SR B25 Symantec.cloud Security Solutions: Expert Insights into , Web, Endpoint and IM Security Best Practices
|
|
- Philip Sutton
- 6 years ago
- Views:
Transcription
1 SR B25 Symantec.cloud Security Solutions: Expert Insights into , Web, Endpoint and IM Security Best Practices Ronald Poserina Director, Systems Engineering SR B25: Symantec.cloud Security Solutions 1
2 Session Agenda 1 The Challenges of Managing IT 2 Latest Trends from the Threat Landscape 3 The Symantec.cloud Solution 4 Recommendations and Best Practice 5 Q&A 2
3 The Security Challenges 3
4 IT Pressure with Managing Security Being asked to do more with less Upgrades, Patching & Maintenance of current solutions Investing in new technology to address changing business requirements Keeping up with the threat landscape Demand to support more devices Mobile workforce Protection that follows the user 4
5 Challenges with a Multiple Vendor Approach Juggling multiple vendor relationships Inability to reduce costs through bundling Multiple products to manage Differing platforms and technologies to support and learn Technical support 5
6 The Threat Landscape 6
7 Global Intelligence Network Identifies more threats, takes action faster & prevents impact Calgary, Alberta Dublin, Ireland San Francisco, CA Mountain View, CA Culver City, CA Austin, TX Pune, India Chengdu, China Chennai, India Taipei, Taiwan Tokyo, Japan Worldwide Coverage Global Scope and Scale Rapid Detection 24x7 Event Logging Attack Activity 240,000+ sensors 200+ countries and territories Malware Intelligence 135M+ systems monitored 11 security response centers Vulnerabilities 50,000+ vulnerabilities 15,000+ vendors 105,000+ technologies Spam/Phishing 5M+ decoy accounts 8B+ messages/day 1B+ web requests/day Preemptive Security Alerts SR B25: Symantec.cloud Security Solutions Information Protection Threat Triggered Actions SYMANTEC VISION
8 Malicious Attacks Are Growing 2011 Statistics from v17 Symantec ISTR 5.5B Attacks blocked by Symantec +81% 403M Unique Variants of Malware +41% 4,597 Web Attacks per Day +36% 4,989 New Vulnerabilities -20% 8 Zero-Day Vulnerabilities -43% 315 New Mobile Vulnerabilities +93% 75% Spam rate -34% 8
9 Which Website is More Dangerous? 9
10 Most Harmful Websites by Categories 10
11 Social Media Changes Everything 11
12 12 SYMANTEC VISION 2012
13 President s 13 Forum and WSML 2012 SYMANTEC VISION 2012
14 Advanced Targeted Attacks Your Assumptions are Wrong 14
15 Dispelling Assumptions about Targeted Attacks Only Large Organizations are Targets 50% are against 2,500 or larger 17% are targeted at 250 or less Only Gov t or Defense Sectors are Targets 70% of targeted are against other sectors Only CEO s or Senior Managers are Targets 58% of people targeted are non-execs Most targeted people are in sales, PR, HR 15
16 That s where we come in 16
17 Our Goal: Simplify IT & Increase Your Security Posture Management Traffic Shaping AV / AS / Content High Availability HQ Office Branch Office #1 Branch Office #2 Messaging Web Filtering AV / AS / Content Filtering High Availability Messaging AV / AS / Content Filtering High Availability Messaging Management AV / AS / Content Filtering Web Web High Availability Endpoint Security AV / AS / Content High Availability Filtering AV / AS / Content High Availability Filtering Centralized Management Server High Availability Management Overhead Simplified Procurement Performance Tuning High Availability Deployment Policy Administration Patching IT Admin Testing Capacity Planning Upgrades SR B25: Symantec.cloud Security Solutions SYMANTEC VISION
18 Benefits of Symantec.cloud Easy to deploy/manage Subscription pricing Little or no software Integrated solutions Automatic updates Market leading SLA s Easy to scale 24 x 7 support 18
19 Symantec.cloud Security Solutions Security.cloud AntiVirus AntiSpam Image Control Content Control Encryption.cloud Boundary Encryption (TLS) Policy Based Encryption (Push/Pull) IM Security.cloud Endpoint Protection.cloud Back-up Exec.cloud Web Security.cloud AntiVirus & AntiSpyware URL & Content Filtering Roaming User Protection Enterprise Vault.cloud 19
20 Global Infrastructure = Greater Visibility and Protection Incorporating 17 data centers spanning four continents Every data center is scalable and secured to the highest standards (ISO27001/SAS70II/ISAE 3402) Clustered high performance servers, each cluster has full redundancy 20
