CloudSOC and Security.cloud for Microsoft Office 365

Similar documents
Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Endpoint Security for the Enterprise. Multilayered Defense for the Cloud Generation FAMILY BROCHURE

Asset Discovery with Symantec Control Compliance Suite WHITE PAPER

CipherCloud CASB+ Connector for ServiceNow

Office 365 Buyers Guide: Best Practices for Securing Office 365

Symantec Secure One Services Program Brief

Symantec Advanced Threat Protection: Endpoint

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

with Advanced Protection

THE ACCENTURE CYBER DEFENSE SOLUTION

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

User Behavior Analysis in the Cloud

2018 Edition. Security and Compliance for Office 365

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

Symantec Security.cloud

Securing Office 365 with SecureCloud

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

RSA NetWitness Suite Respond in Minutes, Not Months

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Securing Office 365 with Symantec

Symantec Ransomware Protection

Prevent and Detect Malware with Symantec Advanced Threat Protection: Network

Symantec Protection Suite Add-On for Hosted Security

ProteggereiDatiAziendalion-premises e nel cloud

The Symantec Approach to Defeating Advanced Threats

ForeScout ControlFabric TM Architecture

Security and Compliance for Office 365

Proteggere Office365 e Cloud file sharing in meno di un minuto Tiberio Molino Sr.Sales Engineer Trend Micro

McAfee MVISION Cloud. Data Security for the Cloud Era

Encryption Vision & Strategy

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

Synchronized Security

ATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS

Building Resilience in a Digital Enterprise

Symantec VIP Quick Start Guide. Helping your users. Version 1.0. Author Maren Peasley Symantec. All rights reserved.

Automated Response in Cyber Security SOC with Actionable Threat Intelligence

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

AKAMAI CLOUD SECURITY SOLUTIONS

McAfee Total Protection for Data Loss Prevention

Building an Effective Threat Intelligence Capability. Haider Pasha, CISSP, C EH Director, Security Strategy Emerging Markets Office of the CTO

McAfee Endpoint Threat Defense and Response Family

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

McAfee Skyhigh Security Cloud for Amazon Web Services

Security Analytics Appliances

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

Teradata and Protegrity High-Value Protection for High-Value Data

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks

Securing Your Most Sensitive Data

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

SYMANTEC DATA CENTER SECURITY

THE RSA SUITE NETWITNESS REINVENT YOUR SIEM. Presented by: Walter Abeson

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?

Copyright 2011 Trend Micro Inc.

Advanced Threat Defense Certification Testing Report. Symantec Corporation Symantec Advanced Threat Protection

The Next Generation Security Platform. Domenico Stranieri Pre- Sales Engineer Palo Alto Networks EMEA Italy

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

SOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE

Cybowall Solution Overview

Security for the Cloud Era

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Mission Defense via Information-Centric Security

Cisco Security: Advanced Threat Defense for Microsoft Office 365

Stopping Advanced Persistent Threats In Cloud and DataCenters

Threat Containment and Operations. Yong Kwang Kek, Director of Presales SE, APJ

Imperva Incapsula Website Security

CyberArk Privileged Threat Analytics

Symantec Endpoint Protection 14

Bromium: Virtualization-Based Security

Technical Brochure F-SECURE THREAT SHIELD

Symantec Cloud Workload Protection

IBM Security Network Protection Solutions

ARTIFICIAL INTELLIGENCE POWERED AUTOMATED THREAT HUNTING AND NETWORK SELF-DEFENSE

RSA Advanced Security Operations Richard Nichols, Director EMEA. Copyright 2015 EMC Corporation. All rights reserved. 1

Best Practices in Securing a Multicloud World

Agile Security Solutions

Defending Against Unkown Automation is the Key. Rajesh Kumar Juniper Networks

MODERN DESKTOP SECURITY

Incident Response Agility: Leverage the Past and Present into the Future

SIEM: Five Requirements that Solve the Bigger Business Issues

GUIDE. Navigating the General Data Protection Regulation Mini Guide

MITIGATE CYBER ATTACK RISK

Microsoft Security Management

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

McAfee epolicy Orchestrator

Behavioral Analytics A Closer Look

Managed Endpoint Defense

Un SOC avanzato per una efficace risposta al cybercrime

TRUE SECURITY-AS-A-SERVICE

RSA Security Analytics

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Cisco Advanced Malware Protection (AMP) for Endpoints Security Testing

Cisco Security. Advanced Malware Protection. Guillermo González Security Systems Engineer Octubre 2017

RSA INCIDENT RESPONSE SERVICES

SOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE

Transcription:

Solution Brief CloudSOC and Email Security.cloud for Microsoft Office 365 DID YOU KNOW? Email is the #1 delivery mechanism for malware. 1 Over 40% of compliance related data in Office 365 is overexposed in file sharing. 2 Keep your Office 365 safe from end-to-end with industry leading security from Symantec for email, file sharing, and collaborative apps Are you protecting your Office 365 email, apps, accounts and transactions end-to-end against both internal and external threats? Concerned about what type of content is uploaded, saved, and sent both internally and externally in your Office 365 emails, file sharing, and apps? 49% of cloud hacks and exploits come from email, file sharing, and IM. 2 Are you using industry-leading threat protection and DLP to safeguard your assets in the Office 365 cloud? 1 Source: 2017 Symantec Internet Security Threat Report 2 Source: Symantec 1H2017 Shadow Data Report

End-to-End Protection Email Security.cloud Protects business email from inbound advanced threats such as business email compromise, ransomware, and spear phishing Blocks outbound sensitive data loss via email content and attached files CloudSOC Protects Office 365 apps such as OneDrive, Email, Sharepoint, Yammer, and Teams from threats and sensitive data exposure Blocks threats and sensitive data exposures via internal-or externalbound user transactions with Office 365 apps, and protects data Mobile/Roaming and Remote internet Email Gateway CASB Office 365 Email (Exchange Server) Enterprise Integrated Cyber Defense Data Loss Prevention Industry-leading DLP helps protect sensitive data from loss with comprehensive detection and unified policies Malware Protection Advanced malware defense using reputation, machine learning, behavior analysis and virtual machine-aware sandboxing Web Isolation Email Threat Isolation protects against emails with links to malicious websites Encryption Information Centric Encryption (ICE) enables end-to-end digital rights management Integrated Cyber Defense CloudSOC and Email Security.Cloud are integral parts of the Symantec Integrated Cyber Defense Platform, which delivers complete multichannel threat and data protection across web, endpoint, email, and cloud apps backed by the Symantec GIN telemetry feeds, aggregated and distilled from Symantec products. Protect against external threats Analyze incoming email, contentat-rest, and internal user transactions with cloud email, file sharing, messaging, etc., to stop sophisticated threats such as ransomware, APTs, phishing, and spam attacks. Protect against internal threats Scan internal emails, cloud transactions and cloud content for malware, ransomware, and APTs. Dynamically identify suspicious user behavior to alert, quarantine, or block high risk actions and accounts. Govern sensitive data everywhere Enforce DLP on data-at-rest in Office 365, data-in-motion between employees, external file sharing, and outbound email to protect confidential data from exposure, loss, and breach. Encrypt confidential data Automatically encrypt files containing confidential content and control digital access rights for the life cycle of the encrypted file.

Keep your Office 365 apps, email, and content safe with industry leading security Secure your Office 365 email and app services end-to-end against threats File Behavior Analysis and File Reputation Intelligence User Behavior Analytics hackers spear phishing malware ransomware Protect your confidential data from breach or exposure Data-at-rest Data-in-motion @ With Symantec CloudSOC CASB and Email Security.cloud for Office 365, you can secure your email and apps against threats, protect your confidential data and gain control over how your accounts and the content within them are accessed, used, emailed, and shared by your employees, contractors, vendors, and clients. Continuously analyze external and internal email transactions, activity in apps, transactions with apps, content-in-motion and content-at-rest in Office 365 to detect, block, or quarantine threats with Symantec Cloud Email Security and CloudSOC CASB. Guard against new and emerging attacks with multi-layered protection that includes machine learning, email threat isolation, impersonation controls, link protection, cloud sandboxing, behavior analysis, and reputation intelligence on files, URLs, and sources. Get the deepest visibility into sophisticated attacks and prioritize security incidents with advanced security analytics. Quickly identify and mitigate data loss from Office 365 with highly accurate DLP in the cloud that scans and automatically classifies structured, unstructured and interactive content in OneDrive, Email, SharePoint Sites, Teams and Groups, and Yammer. Enforce DLP controls on data-in-motion and data-at-rest end-to-end from the end user to your cloud accounts to your Office 365 email perimeter. Solution Brief CloudSOC CASB and Email Security.cloud for Microsoft Office 365 03

