Symantec Managed Security Services The Power To Protect Duncan Evans Director, Cyber Security Services 1.

Slides:



Advertisements
Similar presentations
Smart Identity Protection That Works for You and Your Users 2 Petri Ala-Annala Senior Principal, CISSP-ISSAP, CISA, CISM.
Advertisements

Symantec Education Skills Assessment SESA 3.0 Feature Showcase
IT Analytics for Symantec Endpoint Protection
‘Changing environment – changing security’ - Cyber-threat challenges today – Budapest, September 17-18, Industry and the fight against cybercrime.
1 Online Self-Defense: Avoiding Scams Chau Mai December 5, 2013.
© 2014 Microsoft Corporation. All rights reserved.
Threat Intelligence Use in Information Security: History, Theory and Practice Tim Gallo Cyber Security Field Engineering 1.
Translation in the Community LRC Localisation in the Cloud Jason Rickard Principal Product Manager, Community.
Security for Today’s Threat Landscape Kat Pelak 1.
1 Getting Beyond Standalone Antivirus to Advanced Threat Protection Eric Schwake Sr. Product Marketing
Symantec Tech Symposium Randy Cochran, Vice Present Channel Sales – Americas August 17, 2009.
The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.
Symantec De-Duplication Solutions Complete Protection for your Information Driven Enterprise Richard Hobkirk Sr. Pre-Sales Consultant.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
1 When Cloud Networking meets Cloud Computing: Software-Defined Networking (SDN) Customer Application Faan DeSwardt Infrastructure Architecture Manager.
Linda Mitchell Evaluating Community Post-Editing - Bridging the Gap between Translation Studies and Social Informatics Linda Mitchell PhD student.
Практические аспекты аутсорсинга ИБ Алексей Чередниченко Ведущий консультант, Symantec Services Group 28 апреля 2009.
President’s Forum and WSML 2012 INDSTRAT 02 Mobile Market Dynamics Brian Duckering, Deborah Clark, Evan Quinn “A Day in the Life of Mobile” 1.
Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled.
Adversary Defense: Past, Present, Future Presenter’s Name Here Presenter’s Title Here.
Conditions and Terms of Use
Cassio Goldschmidt June 29 th, Introduction 2.
1 Safely Using Shared Computers Amanda Grady December 2013.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
President’s Forum and WSML 2012 Mobile Market Dynamics Deborah Clark, Dawn Davis, Brian Duckering, Marie Pettersson 1 “A Day in the Life of a Mobile Family”
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
Type presentation name here in slide master © 2007 SDL. Company Confidential. Forward-looking information is based upon multiple assumptions and uncertainties.
© 2010 Verizon. All Rights Reserved. PTE / DBIR.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Next Generation Partner Program Fady Iskander Symantec Corp.
GPS 2011 Slide - 1 MS CERT KIT Microworld Nova. GPS 2011 Slide - 2 Presentation of Microworld Nova The MS Cert Kit MS Cert Kit presentation The backend.
Quick Thoughts on PGP Use Cases for KMIP 1 Michael Allen Sr. Technical Director.
The current state of Cybersecurity Targeted and In Your Pocket Dale “Dr. Z” Zabriskie CISSP CCSK Symantec Evangelist.
President’s Forum and WSML 2012 SYMSTRAT 03: Enterprise Sales Conversations for Virtualization Todd Zambrovitz with guest appearance by Kevin Fiedler 1.
WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007.
Innovation From the Ground Up Fred Hollowood, Martin Roche.
Installation of Storage Foundation for Windows High Availability 5.1 SP2 1 Daniel Schnack Principle Technical Support Engineer.
Business Critical Services Introduction 1 Business Critical Services Overview BCAM NAME HERE Business Critical Account Manager.
What’s new in SEP Presenter’s Name Here Presenter’s Title Here.
1 APJ Curriculum Paths for Partners Specialization Accelerates Shirley Hoon APJ Partner Enablement Partner Enablement Oct
Achieving success WITH
Copy to Tape TOI. 2 Copy to Tape TOI Agenda Overview1 Technical Feature Implementation2 Q&A3.
Shared Engineering Services APJ Ghostdetect ver 1.0 for SPC Donghyun Seo Dec 12, 2008.
Upstate NY Storage & High Availability User Group October 23, 2009.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Optimized Synthetics 1 OpenStorage Optimized Synthetics.
Type presentation name here in slide master © 2007 SDL. Company Confidential. Forward-looking information is based upon multiple assumptions and uncertainties.
Partner Proctored Assessment Registration Process Ajit Jha 1 Partner Assessment.
OST Virtual Synthetics 1. Synthetics Overvier Definitions – Catalog – Image – Extent Process Overview (today) – Extent map derivation – Read agenda –
Cyber Security in the Post-AV Era Amit Mital Chief Technology Officer General Manager, Emerging Endpoints Business Unit.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Agile Information Lifecycle: A Customer Journey March 2016 Dan Jennings Veritas Partner Technical Account Manager +44 (0) Veritas Technologies.
Editing Tons of Text? RegEx to the Rescue! Eric Cressey Senior UX Content Writer Symantec Corporation.
APIs related to NBU AIR Feature 1 OST APIs Related to NBU AIR Feature.
Maximize Profits Through Stronger Security Brook Chelmo Product Marketing
Using Parallelspace TEAM Models to Design and Create Custom Profiles
Comprehensive Security and Compliance at an Affordable Price.
Now, let’s implement/trial Windows Defender Advanced Threat Protection
“Introduction to Azure Security Center”
How Microsoft uses Windows Defender ATP–Welcome to a SecOps world!
Journey to Microsoft Secure Cloud
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
6/19/2018 2:57 AM THR3092 Monitor and investigate actions on your user and data with alerts, insights and reports Binyan Chen Program Manager II, Office.
Active Cyber Security, OnDemand
The utility belt for managing security and compliance in Office 365
Parallelspace PowerPoint Template for ArchiMate® 2.1 version 1.1
Microsoft Data Insights Summit
Microsoft Data Insights Summit
Presentation transcript:

Symantec Managed Security Services The Power To Protect Duncan Evans Director, Cyber Security Services 1

Source: Information is beautiful – World’s biggest data breaches and hacksInformation is beautiful – World’s biggest data breaches and hacks 2 Copyright © 2014 Symantec Corporation Data Breaches and Hacks

66% Breaches went undetected for 30 days or more 243 days before detection 4 months to remediate Organizations Are Not Stopping Targeted Attacks 3

The Shift in Mindset 4

5 SOCs globally Over 500 security experts on a global scale 100% GIAC certified SOC analysts Managed Security Service Expert Security on a Global Scale 660 Billion Log Lines (per month) Over 4.7M new events identified (per day) 64.6M attack sensors 5M decoy accounts 8B+ messages (Per day) 1.4B+ web requests (per day) Big Data Security Analytics Security Intelligence World-class Expertise

Symantec IS Security Intelligence 2B+ events logged daily Over 100,000 security alerts generated annually 200,000 daily code submissions 7 Billion File, URL & IP Classifications Capturing previously unseen threats & attack methods 1 Billion+ Devices Protected More visibility across devices creates better context and deeper insight 2.5 Trillion Rows of Security Telemetry Putting “big data” analytics to work for every end user Monitors Threats in 157+ countries 14 Data Centers World Wide 550 Threat Researchers 6

How can Symantec respond to threats? On-Premise Symantec SOC Log Collection Agent Security Analysts Customer Portal DeepSight Global Threat Intelligence Data Warehouse Correlation 7

Q & A 8

Thank you! Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Duncan Evans 9