21 Identifying more threats, taking action faster & preventing impact Relevant Global Expertise Billions of connections and Web requests/week Accurate In-depth Analysis Zero hour protection IT Policies and Controls Skeptic Multi-protocol Converged Threat Protection Threat intelligence shared across , Web, and IM Security.cloud Web Security.cloud Instant Messaging Security.cloud SR B25: Symantec.cloud Security Solutions SYMANTEC VISION
22 Security.cloud AntiVirus & AntiSpam Skeptic Capabilities Malware DNA Phishing/Fraud Detection Targeted Attack Detection Binary Analysis Start-up Code Analysis Obfuscation/Encryption Known Security Vulnerabilities Spam Detection Rules Image Composition Analysis Link Following SR B25: Symantec.cloud Security Solutions SYMANTEC VISION
23 Policy Based Encryption.cloud Service for Key Features Scans against user policy and automatically encrypts sensitive s Fully hosted service, including management of digital certificates and encryption keys Wide range of delivery mechanisms Support for mobile platforms Secure reply and compose capabilities Read receipts automatically forwarded to senders Can be combined with Symantec.cloud Security services 23
24 How it Works - Delivery NO Encryption Platform PLAIN TEXT MIME MESSAGE Encryption Required? YES Encryption Key Found? YES NO ENCRYPTED S/MIME MESSAGE TLS Mail Server ENCRYPTED S/MIME (via web browser) Secure Mail Portal SIGNED NOTIFICATION Symantec.cloud Content Control Encryption platform SR B25: Symantec.cloud Security Solutions SYMANTEC VISION
25 Policy Based Encryption.cloud Recipient Interface Read the Secure Message SR B25: Symantec.cloud Security Solutions SYMANTEC VISION
26 Web Security.cloud Protect and Control Internet Access 26
27 Protecting the Mobile Workforce Smart Connect for Web Security.cloud Seamlessly logs in users in a variety of network environments Ideal for road-warrior users and frequent travelers Enforces policies and protects users as if they were inside your corporate LAN Runs as an agent on the endpoint. Data center Home Offices Public Wi-Fi Hotspots; Pay-for-use portals Corporate LAN & Regional Offices 27
28 Instant Messaging Security.cloud Key Features: Protects against viruses transmitted via UC and public IM Malicious URL detection Intuitive policy building capability including multiple rule stacking Logs message transcripts Secure directory synchronization Dashboard, summary, detailed and scheduled reporting Configurable and customizable system notifications 28
29 Endpoint Protection.cloud Comprehensive protection for your systems (AV, AS, Smart Firewall & IPS) Always-on protection for endpoints Web-based management console Security audit & customizable reporting Automatic definition updates and automatic software upgrades 29
30 ClientNet: Simple Yet Powerful 30
31 ClientNet Management Portal 31
32 ClientNet Benefits Consolidated view of all of your solutions Robust Tracing Tools Feature rich reporting Granular policy creation with directory integration Access & Manage your solutions from anywhere Ability to create users with differing levels of access Technical Support / Documentation / Help 32
33 Partner Management Management console for partners to manage multiple customers Trial Setup Reporting Configuration Presentation Identifier Goes Here SYMANTEC VISION
34 Industry Leading Service Level Agreements AntiSpam effectiveness Spam false positive rate AntiVirus false positive rate Service Availability Web Service Availability SLA 99% % SLA % % SLA % % SLA 100% 100% SLA 100% 100% Performance Service Level Agreement Performance: August 2011 to January 2012 SR B25: Symantec.cloud Security Solutions SYMANTEC VISION
35 Target Jan-09 Feb Mar April May June July Aug Sept Oct Nov Dec Jan-10 Feb Mar April May June July Aug Sept Support: Complementary AND top rated 24/7 97% Telephone, Portal & support 97% 97% 94% 96% 97% 93% 96% 93% 94% 95% 94% 94% 95% 96% 96% 96% 94% 97% 96% 96% 96% 97% Support Ticket Satisfaction Knowledgeable 1st & 2nd line support to actively manage and resolve client issues Target response times: 95% of critical issues: 2hrs 85% of major issues: 4hrs 75% of minor issues: 8hrs SR B25: Symantec.cloud Security Solutions SYMANTEC VISION