Safeguard your organization against high risk user behavior Secure your Office 365 email and app accounts against advanced attacks Render email links harmless to defeat phishing attacks, prevent credential theft, and malware infections InvalidLogin 80.53 Work time of day or week 76.01 Long session 42.32 internet mi Macdonald 84.62 ThreatScore Surprising Geography 20.58 Sudden Location Change 8.79 Long session 20.14 Global Threat Intelligence Network [ read-only mode ] Email Threat Isolation 0 Incident Sequence Detection Malware Scanning bob@yourcompany.com 01 Screenshot 02 Email 03 Delete 04 Repeat Sandboxing *********** Automatically identify high risk user accounts, compromised accounts, and insider threats with data science driven User Behavior Analytics. Alert, quarantine, or block users from accessing sensitive content and accounts based on a dynamic user ThreatScore. Detect elaborate data exfiltration sequences, such as a pattern of downloading content from a corporate Office 365 app and then uploading that content to a personal file sharing apps, or anomalous and repetitive screen captures, emails, and file deletion. Continuously scan Office 365 content, emails and transactions to remediate and prevent the proliferation of ransomware, APTs, and other emerging malware threats. Cloud Email Security and CloudSOC CASB use machine learning, UBA, and Symantec advanced threat protection with cloud sandboxing to effectively protect your organization from emerging threats coming in through email or infecting accounts in the cloud. Detect sophisticated email attacks with real-time URL evaluations and impersonation controls. Email Threat Isolation protects against emails with links to malicious websites, so they cannot deliver malware, ransomware or other advanced attacks. This protection leverages Symantec Web Isolation to execute web sessions away from endpoints, sending only safe rendering information to users browsers. It also prevents users from submitting corporate credentials and other sensitive information to unknown and malicious websites by rendering pages in read-only mode. 04

Protect sensitive data with automatic encryption and rights management Quickly investigate and respond to security incidents Integrated Cyber Defense PCI PII Content-aware Encryption PHI User-aware Access Control Reliably, secure sensitive data whether it s in the cloud ( e.g. Office 365), on USB devices, email or on-premises. Identify data using automatic detection or user classification, before triggering persistent encryption and digital rights management. Data can be shared with any trusted person, simply using identity to decrypt data. Administrators can quickly visualize who is accessing sensitive data, identify risky or anomalous behavior and if needed, remotely shred access. End-to-end protection with Symantec Information Centric Encryption. Streamlined Response Tools Track activity within Office 365 apps, and provide critical insights to compliance, audit, and other stakeholders when a security incident occurs. Use CloudSOC to quickly investigate a user or activity, cor relate events, and discover what really happened with powerful search and data visualizations or export detailed incident logs to your SIEM for analysis. Respond quickly to attacks with advanced email security analytics providing the deepest visibility into targeted and advanced attack campaigns including Indicators of Compromise (IOC) such as URLs, file hashes, and targeted attack information. Stream data to your Security Operations Center (SOC) to quickly determine the severity and scope of an attack. Symantec s Integrated Cyber Defense Platform unifies cloud and on-premises security to protect users, information, messaging and the web, powered by unparalleled threat intelligence. Contained within the Integrated Cyber Defense Platform is the industry s most comprehensive cloud security solutions to govern access, protect information, defend against advanced threats, and protect workloads as they move to the cloud. Learn more at symantec.com/solutions/ cloud-security Solution Brief CloudSOC CASB and Email Security.cloud for Microsoft Office 365 05

About CloudSOC About Email Security.cloud About Symantec Data Science Powered Symantec CloudSOC platform empowers companies to confidently leverage cloud applications and services while staying safe, secure and compliant. A range of capabilities on the CloudSOC platform deliver the full life cycle of cloud application security, including auditing of Shadow IT, real-time detection of intrusions and threats, protection against data loss and compliance violations, and investigation of historical account activity for postincident analysis. CloudSOC provides cloud access security broker protection for Office 365 services such as Exchange, OneDrive, Sharepoint, Teams, and Yammer. go.symantec.com/casb Symantec Email Security.cloud safeguards cloud and on-premises email such as Office 365 and Microsoft Exchange. It blocks email threats such as ransomware, spear phishing, and Business Email Compromise with the highest effectiveness and accuracy using multi-layered defense and insights from the world s largest civilian threat intelligence network. Email Security solutions include the strongest protection against spear phishing attacks with defense including protection, isolation, visibility, and user awareness techniques plus advanced email security analytics that provides the deepest visibility into targeted attack campaigns. www.symantec.com/products/ email-security-cloud Symantec Corporation (NASDAQ: SYMC), the world s leading cyber security company, helps businesses, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec s Norton suite of products for protection at home and across all of their devices. Symantec operates one of the world s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit www.symantec.com or connect with us on Facebook, Twitter, and LinkedIn. 350 Ellis St., Mountain View, CA 94043 USA +1 (650) 527 8000 1 (800) 721 3934 www.symantec.com Copyright 2018 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. Symc_SB_CloudSOCandEmailSecurityforMicrosoftOffice365_en_v1ac