Download presentation
Presentation is loading. Please wait.
Published byGeorgina Briggs Modified over 9 years ago
1
A New Security Blueprint Shantanu Ghosh Vice President, Enterprise Security & India Product Operations
2
On July 13, 2010 a unique form of malware was discovered that was attempting to take control of industrial infrastructure around the world... THREAT
3
SCADA Stuxnet Stealthy malware Propagates through USB drives Exploits 4 zero-day vulnerabilities
4
Challenges Sophisticated Attackers Hydraq or “Google attacks”, ShadowNet, Zeus Shift in nature of threats 62623 distinct bot-infected computers in India in ’09 India ranks high for viruses, worms and trojans
5
Poorly Enforced IT Policies Challenges Explosion of Information 50% Growth Structured Unstructured Costs Unsecured information is a liability Growth of unstructured data pegged at over 60% per year Total volume of digital information to reach 1,773 exabytes by 2011
6
Challenges Complex Heterogeneous Infrastructure Multiple vendor and device environment Consumerization of IT and the increasing use of employee-owned endpoints Need for actionable intelligence 1 bn mobile devices will access internet by end of yr Over 3 mn iPads sold till June 2010
7
Poorly Managed Systems Challenges Cost of a Data Breach Competition, compliance and credibility black hole All Indian enterprises surveyed lost revenue due to cyber attacks Average enterprise is exploring 17 standards and frameworks Cost of a data breach $204 per compromised record 50 % information residing in enterprises is sensitive
8
Symantec Enterprise Vision and Strategy Consumerization of IT Partners Employees Customers Society Social Mobile Cloud & Virtualization New Demands of a Connected Enterprise
9
Organiz ed Criminal Malici ous Insider Organiz ed Crimina l Malicio us Insider Risk Based and Policy Driven Information Centric Information Centric Actionable Intelligence A Holistic Information Approach to Security Well Managed Infrastructure
10
The Information-Centric Model Symantec Enterprise Vision and Strategy Classification Ownership Threats Discovery Encryption Compliance Reporting Remediation Policy Identity
11
Poorly Managed Systems Thank You Shantanu_Ghosh@symantec.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.