36 Benefits of SaaS for Addressing Security Protection & Control Cost Containment Staffing Reduce threats Minimize legal risk Increase productivity How to do more with less Reduce time to benefit CAPEX v OPEX Limited staffing resource Limited time to train Focus on core business SR B25: Symantec.cloud Security Solutions SYMANTEC VISION
37 Symantec.cloud: Market Leadership 10.9 million SaaS users 32,000 clients 104 Countries Leading provider of Web Security hosted services (IDC) Leader in Gartner MQ for Secure Gateway Worldwide leader in messaging security SaaS (IDC) 37
38 Recommendations and Best Practice Employ defense-in-depth strategies Antivirus on endpoints is not enough Use encryption to protect sensitive data Leverage web security solutions to enable safe interactions Include the mobile workforce in IT planning Use Data Loss Prevention to help prevent data breaches Be aggressive on your updating and patching Enforce an effective password policy Educate users on the changing threat landscape 38
39 Additional Hands On.Cloud Sessions LAB: SR L20 - Web Security.cloud Management Best Practices Monday 2:15-3:15 Room 121 LAB: SR L19 - Deep Dive: Security.cloud Management Wednesday 1:00-2:00 Room
40 Thank you! Ronald Poserina (646) Copyright 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. SR B25: Symantec.cloud Security Solutions 40
Cybercrime e minacce informatiche: trend emergenti e soluzioni innovative u
Cybercrime e minacce informatiche: trend emergenti e soluzioni innovative u Nicola D Ottavio Sales Security Specialist nicola_dottavio@symantec.com 1 On July 13, 2010 a unique form of malware was discovered
More informationSymantec Hosted Services. Eugenio Correnti / Senior Pre-Sales Consultant EMEA 1
Symantec Hosted Services Eugenio Correnti / Senior Pre-Sales Consultant EMEA 1 Agenda What is SaaS The SaaS Shift SaaS Key Objections Symantec Hosted Services Portfolio SaaS as an SLA Insurance service
More informationSecuring Your Business Against the Diversifying Targeted Attacks Leonard Sim
Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim Manager, Client & Partner Services, Asia 1 Agenda 2010 Threats Targeted Attacks Defense Against Targeted Attacks Questions 2
More informationSymantec Security.cloud
Data Sheet: Messaging Security filters unwanted messages and protects mailboxes from targeted attacks. The service has selflearning capabilities and Symantec intelligence to deliver highly effective and
More informationSymantec Protection Suite Add-On for Hosted Security
Symantec Protection Suite Add-On for Hosted Email Security Overview Malware and spam pose enormous risk to the health and viability of IT networks. Cyber criminal attacks are focused on stealing money
More informationInternet Security Threat Report Volume XIII. Patrick Martin Senior Product Manager Symantec Security Response October, 2008
Internet Security Threat Report Volume XIII Patrick Martin Senior Product Manager Symantec Security Response October, 2008 Agenda 1 ISTR XIII Important Facts 2 ISTR XIII Key Messages 3 ISTR XIII Key Facts
More informationTeleworking and Security: IT All Begins with Endpoints. Jim Jessup Solutions Manager, Information Risk Management June 19, 2007
Teleworking and Security: IT All Begins with Endpoints Jim Jessup Solutions Manager, Information Risk Management June 19, 2007 Agenda 1 Today s Landscape 2 Trends at the Endpoint 3 Endpoint Security 4
More informationData Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview creates a protected endpoint and messaging environment that is secure against today s complex data loss, malware, and spam threats controlling
More informationCommercial Product Matrix
PRODUCT MATRIX 1H2016 FOR INTERNAL USE ONLY Trend Micro Commercial Product Matrix SELLING TREND MICRO SECURITY SOLUTIONS Small Business or /Medium Business? < 100 Users > 100 Users Trend Micro Customer
More informationCISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1
CISCO BORDERLESS NETWORKS 2009 Cisco Systems, Inc. All rights reserved. 1 Creating New Business Models The Key Change: Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/
More informationSecuring Your Environment with Dell Client Manager and Symantec Endpoint Protection
Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection Altiris, Now Part of Symantec Copyright 2007 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,
More informationMobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management
Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management June 29, 2011 1 Forward-Looking Statements This presentation
More informationEM L01 Introduction to Mobile
EM L01 Introduction to Scott Jareo Principal Field Enablement Mgr. 1 Agenda 1 Welcome and Introduction 2 Overview 3 Lab Exercises 4 Resources and Conclusion 2 Leading Concerns In Enterprise Mobility Discussions
More informationEU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux
EU GENERAL DATA PROTECTION: TIME TO ACT Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux Is this the WAY you handle GDPR today 2 3 area s to consider
More informationGet BitDefender Client Security 2 Years 30 PCs software suite ]
Get BitDefender Client Security 2 Years 30 PCs software suite ] Description: The foundation of business security The security requirements for any new or existing company no matter how large or small -
More informationPrevent and Detect Malware with Symantec Advanced Threat Protection: Network
WHITE PAPER: SYMANTEC ADVANCED THREAT PROTECTION........................................ Prevent and Detect Malware with Symantec Advanced Threat Protection: Network Who should read this paper This white
More informationSymantec Endpoint Protection
Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec Insight and by SONAR, a single,
More informationService Description VMware Workspace ONE
VMware Workspace ONE Last Updated: 05 April 2018 The product described in this Service Description is protected by U.S. and international copyright and intellectual property laws. The product described
More informationAngelo Gentili Head of Business Development, EMEA Region, PartnerNET
Angelo Gentili Head of Business Development, EMEA Region, PartnerNET The Innovation Solution in the Business Security Field. PartnerNet introduces Seqrite Welcome To Dynamic. Scalable. Future-Ready. Why
More informationMicrosoft Security Management
Microsoft Security Management MICROSOFT SECURITY MANAGEMENT SECURITY MANAGEMENT CHALLENGES Some large financial services organizations have as many as 40 or more different security vendors inside their
More informationSymantec Network Access Control Starter Edition
Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access
More informationIntroducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection. Bernard Laroche Endpoint security Product marketing
Introducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection Bernard Laroche Endpoint security Product marketing Agenda 1 Organizational Risk and Endpoint Challenges 32 Symantec Endpoint
More informationExtending Enterprise Security to Public and Hybrid Clouds
Extending Enterprise Security to Public and Hybrid Clouds Juniper Security for an Ever-Evolving Market Challenge Enterprises are migrating toward public or hybrid clouds much faster than expected, creating
More informationSymantec Security Monitoring Services
24x7 real-time security monitoring and protection Protect corporate assets from malicious global threat activity before it impacts your network. Partnering with Symantec skilled and experienced analysts
More informationSymantec Endpoint Protection 12
Symantec Endpoint Protection 12 Hundreds of Millions of New Pieces of Malware Mean You Have to Do Things Differently Graham Ahearne, Marcus Brownell Product Management 1 Agenda 1 2 3 Challenges How Symantec
More informationSymantec To Acquire VeriSign s Identity and Authentication Business. May 19, 2010
Symantec To Acquire VeriSign s Identity and Authentication Business May 19, 2010 Forward-Looking Statements This presentation contains forward-looking statements within the meaning of U.S. federal securities
More informationSYMANTEC DATA CENTER SECURITY
SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information
More informationSymantec Endpoint Protection Integration Component User's Guide. Version 7.0
Symantec Endpoint Protection Integration Component User's Guide Version 7.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms
More informationWITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:
SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE Protecting your business assets and sensitive data requires regular vulnerability assessment,
