cloud Migration Factory Approach Powers Digital S...How a Business-First, Agile Cloud Migration Factory Approach Powers Digital S...
How a Business-First, Agile Cloud Migration Factory Approach Powers Digital S...
 
Cloud Computing - Emerging Opportunities in the CA Profession
Cloud Computing - Emerging Opportunities in the CA ProfessionCloud Computing - Emerging Opportunities in the CA Profession
Cloud Computing - Emerging Opportunities in the CA Profession
 
Peter Coffee 20100923 AITP Cloud Computing Con SD
Peter Coffee 20100923 AITP Cloud Computing Con SDPeter Coffee 20100923 AITP Cloud Computing Con SD
Peter Coffee 20100923 AITP Cloud Computing Con SD
 
Blue Bricks Business Collateral
Blue Bricks Business CollateralBlue Bricks Business Collateral
Blue Bricks Business Collateral
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the Cloud
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
IT Department Roadmap | National Management Olympiad Season 4
IT Department Roadmap | National Management Olympiad Season 4IT Department Roadmap | National Management Olympiad Season 4
IT Department Roadmap | National Management Olympiad Season 4
 
VMSDeploymentGuide_Extract1a
VMSDeploymentGuide_Extract1aVMSDeploymentGuide_Extract1a
VMSDeploymentGuide_Extract1a
 
Iaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems using
 
NG-Brochure
NG-BrochureNG-Brochure
NG-Brochure
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdf
 
SOC Service in India.pdf
SOC Service in India.pdfSOC Service in India.pdf
SOC Service in India.pdf
 
Due by 11316 9pm PSTGiven the pieces of information provided i.docx
Due by 11316 9pm PSTGiven the pieces of information provided i.docxDue by 11316 9pm PSTGiven the pieces of information provided i.docx
Due by 11316 9pm PSTGiven the pieces of information provided i.docx
 
Modern Architectures
Modern ArchitecturesModern Architectures
Modern Architectures
 

More from Symantec

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 

Recently uploaded (20)

HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 

IT Security at the Speed of Business: Security Provisioning with Symantec Data Center Security

