Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.

Similar presentations


Presentation on theme: "The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore."— Presentation transcript:

1 The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore

2 IT Security Landscape Today Market Economy for Data Attack Sophistication Shift from Hacking to Theft Threat Volume More unique / targeted attacks Sites per virus dramatic decline Enter / spread through multiple vectors Endpoint, email, web, misleading applications Morphing faster than ever E.g. command and control In 2000 5 signatures a day In 2010 25,000 signatures a day Computers People 2 Security Conference 2010_Bangalore

3 Endpoints Are Constantly Under Attack 3 Security Conference 2010_Bangalore

4 Non-traditional Endpoints Even As They Continue to Evolve 4 Traditional Endpoints IT Infrastructure V Security Conference 2010_Bangalore

5 Non-traditional Endpoints Even As They Continue to Evolve 5 Traditional Endpoints IT Infrastructure V Security Conference 2010_Bangalore

6 Non-traditional Endpoints Even As They Continue to Evolve 6 Traditional Endpoints IT Infrastructure V Security Conference 2010_Bangalore

7 Consumerization of IT Indian enterprises are encouraging employees to access, modify and disseminate information Information often stored on the cloud or in the employees own devices 59 percent of Indian enterprises believe that employee-owned endpoints compromise security Source: Symantec Enterprise Security Survey 2009. All figures are in % 7 7 Security Conference 2010_Bangalore

8 Secure & Manage All Your Endpoints 8 Control Information RISKS Reduce Information COSTS Security Conference 2010_Bangalore

9 1 Keep The Bad Things Out Let the Good Guys On 2 Keep The Good Things In 3 Cell Phone LaptopDesktop File Server Application Server Messaging Server Database Server Symantec Confidential Unified Agent Unified Management Endpoint Security Strategy 9

10 Enterprise Infrastructure Centralized ControlActionable InformationOperational Efficiency Policy ManagementEnd-to-end VisibilityProcess Automation Gateway Servers Endpoints Network Access Control Messaging Data Loss Prevention Robust Mail Security Multi-platform Support Audit Compliance Advanced Server Security Inventory & Patch Management Data Loss Prevention Complete Endpoint Protection 10 Elements of Protection Security Conference 2010_Bangalore

11 Elements of Endpoint Compliance Antivirus Antispyware Firewall Intrusion Prevention Device and Application Control Network Access Control 11 Security Conference 2010_Bangalore

12 PROTECT THE INFRASTRUCTURE PROTECT THE INFORMATION PROTECT THE INTERACTION 12 Low Hanging Fruit Approach… Security Conference 2010_Bangalore 12

13 Thank you! Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Varadarajan_kannan@symantec.com 13 Security Conference 2010_Bangalore


Download ppt "The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore."

Similar presentations


Ads by Google