More informationSophos. Allan Widell Channel Account Executive. 24. August 2017
Sophos Allan Widell Channel Account Executive 24. August 2017 Our Differentiated Model Focus on mid-market enterprises: over 50% of IT security market Complete, advanced, and highly effective security
More informationThe Device Has Left the Building
The Device Has Left the Building Mobile Security Made Easy With Managed PKI Christian Brindley Principal Systems Engineer, Symantec Identity and Information Protection Agenda 1 2 3 Mobile Trends and Use
More informationSymantec Network Access Control Starter Edition
Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationSophos Central for partners and customers: overview and new features. Jonathan Shaw Senior Product Manager, Sophos Central
Sophos Central for partners and customers: overview and new features Jonathan Shaw Senior Product Manager, Sophos Central What is Sophos Central? Partner Dashboard Admin Self Service Allows Partners to
More informationSymantec Network Access Control Starter Edition
Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationFuture Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group
Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies
More informationMcAfee epolicy Orchestrator
McAfee epolicy Orchestrator Centrally get, visualize, share, and act on security insights Security management requires cumbersome juggling between tools and data. This puts the adversary at an advantage
More informationOUR SECURITY DELIVERED YOUR WAY
M200 OUR SECURITY DELIVERED YOUR WAY U.S. Sales: 1.800.734.9905 International Sales: 1.206.613.0895 Web: www.watchguard.com WatchGuard Technologies, Inc. Partner with WatchGuard It s Just Easy Everything
More informationData Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement
Simplified endpoint enforcement Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationPiero DePaoli, Director, Product Marketing Scott Sawoya, Senior Manager, Product Management. SR B19: Symantec Endpoint Protection 12 Customer Panel
SR B19: Symantec Endpoint Protection 12 Customer Panel Piero DePaoli, Director, Product Marketing Scott Sawoya, Senior Manager, Product Management 1 Panelists Jeff Marsh Christian Sosa David Nguyen Presentation
More informationOn-Premise, Cloud, Or Managed Service. Making The Most Of Information Management Technology & People
On-Premise, Cloud, Or Managed Service Making The Most Of Information Management Technology & People Steffen Low Vice President, Symantec Business Critical Services Matthew Edwards President & Global CTO,
More informationSymantec Endpoint Protection 14
Symantec Endpoint Protection Cloud Security Made Simple Symantec Endpoint Protection 14 Data Data Sheet: Sheet: Endpoint Endpoint Security Security Overview Last year, we saw 431 million new malware variants,
More informationSymantec & Blue Coat Technical Update Webinar 29. Juni 2017
Avantec Blue Coat/Symantec Webinar Jean Marc Edder Senior Systems Engineer The Global Leader in Cyber Network + + Cloud Global market leader in Endpoint, Email, Data Loss Prevention and Website, User Authentication
More informationCYBER SECURITY. formerly Wick Hill DOCUMENT* PRESENTED BY I nuvias.com/cybersecurity I
DOCUMENT* PRESENTED BY CYBER SECURITY formerly Wick Hill * Nuvias and the Nuvias logo are trademarks of Nuvias Group. Registered in the UK and other countries. Other logo, brand and product names are trademarks
More informationSOLUTION MANAGEMENT GROUP
InterScan Messaging Security Virtual Appliance 8.0 Reviewer s Guide February 2011 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 www.trendmicro.com
More informationKaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia
Kaspersky Cloud Security for Hybrid Cloud Diego Magni Presales Manager Kaspersky Lab Italia EXPERTISE 1/3 of our employees are R&D specialists 323,000 new malicious files are detected by Kaspersky Lab
More informationTREND MICRO SMART PROTECTION SUITES
SOLUTION BROCHURE TREND MICRO SMART ROTECTION SUITES Maximum endpoint security from your proven security partner Get smarter security that goes where your users go The threat landscape is constantly changing,
More informationDiscover threats quickly, remediate immediately, and mitigate the impact of malware and breaches
Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches Introduction No matter how hard you work to educate your employees about the constant and evolving threats
More informationAt a Glance: Symantec Security.cloud vs Microsoft O365 E3
At a Glance: Symantec Email Security.cloud vs Microsoft O365 E3 Microsoft O365 E3 Security as a Feature Symantec Email Security.cloud Why This Is Important Spam Protection Third-party blacklists subscribed
More informationTREND MICRO SMART PROTECTION SUITES
SOLUTION BROCHURE TREND MICRO SMART ROTECTION SUITES Maximum Trend Micro XGen security from your proven security partner Get smarter security that goes where your users go The threat landscape is constantly
More informationGSX 365 Usage Usage & Compliance Reporting Collect, Analyze & Anticipate
GSX 365 Usage Usage & Compliance Reporting Collect, Analyze & Anticipate 1 About GSX Solutions Founded in 1996, Headquartered in Switzerland Offices in USA, UK, France, Switzerland, China 600 customers
More informationFuture-ready security for small and mid-size enterprises
First line of defense for your network Quick Heal Terminator (UTM) (Unified Threat Management Solution) Data Sheet Future-ready security for small and mid-size enterprises Quick Heal Terminator is a high-performance,
More informationSecuring the Modern Data Center with Trend Micro Deep Security
Advania Fall Conference Securing the Modern Data Center with Trend Micro Deep Security Okan Kalak, Senior Sales Engineer okan@trendmicro.no Infrastructure change Containers 1011 0100 0010 Serverless Public
More informationChristopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud
Christopher Covert Principal Product Manager Enterprise Solutions Group Copyright 2016 Symantec Endpoint Protection Cloud THE PROMISE OF CLOUD COMPUTING We re all moving from challenges like these Large
More informationVendor: Cisco. Exam Code: Exam Name: Cisco Sales Expert. Version: Demo
Vendor: Cisco Exam Code: 646-206 Exam Name: Cisco Sales Expert Version: Demo QUESTION 1 What are three current business factors that are influencing customer decisions in making technology investments?
More informationEnterprise Security Solutions by Quick Heal. Seqrite.
Enterprise Security Solutions by Quick Heal Seqrite Infinite Devices. One Unified Solution. A simple yet powerful solution, Seqrite is a unified platform for managing and monitoring multiple mobile devices
More informationNetDefend Firewall UTM Services
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860/1660/2560/2560G) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content
More informationBETTER Mobile Threat Defense (BMTD)
BETTER Mobile Threat Defense (BMTD) Powered by BETTER Mobile Security, Inc. Enterprise Challenges Today s enterprise IT managers are looking for better and more efficient ways to empower workforces utilizing
More informationDefense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation
Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client
More informationJoe Stocker, CISSP, MCITP, VTSP Patriot Consulting
Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting Microsoft Cloud Evangelist at Patriot Consulting Principal Systems Architect with 17 Years of experience Technical certifications: MCSE, MCITP Office
More informationGreen IT: Start Saving Money
Green IT: Start Saving Money Start Saving Money on Energy Many data centers face an energy shortage & out-of-control energy costs The average enterprise pays $21M-$27M/year for data center electricity
More informationClientNet Admin Guide. Boundary Defense for
ClientNet Admin Guide Boundary Defense for Email DOCUMENT REVISION DATE: Feb 2012 ClientNet Admin Guide / Table of Contents Page 2 of 36 Table of Contents OVERVIEW... 3 1 INTRODUCTION... 3 1.1. AUDIENCE
More informationCheck Point softwareblades Secure. Flexible. Simple
Check Point softwareblades Secure. Flexible. Simple Ari Tarvainen Country Manager Baltic & Finland Agenda Who are we? The security challenge Introducing Software Blades Software Blades Offering Summary
More informationTechValidate Survey Report: SaaS Application Trends and Challenges
TechValidate Survey Report: SaaS Application Trends and Challenges TechValidate Survey Report: SaaS Application Trends and Challenges 2 The current growth rates and investments in SaaS are astounding.
More informationEnterprise Security Solutions by Quick Heal. Seqrite.