  • 1. Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. IT Security at the Speed of Business: Security Provisioning with Symantec Data Center Security Today’s data centers are transitioning into software-defined data centers (SDDC). In the SDDC, the core elements of the infrastructure—storage, server and compute, networking, databases, and business applications—are virtualized and delivered as services. The deployment, provisioning, configuration, management and operation of the entire infrastructure is abstracted from hardware and implemented through software. The infrastructure resources across the stack are application-centric, and customers have the ability to provision IT assets across their public cloud, private cloud, and on-premise domains. These SDDC capabilities are intended to enhance an enterprise’s ability to quickly respond to new opportunities and emerging threats. Virtualization, cloud, and policy- based automation and orchestration technologies are the lynchpins of the SDDC. The rates at which enterprises adopt these technologies therefore function as indicators of the rate of SDDC migration. Today, more than half of all server and storage workloads are virtualized, a number that is forecasted to reach to 86 percent by 20161 . Cloud computing is just as popular, with a forecast annual growth rate of 44 percent over the next five years2 . Adoption of network virtualization is also starting to take off, and is forecasted to grow from $960 million in 2014 to $8 billion in 20183 . The promise of increased IT and business agility, lower Capex, and economies of scale in IT operations underpins the adoption of SDDC technologies. 20162015 2017 2018 2019 2020 44% annual growth rate 86% 20162015 50% Server and storage virtualization Cloud Computing 4 years Adoption of network virtualization $960 million $8 billion 1 CIO|Insight, August 28, 2015 2 SiliconANGLE, January 27, 2014 3 IDC Study, SDN Momentum Builds in Data Center and Enterprise Networks
  • 2. Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. IT Security that Keeps Up with Business and IT Operations The adoption of software-defined technologies underscores the need for enterprises to re-evaluate their existing security practices and to ask themselves the following: • “Is security an enabler or a hindrance to business agility?” • “How can security keep up with business and IT?” • “What is the impact of these new technologies on my organization’s current security model?” • “How do I adapt my existing security frameworks and models to account for these developments?” • “How do I take advantage of these technologies to enable security across my existing and new data center infrastructure environments?” Enterprises today operate geographically distributed, heterogeneous, complex, and increasingly fluid data center infrastructures. These enterprises have not only adopted virtualization technologies within their data centers, but are also using a combination of public and private cloud assets and colocation facilities. These enterprises are also enabling partners to connect to their networks, and are allowing their highly mobile employees to connect to their networks using a myriad of mobile endpoints. With these capabilities, enterprises are more agile and responsive to opportunities for creating new revenue streams and for realizing operating efficiencies. As a result, business owners now expect IT assets to be quickly provisioned in a matter of hours if not minutes. Despite these developments, security remains a laggard for many organizations. Many enterprises today continue to utilize rigid, perimeter-centric security models that are based on physical security frameworks. Security and provisioning for newly created workloads and applications remains a manual process for many enterprises, and can take days or even weeks. In contrast, the process for provisioning new workloads can take minutes or hours in modern virtualized data centers. This lag between IT operations and security is a disadvantage in today’s fast-changing business environments. When a company wants
  • 3. Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. to launch a new online business or needs to scale up quickly in response to a spike in demand for its online services, IT operations and security must be able to deliver these services quickly or the customer’s customers will go elsewhere. In this scenario, enterprises have two choices: • Release the new workload into production without the appropriate security and compliance settings, or • Wait for IT operations, security, business owners, and compliance to complete their manual assessment and decide on the appropriate security settings. The former exposes the organization to potential security breaches and compliance violations, while the latter approach is a potential tax on business agility and responsiveness. These challenges are not unique to cloud environments. Even customers who have not fully adopted virtualization and cloud technologies are under pressure to decrease overall provisioning time in order to keep up with the pace of business, as well as to rein in rogue IT. Customers running applications on physical and legacy platforms also have an urgent need to enhance their abilities to quickly respond to zero-day threats and vulnerabilities, as these attacks become increasingly more sophisticated. Enterprises now have an opportunity to adapt their security frameworks so that these are aligned with dynamic and highly abstracted software-defined environments, yet still deliver robust hardening and security monitoring for their legacy and physical environments. These security frameworks are enabled by solutions that embed security into the platform, support policy-based automation and orchestration across security domains, are application-centric, and integrate point technologies. With this application- centric approach, enterprises no longer have to make the traditional trade-off between security and agility. They can have both. Business Use Case: Security That Moves at the Speed of Business Background: The Business Unit of a Global Digital Media Company plans to pilot a new non-cable subscription, live streaming service to customers. With this service, customers can access the live Enterprises Have Two Choices 1. Release the new workload into production without appropriate security and compliance. 2. Wait for IT operations, security, business owners, and compliance to complete their assessment and define appropriate security settings.
