Download presentation
Presentation is loading. Please wait.
Published byMarcia Hudson Modified over 9 years ago
1
Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1
2
Agenda 2 What’s being done now? There is a new risk The new approach
3
Top Information Security Concerns Protection and Control Cost Containment Staffing Keep threats out Control sensitive data Enforce compliance Do more with less Quicker time to benefit CAPEX v OPEX Limited staff, expertise Innovation vs. managing infrastructure
4
Evolving Threat Landscape 90% of breaches in 2009 involved organized crime targeting corporate information 90% of all email traffic is spam and the Web has become the primary vector for malware delivery 11x increase in unique malware samples in the last two years seen by Symantec
5
Sophistication of high end threats is evolving rapidly Continued growth in targeted threats which attack specific companies, persons or systems Evolving Threat Landscape New “Zero Hour” Threats continue to increase New malicious code signatures Driven by: Increase in new threats leading to failure of traditional signature based protection Readily available malware toolkits Specialization of highly skilled participants Huge sums of money $£¥€
6
It was annoying once….
7
It’s now malicious
8
What are they attempting to do. Incursion Discovery & Capture Extraction
9
Attacks Are Becoming More Complex Fraudulent IM with Web Link Compromised Website Hosting Malware Spoofed Email with Web Link Comprehensive Protection Needed Across Email, Web, and IM
10
You Can’t See It BUT It’s There 10
11
New Web Threats
12
Facebook Delivered Viruses
13
Point solutions leave gaps – multi-protocol converged threat analysis and unrivaled accuracy are essential Early warning systems were built for the old style mass mailing viruses not targeted attacks or smaller attacks from thousands of attackers A new threat landscape requires a different approach 90 % Of all breaches are now driven by highly resourced organized criminals 2008: total market value of illegally obtained corporate data $600B - $1T
14
What’s being done now? 14
15
How Email Flows To Your Company Sender Email Client Email Server Email Client Email Server Recipient
16
Traditional Email Security Email Server DNS Email Client Email Server DNS Email Client Recipient Mail FlowATTACKS! Sender
17
What happens inside… Traditional Email Security Emails will have to be received by the device to be processed – Wasted resources and bandwidth Majority Signature Based – Most use the same signatures as their desktop AV products Some have IP reputation filtering – White listing/black listing based on IP address only Will rely on updates by the vendor to keep up to date – Window of vulnerability, time taken for updates to be developed and delivered Will have to increase physical resources once volume of mail increases
18
The New Approach 18
19
Filtration Sedimentation Slow Sand Filters Activated Sludge Flocculation Chlorination Electromagnetic Radiation Suspended Particles Parasites Bacteria Algae Viruses Fungi Are these terms familiar?
20
How Water Flows To Your Home Reservoir Home Filtration Sedimentation Slow Sand Filters Activated Sludge Flocculation Chlorination Electromagnetic Radiation Untreated Water Suspended Particles Parasites Bacteria Algae Viruses Fungi Clean Water
21
DNS Block Lists Signature Heuristics Traffic Shaping White Lists Black Lists Bayesian Filtering Sandbox Viruses Trojans Spyware Spam Phishing Are these terms familiar?
22
How Hosted Email Scanning Works Sender Email Client Email Server Email Client Email Server Recipient MessageLabs Data Centre Internet DNS Block Lists Signaturing Heuristics Traffic Shaping White Lists Black Lists Bayesian Filtering Sandbox Untreated Emails Viruses Trojans Spyware Spam Phishing Clean Emails
23
What is Symantec Hosted Security? ‘In The Cloud’ Security-as-a-Service
24
Procurement Deployment Testing Performance Tuning Policy Administration Capacity Planning High Availability Patching Upgrades Management Overhead Eliminate On-Site Infrastructure Messaging Web Management Traffic Shaping AV / AS / Content Filtering High Availability Management AV / AS / Content Filtering High Availability HQ OfficeBranch Office #1 Branch Office #2… Messaging Web AV / AS / Content Filtering High Availability AV / AS / Content Filtering High Availability Messaging Web AV / AS / Content Filtering High Availability AV / AS / Content Filtering High Availability IT Admin Policy Administration Management Simplified
25
Advantages of Hosted Services 25 Defense in depth with multiple scanning engines Multi-protocol protection across email, Web, and IM Enforce Acceptable Use Policies and limit data loss Affordable, predictable costs managed as OPEX Virtually eliminates the need for hardware and software Block threats before they reach your network Reduce Risk Lower TCO and Simplify Management Increase Confidence Industry-leading Service Level Agreement (SLA) 24 / 7 support delivered by dedicated specialists Highly scalable, reliable, and energy efficient
26
Leonard Sim Client Services Manager – South Asia lsim@messagelabs.com
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.