Enterprise Security Solutions by Quick Heal Seqrite Infinite Devices. One Unified Solution. A simple yet powerful solution, Seqrite is a unified platform for managing and monitoring multiple mobile devices
More informationAgenda. Today s IT Challenges. Symantec s Collaborative Architecture. Symantec TM Endpoint Management Suite. Connecting Symantec Technologies Today
Agenda 1 Today s IT Challenges 2 Symantec s Collaborative Architecture 3 Symantec TM Endpoint Management Suite 4 Connecting Symantec Technologies Today 5 Q & A 1 Traditional Protection isn t Good Enough
More informationSymantec Endpoint Protection
The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,
More informationProduct Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd
Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd Symantec Endpoint Protection Product Roadmap 1 Safe Harbor Disclaimer Any information regarding pre-release Symantec offerings,
More informationTechnical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems
Technical Overview of in Windows 7 and Windows Server 2008 R2 Microsoft Windows Family of Operating Systems Published: January 2009 This document supports a preliminary release of a software product that
More informationBeyond Your Device. Control, Connect, Experience. BT GS Analyst and consultant call 2 July 2013
Beyond Your Device Control, Connect, Experience BT GS Analyst and consultant call 2 July 2013 Agenda Welcome & situation in the market Neil Sutton, Vice President Portfolio Our solution Connect Jayne Smith,
More informationfor businesses with more than 25 seats
for businesses with more than 25 seats ESET Business Solutions 1/6 Whether your business is just starting out or is established, there are a few things that you should expect from the software you use
More informationCisco s Appliance-based Content Security: IronPort and Web Security
Cisco s Appliance-based Content Security: IronPort E-mail and Web Security Hrvoje Dogan Consulting Systems Engineer, Security, Emerging Markets East 2010 Cisco and/or its affiliates. All rights reserved.
More informationCisco Security: Advanced Threat Defense for Microsoft Office 365
Cisco Email Security: Advanced Threat Defense for Microsoft Office 365 Microsoft Office 365 has become the standard productivity platform in organizations large and small around the world. It is a cost-effective
More informationMicrosoft Office 365 TM & Zix Encryption
Microsoft Office 365 TM & Zix Email Encryption A Natural Fit www.zixcorp.com INTRODUCTION IT managers and decision makers are being pressured from all sides to find ways to safely migrate to cloud-based
More informationDelivering Integrated Cyber Defense for the Cloud Generation Darren Thomson
Delivering Integrated Cyber Defense for the Generation Darren Thomson Vice President & CTO, EMEA Region Symantec In 2009 there were 2,361,414 new piece of malware created. In 2015 that number was 430,555,582
More informationSymantec Enterprise Security Manager JRE Vulnerability Fix Update Guide
Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide 2 Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide The software described in this book is furnished under
More informationBlock Threats Before They Reach Your Network Make Downtime a Thing of the Past. Comprehensive and reliable protection
SecureSMART Block Email Threats Before They Reach Your Network Make Downtime a Thing of the Past. Comprehensive and reliable email protection SecureSMART protects your network from viruses, spam, advanced
More informationDocker Universal Control Plane Deploy and Manage On-Premises, Your Dockerized Distributed Applications
Technical Brief Docker Universal Control Plane Deploy and Manage On-Premises, Your Dockerized Distributed Applications As application teams deploy their Dockerized applications into production environments,
More informationCompare Security Analytics Solutions
Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch
More informationCisco ISR G2 Management Overview
Cisco ISR G2 Management Overview Introduction The new Cisco Integrated Services Routers Generation 2 (ISR G2) Family of routers delivers the borderless network that can transform the branch office and
More informationNETWORKING &SECURITY SOLUTIONSPORTFOLIO
NETWORKING &SECURITY SOLUTIONSPORTFOLIO NETWORKING &SECURITY SOLUTIONSPORTFOLIO Acomprehensivesolutionsportfoliotohelpyougetyourbusiness securelyconnected.clickononeofoursolutionstoknowmore NETWORKING
More informationCisco SD-WAN. Intent-based networking for the branch and WAN. Carlos Infante PSS EN Spain March 2018
Cisco SD-WAN Intent-based networking for the branch and WAN Carlos Infante PSS EN Spain March 2018 Aug-12 Oct-12 Dec-12 Feb-13 Apr-13 Jun-13 Aug-13 Oct-13 Dec-13 Feb-14 Apr-14 Jun-14 Aug-14 Oct-14 Dec-14
More informationSymantec Reference Architecture for Business Critical Virtualization
Symantec Reference Architecture for Business Critical Virtualization David Troutt Senior Principal Program Manager 11/6/2012 Symantec Reference Architecture 1 Mission Critical Applications Virtualization
More informationConnected Experiences
Connected Experiences 2017 Bio 7 years at Cisco Meraki Security / SD-WAN / Analytics / SP Launched MX in 2011 500M firewalls and counting Before, PM @ Dell (Wyse) Landscape Connected Experiences Applications
More informationSymantec Enterprise Solution Product Guide
SOLUTION BRIEF: SYMANTEC ENTERPRISE SOLUTION PRODUCT GUIDE........................................ Symantec Enterprise Solution Product Guide Who should read this paper Businesses participating in the
More informationSymantec Client Security. Integrated protection for network and remote clients.