  • 4. Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. streaming service without a monthly cable subscription and via various multimedia devices. The Digital Media Company also partnered with a large social media organization so that customers can sign-up for the new service using their social media accounts. Business Challenges The Business Unit wants to launch this service within two weeks of a major sporting event. The Business Unit will be collecting payment card information from new subscribers. The social media partner will also collect payment information from customers who sign up for the new service with their accounts. The new service will initially be available only to U.S. customers, but there are plans to expand this live streaming service to other global regions. Demand for the new service is forecast to initially fluctuate, with higher than normal volumes expected during major sports events. Since this new service targets a new market segment, there is a lot of pressure to ensure that there are no service interruptions. Global Digital Media Company has an existing automated business service requisition process, which is rolled into its IT service provisioning and change control process. Here, the Business Unit fills out the relevant forms requesting IT assets and defining the business requirements to support this new live streaming service. These business requirements are fed into an IT service provisioning, automation, and service orchestration tool like VMware vCenter.
  • 5. Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. IT Operations leverages vCenter templates to automate the provisioning of the guest virtual machines. Although the company’s business service provisioning process is automated, security provisioning and compliance assessments remain manual processes. IT Security Challenge: Manual Security Provisioning Process Impedes Business Agility Once VMware vCenter provisions the virtual application, the Server Operations team notifies the Security Operations team to initiate security provisioning and compliance assessments. Security Operations works with the IT Compliance team to review the security and compliance requirements, and will recommend the appropriate security policies and controls. For many organizations, including Global Digital Media Company, this could involve a series of face-to- face meetings with key stakeholders. Once policies are approved, IT tickets are raised for each individual Security Point product administrator to deploy the respective security policies on the virtual application and configure the security point products to monitor/protect the application. Once security provisioning is completed, the new service will then be released into production. In this model, provisioning could take several days (if not weeks). This disconnect between the time it takes to provision IT business services and to provide the necessary security is a tax on business agility and time-to-market. Meeting Compliance Requirements Given the types of data transmitted, the Global Digital Media Company is concerned with PCI-DSS, consumer privacy, and intellectual property. As the service rolls out globally, local data protection, and IP and content distribution rights will introduce additional controls that must be applied on the applications. The current manual process for compliance and security provisioning introduces more delays. Static Security Zones Tax IT Resource Optimization The Global Digital Media’s current security practice relies on a hardware-based, perimeter-centric security framework. In this model, the customer’s virtual applications are organized into security zones that mimic their hardware-based networks. This static perimeter-centric model means that the customer has to ensure that its virtual applications can only vMotion (for load balancing and scale out) to another physical server or to networks with similar security and compliance profiles. This approach can hamper IT resource optimization objectives. Provisioning Takes Time The disconnect between the time it takes to provision IT business services and to provision security is a tax on business agility and time-to-market.
  • 6. Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. The Solution Automate Security Provisioning with Symantec Data Center Security for Always-on Infrastructure Hardening and Protection With Symantec Data Center Security (DCS): Server Advanced, the Global Digital Media Company is able to dramatically simplify and streamline the security provisioning process for newly created workloads. Symantec DCS 6.5 enables policy-based security orchestration through Operations Director. This recently introduced feature addresses the security provisioning dilemma by enabling customers to automate the provisioning of multiple security services for virtual environments, and align these activities with the IT provisioning process. These security services include anti-malware; server, device, OS and application hardening; firewall; and network intrusion prevention. The next release will add vulnerability scanning and threat assessment. Using the Operations Director feature of DCS: Server Advanced, a typical automated workflow for security provisioning of new created virtual assets will have the following activities: 1. During the application request process, the Business Unit will answer a brief security assessment in addition to defining the business requirements. Once an application request is submitted by the Business Unit, the Operations Director feature in Symantec Data Center Security (DCS): Server Advanced will determine the security requirements using the information provided about the nature of the data processed by the application, its location, overall service level requirements, and security and compliance mandates governing the data and the application. 2. Operations Director will use the results of the security survey to recommend the relevant security policies and security controls that need to be applied to the workload. The policies, security assessment questionnaire, and requisite mapping to security standards and technical controls across security tools are set up ahead of time by the customer’s security team, in accordance with the organization’s security and compliance best practices. By automating the process across new application and security provisioning, the customer’s security and IT organizations are able to eliminate or minimize the time and effort spent on manual security assessments, reviews, and approvals.
