Presentation is loading. Please wait.

Presentation is loading. Please wait.

Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.

Similar presentations


Presentation on theme: "Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1."— Presentation transcript:

1 Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1

2 Agenda 2 What’s being done now? There is a new risk The new approach

3 Top Information Security Concerns Protection and Control Cost Containment Staffing Keep threats out Control sensitive data Enforce compliance Do more with less Quicker time to benefit CAPEX v OPEX Limited staff, expertise Innovation vs. managing infrastructure

4 Evolving Threat Landscape 90% of breaches in 2009 involved organized crime targeting corporate information 90% of all email traffic is spam and the Web has become the primary vector for malware delivery 11x increase in unique malware samples in the last two years seen by Symantec

5 Sophistication of high end threats is evolving rapidly Continued growth in targeted threats which attack specific companies, persons or systems Evolving Threat Landscape New “Zero Hour” Threats continue to increase New malicious code signatures Driven by: Increase in new threats leading to failure of traditional signature based protection Readily available malware toolkits Specialization of highly skilled participants Huge sums of money $£¥€

6 It was annoying once….

7 It’s now malicious

8 What are they attempting to do. Incursion Discovery & Capture Extraction

9 Attacks Are Becoming More Complex Fraudulent IM with Web Link Compromised Website Hosting Malware Spoofed Email with Web Link Comprehensive Protection Needed Across Email, Web, and IM

10 You Can’t See It BUT It’s There 10

11 New Web Threats

12 Facebook Delivered Viruses

13 Point solutions leave gaps – multi-protocol converged threat analysis and unrivaled accuracy are essential Early warning systems were built for the old style mass mailing viruses not targeted attacks or smaller attacks from thousands of attackers A new threat landscape requires a different approach 90 % Of all breaches are now driven by highly resourced organized criminals 2008: total market value of illegally obtained corporate data $600B - $1T

14 What’s being done now? 14

15 How Email Flows To Your Company Sender Email Client Email Server Email Client Email Server Recipient

16 Traditional Email Security Email Server DNS Email Client Email Server DNS Email Client Recipient Mail FlowATTACKS! Sender

17 What happens inside… Traditional Email Security Emails will have to be received by the device to be processed – Wasted resources and bandwidth Majority Signature Based – Most use the same signatures as their desktop AV products Some have IP reputation filtering – White listing/black listing based on IP address only Will rely on updates by the vendor to keep up to date – Window of vulnerability, time taken for updates to be developed and delivered Will have to increase physical resources once volume of mail increases

18 The New Approach 18

19 Filtration Sedimentation Slow Sand Filters Activated Sludge Flocculation Chlorination Electromagnetic Radiation Suspended Particles Parasites Bacteria Algae Viruses Fungi Are these terms familiar?

20 How Water Flows To Your Home Reservoir Home Filtration Sedimentation Slow Sand Filters Activated Sludge Flocculation Chlorination Electromagnetic Radiation Untreated Water Suspended Particles Parasites Bacteria Algae Viruses Fungi Clean Water

21 DNS Block Lists Signature Heuristics Traffic Shaping White Lists Black Lists Bayesian Filtering Sandbox Viruses Trojans Spyware Spam Phishing Are these terms familiar?

22 How Hosted Email Scanning Works Sender Email Client Email Server Email Client Email Server Recipient MessageLabs Data Centre Internet DNS Block Lists Signaturing Heuristics Traffic Shaping White Lists Black Lists Bayesian Filtering Sandbox Untreated Emails Viruses Trojans Spyware Spam Phishing Clean Emails

23 What is Symantec Hosted Security? ‘In The Cloud’ Security-as-a-Service

24 Procurement Deployment Testing Performance Tuning Policy Administration Capacity Planning High Availability Patching Upgrades Management Overhead Eliminate On-Site Infrastructure Messaging Web Management Traffic Shaping AV / AS / Content Filtering High Availability Management AV / AS / Content Filtering High Availability HQ OfficeBranch Office #1 Branch Office #2… Messaging Web AV / AS / Content Filtering High Availability AV / AS / Content Filtering High Availability Messaging Web AV / AS / Content Filtering High Availability AV / AS / Content Filtering High Availability IT Admin Policy Administration Management Simplified

25 Advantages of Hosted Services 25 Defense in depth with multiple scanning engines Multi-protocol protection across email, Web, and IM Enforce Acceptable Use Policies and limit data loss Affordable, predictable costs managed as OPEX Virtually eliminates the need for hardware and software Block threats before they reach your network Reduce Risk Lower TCO and Simplify Management Increase Confidence Industry-leading Service Level Agreement (SLA) 24 / 7 support delivered by dedicated specialists Highly scalable, reliable, and energy efficient

26 Leonard Sim Client Services Manager – South Asia lsim@messagelabs.com


Download ppt "Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1."

Similar presentations


Ads by Google