Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

1 Effective, secure and reliable hosted security and continuity solution.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
Managed Premises Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Secure Messaging Nick Hall & James Clifford Microsoft.
 Malicious or unsolicited mail sent to a mailbox without the option to unsubscribe  Often used as a catch-all of any undesired or questionable mail.
What is SpamSniper? SpamSniper is the leading security solution which locates in front of mail server to perform mail proxy, virus firewall and filter.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
SIM334. Internet Comprehensive Protection Multi-Engine Antivirus and Multi layered continuously evolving Anti-spam In the Leader’s quadrant in the.
Norman Endpoint Protection Advanced security made easy.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Top 7 Things to Know about Activation and Genuine Software with Windows 7 For computers with perpetual licensing obtained through Microsoft volume licensing.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Forefront Security Exchange. Problem Meddelande system och sammarbetsprodukter är underbarar mål för elak kod och “distrubition” av äkta dynga… Viruses.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Your technology solution partner.™ Security Enterprise Protection Gener C. Tongco Product Manager CT Link Systems Inc.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
[Name / Title] [Date] Effective Threat Protection Strategies.
1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.
May l Washington, DC l Omni Shoreham The ROI of Messaging Security JF Sullivan VP Marketing, Cloudmark, Inc.
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
InterScan Gateway Security Appliance 1.0 Filip Demianiuk Sales Engineer Eastern Europe
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Norman Safeground As secure as it gets. The company has 100 employees in 6 countries and is headquartered in Oslo, Norway. We are passionate about providing.
Dell Connected Security Solutions Simplify & unify.
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Data Center Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory compliances?
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
Webroot Web Security SaaS A Better Approach to Web Security
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
The Changing World of Endpoint Protection
Crimeware: An Emerging, Acute Threat Dave Green.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
“SaaS secure web and gateways frequently provide efficiency and cost advantages, and a growing number of offerings are delivering an improved.
© 2009 WatchGuard Technologies WatchGuard ReputationAuthority Rejecting Unwanted & Web Traffic at the Perimeter.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
1 Hosted security and continuity. 2 GFI MAX MailProtection overview GFI MAX MailProtection is a cloud-based security solution » Inbound .
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Spam & Virus Blocker Wilson Prokosch WW Channel GTM- Sr. BDM.
Microsoft and Symantec
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Key business enablers of Growth and ICT at the forefront Andre Joubert9 June 2016.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Web Content Security Unlock the Power of the Web
Barracuda NG Firewall ™
Advanced Endpoint Security Data Connectors-Charlotte January 2016
BUILD SECURE PRODUCTS AND SERVICES
Exchange Online Advanced Threat Protection
Office 365 is cloud-based productivity, hosted by Microsoft.
AT&T Premises-Based Firewall Enhanced SBS Solution
Threat Management Gateway
Virtualization & Security real solutions
Exchange Online Advanced Threat Protection
Cybersecurity Strategy
Cloud Security for Endpoints
Building an Integrated Security System Microsoft Forefront code name “Stirling” Ravi Sankar Technology Evangelist | Microsoft
Introduction to Symantec Security Service
Microsoft Üzleti Megoldások Konferencia 2005
Presentation transcript:

Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1

Agenda 2 What’s being done now? There is a new risk The new approach

Top Information Security Concerns Protection and Control Cost Containment Staffing Keep threats out Control sensitive data Enforce compliance Do more with less Quicker time to benefit CAPEX v OPEX Limited staff, expertise Innovation vs. managing infrastructure

Evolving Threat Landscape 90% of breaches in 2009 involved organized crime targeting corporate information 90% of all traffic is spam and the Web has become the primary vector for malware delivery 11x increase in unique malware samples in the last two years seen by Symantec

Sophistication of high end threats is evolving rapidly Continued growth in targeted threats which attack specific companies, persons or systems Evolving Threat Landscape New “Zero Hour” Threats continue to increase New malicious code signatures Driven by: Increase in new threats leading to failure of traditional signature based protection Readily available malware toolkits Specialization of highly skilled participants Huge sums of money $£¥€

It was annoying once….

It’s now malicious

What are they attempting to do. Incursion Discovery & Capture Extraction

Attacks Are Becoming More Complex Fraudulent IM with Web Link Compromised Website Hosting Malware Spoofed with Web Link Comprehensive Protection Needed Across , Web, and IM

You Can’t See It BUT It’s There 10

New Web Threats

Facebook Delivered Viruses

Point solutions leave gaps – multi-protocol converged threat analysis and unrivaled accuracy are essential Early warning systems were built for the old style mass mailing viruses not targeted attacks or smaller attacks from thousands of attackers A new threat landscape requires a different approach 90 % Of all breaches are now driven by highly resourced organized criminals 2008: total market value of illegally obtained corporate data $600B - $1T

What’s being done now? 14

How Flows To Your Company Sender Client Server Client Server Recipient

Traditional Security Server DNS Client Server DNS Client Recipient Mail FlowATTACKS! Sender

What happens inside… Traditional Security s will have to be received by the device to be processed – Wasted resources and bandwidth Majority Signature Based – Most use the same signatures as their desktop AV products Some have IP reputation filtering – White listing/black listing based on IP address only Will rely on updates by the vendor to keep up to date – Window of vulnerability, time taken for updates to be developed and delivered Will have to increase physical resources once volume of mail increases

The New Approach 18

Filtration Sedimentation Slow Sand Filters Activated Sludge Flocculation Chlorination Electromagnetic Radiation Suspended Particles Parasites Bacteria Algae Viruses Fungi Are these terms familiar?

How Water Flows To Your Home Reservoir Home Filtration Sedimentation Slow Sand Filters Activated Sludge Flocculation Chlorination Electromagnetic Radiation Untreated Water Suspended Particles Parasites Bacteria Algae Viruses Fungi Clean Water

DNS Block Lists Signature Heuristics Traffic Shaping White Lists Black Lists Bayesian Filtering Sandbox Viruses Trojans Spyware Spam Phishing Are these terms familiar?

How Hosted Scanning Works Sender Client Server Client Server Recipient MessageLabs Data Centre Internet DNS Block Lists Signaturing Heuristics Traffic Shaping White Lists Black Lists Bayesian Filtering Sandbox Untreated s Viruses Trojans Spyware Spam Phishing Clean s

What is Symantec Hosted Security? ‘In The Cloud’ Security-as-a-Service

Procurement Deployment Testing Performance Tuning Policy Administration Capacity Planning High Availability Patching Upgrades Management Overhead Eliminate On-Site Infrastructure Messaging Web Management Traffic Shaping AV / AS / Content Filtering High Availability Management AV / AS / Content Filtering High Availability HQ OfficeBranch Office #1 Branch Office #2… Messaging Web AV / AS / Content Filtering High Availability AV / AS / Content Filtering High Availability Messaging Web AV / AS / Content Filtering High Availability AV / AS / Content Filtering High Availability IT Admin Policy Administration Management Simplified

Advantages of Hosted Services 25 Defense in depth with multiple scanning engines Multi-protocol protection across , Web, and IM Enforce Acceptable Use Policies and limit data loss Affordable, predictable costs managed as OPEX Virtually eliminates the need for hardware and software Block threats before they reach your network Reduce Risk Lower TCO and Simplify Management Increase Confidence Industry-leading Service Level Agreement (SLA) 24 / 7 support delivered by dedicated specialists Highly scalable, reliable, and energy efficient

Leonard Sim Client Services Manager – South Asia