Symantec Client Security Integrated protection for network and remote clients. Complex Internet threats require comprehensive security. Today's complex threats require comprehensive security solutions
More informationIBM Internet Security Systems Proventia Management SiteProtector
Supporting compliance and mitigating risk through centralized management of enterprise security devices IBM Internet Security Systems Proventia Management SiteProtector Highlights Reduces the costs and
More informationComprehensive Endpoint Security. Chris Quinn Systems Engineer March 24, 2009
Comprehensive Endpoint Security Chris Quinn Systems Engineer March 24, 2009 Agenda 1 Today s Security Challenges 2 Symantec Endpoint Protection, NAC, and Open Collaborative Architecture 3 Why Symantec?
More informationSOLUTION BRIEF. RiskSense Platform. RiskSense Platform the industry s most comprehensive, intelligent platform for managing cyber risk.
RiskSense Platform RiskSense Platform the industry s most comprehensive, intelligent platform for managing cyber risk. 27 RiskSense, Inc. Executive Summary The RiskSense Platform is a Software-as-a-Service
More informationComodo cwatch Web Security Software Version 1.0
rat Comodo cwatch Web Security Software Version 1.0 Webhost Reseller Guide Guide Version 1.0.121916 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo
More informationIM-B23: What s New with NetBackup Appliances
IM-B23: What s New with NetBackup Appliances Scott Anderson, Greg Nuss, Peter Elliman NetBackup Product Management Symantec NetBackup Appliances 1 Disclaimer: This presentations contains information about
More informationRSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief
RSA Solution Brief The RSA Solution for VMware View: Managing Securing the the Lifecycle Virtual of Desktop Encryption Environment Keys with RSA Key Manager RSA Solution Brief 1 According to the Open Security
More informationCisco Start. IT solutions designed to propel your business
Cisco Start IT solutions designed to propel your business Small and medium-sized businesses (SMBs) typically have very limited resources to invest in new technologies. With every IT investment made, they
More informationBlock Threats Before They Reach Your Network Make Downtime a Thing of the Past. Comprehensive and reliable protection
SecureSMART Block Email Threats Before They Reach Your Network Make Downtime a Thing of the Past. Comprehensive and reliable email protection SecureSMART protects your network from viruses, spam, advanced
More informationIC B01: Internet Security Threat Report: How to Stay Protected
IC B01: Internet Security Threat Report: How to Stay Protected Piero DePaoli Director, Product Marketing IC B01: Internet Security Threat Report: How to Stay Protected 1 Topics 1 Targeted Attacks 2 Spam
More informationAKAMAI CLOUD SECURITY SOLUTIONS
AKAMAI CLOUD SECURITY SOLUTIONS Whether you sell to customers over the web, operate data centers around the world or in the cloud, or support employees on the road, you rely on the Internet to keep your
More informationSymantec Endpoint Protection 11.0
OVERVIEW Symantec Endpoint Protection replaces Symantec AntiVirus Corporate Edition, Symantec Client Security, Symantec Sygate Enterprise protection and Confidence Online for PCs. Symantec Endpoint Protection
More informationThe Cloud Identity Crisis
The Cloud Identity Crisis Strategies for Identity-based Access Control for Cloud Applications Marty Jost Symantec Product Marketing Jim Brigham O3 Product Management 1 Agenda Cloud Customer Experiences
More informationThe Evolution of Data Center Security, Risk and Compliance
#SymVisionEmea #SymVisionEmea The Evolution of Data Center Security, Risk and Compliance Taha Karim / Patrice Payen The Adoption Curve Virtualization is being stalled due to concerns around Security and
More informationBest Practices in Securing a Multicloud World
Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers
More informationThe Convergence of Management and Security. Stephen Brown, Sr. Product Manager December 2008
The Convergence of Management and Security Stephen Brown, Sr. Product Manager December 2008 Agenda 1 A Robust Management Foundation 2 The Value of Security and Management Convergence 3 Symantec Endpoint
More information