Christopher Covert Principal Product Manager Enterprise Solutions Group Copyright 2016 Symantec Endpoint Protection Cloud
THE PROMISE OF CLOUD COMPUTING We re all moving from challenges like these Large Footprint for IT Infrastructure Physical Asset Onboarding, Tracking Desktop Support Teams Vulnerability and Patch Management IT Asset Costs and Depreciation To benefits like these Mobile Workforce Accessing Internal Tools Anywhere No physical footprint for IT Infrastructure Automatic Scaling for Applications/Services Bring Your Own Device Pay-as-you-go
SYMANTEC CLOUD WORKLOAD PROTECTION (CWP) SECURING YOUR JOURNEY TO THE PUBLIC CLOUD
PUBLIC CLOUD USE CASES WHAT S YOUR STORY? Business benefits: New Application Development Operational Savings Business Agility Big Data Analytics Popular Public Cloud Use Cases Web Retail Scalability IoT / Mobile Initiatives AI / Machine Learning Cloud Bursting Needs
PUBLIC CLOUD SECURITY CHALLENGES How do I know what s running in our public cloud? How do I know if our workloads are secure? Will our security scale with our business? App3 LB Proxy App1 App4 LB Proxy App2
SYMANTEC CLOUD WORKLOAD PROTECTION AUTOMATED, CLOUD-DELIVERED SECURITY FOR PUBLIC CLOUDS Automatic Discovery and Visibility of Public Cloud Workloads Robust Security Across Public Clouds Elastic, Cloud-native Protection Cloud Workload Protection Symantec Cloud Workload Protection DevOps / Security
AUTOMATIC DISCOVERY AND VISIBILITY OF PUBLIC CLOUD WORKLOADS SYMANTEC CLOUD WORKLOAD PROTECTION Shut down rogue instances to reduce attack surfaced Agent Not Installed Policy Not Applied Protected Discover and view security postures of workloads wherever they are Continuous visibility of workloads deployed across AWS and Azure Automatic discovery of software services on workloads Automatic identification of workload security postures Real-time visibility into infrastructure changes
ROBUST SECURITY ACROSS PUBLIC CLOUDS SYMANTEC CLOUD WORKLOAD PROTECTION Unique application isolation blocks exploits targeting known and unknown vulnerabilities OS hardening stops zero-day threats Real-time file integrity monitoring (RT-FIM) prevents unauthorized changes RT-FIM Real-time user activity and application process monitoring identifies suspicious behaviors Identify potential threats and apply security policies in the same view
ELASTIC, CLOUD-NATIVE PROTECTION SYMANTEC CLOUD WORKLOAD PROTECTION Complete instance mapping with real-time protection status Instances in autoscaling group with policies applied Automatic policy recommendations Security scales automatically with dynamic cloud infrastructure Cloud-native integration with public cloud platforms enables DevOps to build security directly into service deployment workflows Flexible pay-for-use and annual subscription pricing models support agile business planning
SYMANTEC ENDPOINT PROTECTION CLOUD (SEPC) SECURING YOUR IT ASSETS ACROSS THE CLOUD
Cloud Computing for Enterprises Symantec Endpoint Protection Cloud INTELLIGENT PROTECTION Proven world-class security with advanced endpoint protection against emerging threats Protects against zero-day threats and ransomware Utilizes world leading global intelligence EASY TO DEPLOY AND USE Single, cloud-based console combines endpoint protection, mgmt, mobility, and encryption Sets up in less than 5 mins One-step policy configuration for users, groups, and devices Always-on security AFFORDABLE SaaS: pay as you go model Uses existing infrastructure Made for the IT Generalist
How Symantec Can Help Symantec Endpoint Protection Cloud INTELLIGENT PROTECTION Proven world-class security with advanced endpoint protection against emerging threats Protects against zero-day threats and ransomware Utilizes world leading global intelligence EASY TO DEPLOY AND USE Single, cloud-based console combines endpoint protection, mgmt, mobility, and encryption Sets up in less than 5 mins One-step policy configuration for users, groups, and devices Always-on security AFFORDABLE SaaS: pay as you go model Uses existing infrastructure Made for the IT Generalist
Intelligent Protection Against the Next Generation of Threats Stop Targeted Attacks and Zero-Day Threats with Layered Protection Patented real-time cloud lookup for all scanned files NETWORK REPUTATION ARTIFICIAL INTELLIGENCE FILE BEHAVIOR DEVICE CONTROL FIREWALL AND INTRUSION PREVENTION INSIGHT ADVANCED MACHINE LEARNING ANTIVIRUS SONAR USB STORAGE DEVICES Blocks malware before it spreads to your machine and controls traffic Determines safety of files and websites using the wisdom of the community Pre-execution detection of new and evolving threats Scans and eradicates malware that arrives on a system Monitors and blocks files that exhibit suspicious behaviors Blocks infections from USB storage devices, helps prevent data theft
Intelligent Protection : Advanced Protection Capabilities Predictive security machine learning, file scanning, and hardening Advanced Machine Learning Intelligent Threat Cloud Generic Exploit Mitigation Intelligent ability to detect new and unknown threats Real-time protection from the cloud for every file scanned before it has had a chance to execute Blocks zero day attacks against vulnerable applications
Ready to Protect Users in Under 5 Minutes Giving You Crucial Information To Protect Your Organization INTUITIVE POLICY SETTING Create polices based on employee s role or group (e.g. legal team vs. sales or marketing) seamlessly applied to all their devices. FAST ACTION DASHBOARD From the dashboard, find and remediate infected devices with three (3) clicks. Easily take action to bring devices back into compliance based on their status and distribution. ALWAYS UP TO DATE information on the latest identified threat families provided automatically from the cloud plus live updates offer protection that is always up to date. ALWAYS AVAILABLE CLOUD-BASED ARCHITECTURE Cloud-based management console, user portal, real-time dashboard, and advanced endpoint protection
Low Total Cost of Ownership Endpoint Protection Cloud Affordable pricing model designed for small and mid-sized business budgets Low total cost of ownership - a cloud-based service requiring no additional infrastructure investments No dedicated resources or IT specialists (designed for IT generalists)
Thank you! Christopher Covert Copyright 2016 Symantec Endpoint Protection Cloud