Encryption Vision & Strategy

Similar documents
Simplifying Endpoint Management and Security For an Evolving and Complex Mobile Workforce

CloudSOC and Security.cloud for Microsoft Office 365

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

Fencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1

Symantec Enterprise Solution Product Guide

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management

Comprehensive Database Security

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

ProteggereiDatiAziendalion-premises e nel cloud

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

SYMANTEC DATA CENTER SECURITY

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Datasheet. Only Workspaces delivers the features users want and the control that IT needs.

MODERNIZE INFRASTRUCTURE

Welcome to the SafeNet Day! Prague 1st of October Insert Your Name Insert Your Title Insert Date

To the Designer Where We Need Your Help

Symantec Network Access Control Starter Edition

Securing Office 365 with Symantec

McAfee Total Protection for Data Loss Prevention

Copyright 2011 Trend Micro Inc.

Best Practices in Securing a Multicloud World

WHITEPAPER. How to secure your Post-perimeter world

Symantec Network Access Control Starter Edition

Securing Digital Transformation

Simplifying the Branch Network

WHITE PAPER. Applying Software-Defined Security to the Branch Office

Run the business. Not the risks.

State of Cloud Adoption. Cloud usage is over 90%, are you ready?

SOLUTION BRIEF RSA NETWITNESS SUITE & THE CLOUD PROTECTING AGAINST THREATS IN A PERIMETER-LESS WORLD

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Transforming IT: From Silos To Services

SECURE DATA EXCHANGE

Microsoft Security Management

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

HP Fortify Software Security Center

Securing Your Most Sensitive Data

Inside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1

Secure & Unified Identity

NEXT GENERATION SECURITY OPERATIONS CENTER

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

Windows Server The operating system

Securing the Modern Data Center with Trend Micro Deep Security

Symantec Network Access Control Starter Edition

IN THE FRAME. Computacenter Public Sector Frameworks FRAMEWORK

TREND MICRO SMART PROTECTION SUITES

Changing face of endpoint security

Cisco Start. IT solutions designed to propel your business

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

PROTECT WORKLOADS IN THE HYBRID CLOUD

Design and deliver cloud-based apps and data for flexible, on-demand IT

TREND MICRO SMART PROTECTION SUITES

Security Landscape Thorsten Stoeterau Security Systems Engineer - Barracuda Networks

Data Insight Feature Briefing Box Cloud Storage Support

MaaS360 Secure Productivity Suite

SMARTCRYPT CONTENTS POLICY MANAGEMENT DISCOVERY CLASSIFICATION DATA PROTECTION REPORTING COMPANIES USE SMARTCRYPT TO. Where does Smartcrypt Work?

Business Strategy Theatre

ABOUT US SECURITY. A Legacy of Providing Solutions. Protecting Your Data

Trend Micro Guide and solution to help embrace Consumerization and BYOD. James Walker EMEA Product Marketing Manager 26 September 2012

Go mobile. Stay in control.

Transform your network and your customer experience. Introducing SD-WAN Concierge

CYBER SOLUTIONS & THREAT INTELLIGENCE

Transform your network and your customer experience. Introducing SD-WAN Concierge

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

WHITEPAPER THE EVOLUTION OF APPSEC: FROM WAFS TO AUTONOMOUS APPLICATION PROTECTION

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

Veritas Backup Exec. Powerful, flexible and reliable data protection designed for cloud-ready organizations. Key Features and Benefits OVERVIEW

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

Understanding VDI End-to-End

STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions.

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

DaaS. Contents. Overview. Overview Features DaaS Clients What is DaaS FAQ s Migration Services. Benefits. 1 P a g e

Microsoft 365 Business FAQs

Informatica Data Quality Product Family

Total Threat Protection. Whitepaper

Sichere Applikations- dienste

Managing Your Privileged Identities: The Choke Point of Advanced Attacks

BUFFERZONE Advanced Endpoint Security

MySQL CLOUD SERVICE. Propel Innovation and Time-to-Market

Make security part of your client systems refresh

The Etihad Journey to a Secure Cloud

MObile. end. complexity

The threat landscape is constantly

CA Host-Based Intrusion Prevention System r8

SIEM: Five Requirements that Solve the Bigger Business Issues

MD-101: Modern Desktop Administrator Part 2

Benefits of Implementing a SaaS Cybersecurity Solution Andras Cser, VP Principal Analyst

Next Generation Infrastructure Outsourcing. Copyright 2016 Tech Mahindra. All rights reserved.

WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD

Security as Code: The Time is Now. Dave Shackleford Founder, Voodoo Security Sr. Instructor, SANS

The Evolution of Data Center Security, Risk and Compliance

Isla Web Malware Isolation and Network Sandbox Solutions Security Technology Comparison and Integration Guide

Cloud for Government: A Transformative Digital Tool to Better Serve Communities

THALES DATA THREAT REPORT

The Device Has Left the Building

Archiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention

Transcription:

Encryption Vision & Strategy Brad Zehring Principal Product Manager Encryption Vision & Strategy 1

Safe Harbor Disclaimer This presentation contains information about pre-release software. Any unreleased update to the product or other planned modification is subject to ongoing evaluation by Symantec and therefore subject to change. This information is provided without warranty of any kind, express or implied. Customers who purchase Symantec products should make their purchase decision based upon features that are currently available. SYMANTEC VISION 2012 2

Effective Enterprise Security Is Getting Much Harder CHALLENGING THREAT LANDSCAPE Social Engineering EVOLVING INFRASTRUCTURE Targeted Attacks Advanced Technology INCREASING COMPLEXITY Compliance Requirements Vendor Diversity SYMANTEC VISION 2012 3

As A Result, Most InfoSec Teams Realize They Must Shift To Information-Centric Security System- Centric Information- Centric Transactional Apps Structured Data Centralized information Perimeter-based security On-premise infrastructure Collaborative Apps and Social Media Unstructured data Distributed information People are the new perimeter Virtual Infrastructure and Cloud SYMANTEC VISION 2012 4

Encryption Products Vision Enable enterprise customers to confidently protect sensitive information, wherever it resides, with SYMC Encryption SYMANTEC VISION 2012 5

Encryption Products Strategic Direction 1 2 3 Build Information Protection Solutions Extend the Messaging Platform Deliver Confidence In The Cloud 4 Unified Drive Encryption & Removable Media Protection SYMANTEC VISION 2012 6

Encryption Products Strategic Direction 1 Build Information Protection Solutions Integrate DLP and Encryption to enable sensitive data to be protected and restricted to authorized users Deliver differentiated solutions unique to Symantec Encryption Insight Enable DLP to access and inspect encrypted data both on the Network and in Email Direct Protect find and automatically encrypt sensitive data Provide Defense in Depth Discover sensitive information Determine data ownership Enforce strong encryption Leverage key management to enable and regulate information access SYMANTEC VISION 2012 7

Encryption Products Strategic Direction 2 Extend the Messaging Platform Increase deployment options in an enterprise environment to leverage existing infrastructure and simplify deployment Keep expanding endpoint messaging encryption footprint in mobile Enhance gateway messaging encryption to provide data security at perimeter Enhance desktop messaging encryption to provide superior endpoint security SYMANTEC VISION 2012 8

Encryption Products Strategic Direction 3 Deliver Confidence In The Cloud The Cloud is creating new security challenges Employees and enterprises are leveraging cloud-based storage to enable collaboration and data portability Outsourcing e-mail infrastructure to cloud-based data centers Integrate with Symantec O3 to encrypt data at the gateway Leverage file and folder encryption as well as key management to enable users to collaborate securely in the public cloud SYMANTEC VISION 2012 9

Encryption Products Strategic Direction 4 Unified Drive Encryption & Removable Media Protection Deliver a converged drive encryption solution leveraging the best technologies from PGP and SEE Support core features and functionality required by enterprise and public sector organizations Introduce technology and architecture enhancements to optimize performance, usability, and supportability Integrate file and folder encryption for removable media Enable existing PGP and SEE customers to upgrade non-disruptively SYMANTEC VISION 2012 10

Thank you! Brad Zehring Bradley_zehring@symantec.com (415) 518-9383 SYMANTEC PROPRIETARY/CONFIDENTIAL INTERNAL USE ONLY Copyright 2012 Symantec Corporation. All rights reserved. Encryption Vision & Strategy 11