Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1
Agenda 2 What’s being done now? There is a new risk The new approach
Top Information Security Concerns Protection and Control Cost Containment Staffing Keep threats out Control sensitive data Enforce compliance Do more with less Quicker time to benefit CAPEX v OPEX Limited staff, expertise Innovation vs. managing infrastructure
Evolving Threat Landscape 90% of breaches in 2009 involved organized crime targeting corporate information 90% of all traffic is spam and the Web has become the primary vector for malware delivery 11x increase in unique malware samples in the last two years seen by Symantec
Sophistication of high end threats is evolving rapidly Continued growth in targeted threats which attack specific companies, persons or systems Evolving Threat Landscape New “Zero Hour” Threats continue to increase New malicious code signatures Driven by: Increase in new threats leading to failure of traditional signature based protection Readily available malware toolkits Specialization of highly skilled participants Huge sums of money $£¥€
It was annoying once….
It’s now malicious
What are they attempting to do. Incursion Discovery & Capture Extraction
Attacks Are Becoming More Complex Fraudulent IM with Web Link Compromised Website Hosting Malware Spoofed with Web Link Comprehensive Protection Needed Across , Web, and IM
You Can’t See It BUT It’s There 10
New Web Threats
Facebook Delivered Viruses
Point solutions leave gaps – multi-protocol converged threat analysis and unrivaled accuracy are essential Early warning systems were built for the old style mass mailing viruses not targeted attacks or smaller attacks from thousands of attackers A new threat landscape requires a different approach 90 % Of all breaches are now driven by highly resourced organized criminals 2008: total market value of illegally obtained corporate data $600B - $1T
What’s being done now? 14
How Flows To Your Company Sender Client Server Client Server Recipient
Traditional Security Server DNS Client Server DNS Client Recipient Mail FlowATTACKS! Sender
What happens inside… Traditional Security s will have to be received by the device to be processed – Wasted resources and bandwidth Majority Signature Based – Most use the same signatures as their desktop AV products Some have IP reputation filtering – White listing/black listing based on IP address only Will rely on updates by the vendor to keep up to date – Window of vulnerability, time taken for updates to be developed and delivered Will have to increase physical resources once volume of mail increases
The New Approach 18
Filtration Sedimentation Slow Sand Filters Activated Sludge Flocculation Chlorination Electromagnetic Radiation Suspended Particles Parasites Bacteria Algae Viruses Fungi Are these terms familiar?
How Water Flows To Your Home Reservoir Home Filtration Sedimentation Slow Sand Filters Activated Sludge Flocculation Chlorination Electromagnetic Radiation Untreated Water Suspended Particles Parasites Bacteria Algae Viruses Fungi Clean Water
DNS Block Lists Signature Heuristics Traffic Shaping White Lists Black Lists Bayesian Filtering Sandbox Viruses Trojans Spyware Spam Phishing Are these terms familiar?
How Hosted Scanning Works Sender Client Server Client Server Recipient MessageLabs Data Centre Internet DNS Block Lists Signaturing Heuristics Traffic Shaping White Lists Black Lists Bayesian Filtering Sandbox Untreated s Viruses Trojans Spyware Spam Phishing Clean s
What is Symantec Hosted Security? ‘In The Cloud’ Security-as-a-Service
Procurement Deployment Testing Performance Tuning Policy Administration Capacity Planning High Availability Patching Upgrades Management Overhead Eliminate On-Site Infrastructure Messaging Web Management Traffic Shaping AV / AS / Content Filtering High Availability Management AV / AS / Content Filtering High Availability HQ OfficeBranch Office #1 Branch Office #2… Messaging Web AV / AS / Content Filtering High Availability AV / AS / Content Filtering High Availability Messaging Web AV / AS / Content Filtering High Availability AV / AS / Content Filtering High Availability IT Admin Policy Administration Management Simplified
Advantages of Hosted Services 25 Defense in depth with multiple scanning engines Multi-protocol protection across , Web, and IM Enforce Acceptable Use Policies and limit data loss Affordable, predictable costs managed as OPEX Virtually eliminates the need for hardware and software Block threats before they reach your network Reduce Risk Lower TCO and Simplify Management Increase Confidence Industry-leading Service Level Agreement (SLA) 24 / 7 support delivered by dedicated specialists Highly scalable, reliable, and energy efficient
Leonard Sim Client Services Manager – South Asia