  • 7. Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. 3. Once the application is started, Operations Director will detect the application and will orchestrate the application of the relevant security settings across security products. Operations Director will then orchestrate security monitoring and hardening settings for the virtual applications that are protected by DCS: Server Advanced. 4. For customers that have VMware NSX, Operations Director will support security provisioning across the following security products: Security monitoring, server hardening, and host-based IPS/IDS policies with DCS: Server Advanced. Agentless anti-malware, agentless network IPS, and in-guest file quarantine delivered by Symantec DCS: Server. Firewall policies with Palo Alto Networks VM Series Firewall appliances. 5. Operations Director is flexible and allows the security operations team to choose the level of automation they would allow in the security provisioning process. Customers can design the Operations Director workflows so that: • The security provisioning process for common application requests can be fully automated, or • The Security Operations team can review the recommend policies and security settings and override any policies that cater to any exemptions that need to be applied. 6. Once the security settings are applied, the security and server teams are notified that the application is ready to be added to the production network. 7. The security settings applied to the virtual application are defined at an application-level, allowing virtual applications with different trust levels to securely co-exist within a host. The workflow described in the previous section illustrates the power of DCS: Server Advanced to accelerate business agility and responsiveness by eliminating manual processes associated with the security review and provisioning process. Using the Operations Director functionality, customers are able execute the security provisioning for new virtual workloads in a matter of minutes- Truly, security at the need of speed!
  • 8. Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Orchestrating Security Across Third-Party Security Tools Symantec Data Center Security: Server Advanced orchestrates security across third-party products via REST API-based connections. The current version has built-in integration with VMware NSX, VMware’s networking platform, allowing Operations Director to orchestrate any security product integrated with the VMware NSX ecosystem, starting with Palo Alto Networks Next Generation Firewalls. Future releases will allow Operations Director to orchestrate security across a broader set of certified NSX-compatible security tools. Benefits of Security Microsegmentation Symantec Data Center Security: Server Advanced also leverages the new Operations Director functionality to execute a security microsegmentation model, thus eliminating the limitations of static security zones. With microsegmentation, customers can create discrete security containers or profiles per application instance. Relevant security policies are then applied to these discrete security containers, based on the application’s security and compliance characteristics. Application instances with varied security profiles and trust levels can, therefore, co-exist securely within a physical host. Even if one of the applications is compromised, the rest of the application instances on the host and network are isolated and protected. Using microsegmentation, customers will also be able to move a virtual application to another physical host using vMotion, and ensure that the security policies and settings are maintained. The vMotioned virtual application is still able to co-exist with other applications with different trust levels within the new physical host and network environment- thus delivering Always on Protection and Hardening! In addition to delivering unprecedented automation of security for VMware environments, Symantec Data Center Security: Server Advanced also delivers microsegmented security provisioning for physical server assets and non-VMware virtual environments. Customers can do this by utilizing a rich set of APIs to enable Chef/Puppet integration and full automation of the security provisioning process in these non- VMware environments.
  • 9. Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Security at the Speed of Business Speed or Security? It is a False Choice. Symantec Data Center Security: Server Advanced will enable organizations like the Global Digital Media Company to deliver security that is able to keep up with the pace of business and IT. It enables businesses to quickly provision application-level security for newly provisioned workloads by automating several manual steps. Today, customers will have the ability to automate and orchestrate micro-segmented security provisioning across heterogeneous environments—Cloud, VMware, OpenStack, and physical servers on any platform. Customers can choose the security automation and orchestration approach that best fits their environment. They can: • Leverage Symantec Data Center Security: Operations Director to automate and orchestrate security provisioning for VMware environments and streamline this process with the new security provisioning workflow integrated into VMware vCenter. • Take advantage of fully instrumented rest APIs to integrate security provisioning into any data center security automation frameworks (like Chef or Puppet). Both options offer customers the ability to define and apply security policies at the application level, thus doing away with the inefficiencies associated with static, perimeter-centric network security zones. Symantec Data Center Security: Server Advanced demonstrates Symantec’s commitment to enable customers to securely migrate their existing data centers into the SDDC by embedding security into the platform, integrating point security technologies, and automating and orchestrating security.
  • 10. Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Symantec Data Center Security: Server Advanced - Features Symantec Data Center Security: Server Advanced delivers the following protection capabilities: • Out of the Box Host IDS and IPS Policies to monitor and prevent suspicious server activity. • Sandboxing and Process Access Control (PAC) offers prevention against a new class of threats. • Host Firewall, to control inbound and outbound network traffic to and from servers. • Compensating HIPS Controls restricts application and operating system behavior using policy-based least privilege access control. • File and System Tamper Prevention locks down configuration, settings, and files. • Application and Device Control locks down configuration settings, file systems, and use of removable media. • Security monitoring and hardening of OpenStack Keystone. • Security monitoring across physical and virtual servers and across AWS and all OpenStack modules. Customers of Data Center Security: Server Advanced will also have access to the features available in Symantec™ Data Center Security: Server including the following: • Agentless anti-malware, agentless network IPS and file reputation services • Auto-deployment and provision of Security Virtual Appliance to ESX host in a cluster • Network based threat detection and protection (Network IPS) • Operations Director to automate and orchestrate security provisioning for newly created workloads • Unified Management Console (UMC) delivers a consistent management experience across Data Center Security products