Securing The Cloud in Today's Threat Landscape. David Dzienciol Vice President, Channels & SMB Asia Pacific Japan Region September 2011

Similar documents
Symantec To Acquire VeriSign s Identity and Authentication Business. May 19, 2010

Building an Effective Threat Intelligence Capability. Haider Pasha, CISSP, C EH Director, Security Strategy Emerging Markets Office of the CTO

Symantec Secure One Services Program Brief

CloudSOC and Security.cloud for Microsoft Office 365

Evolution of Cyber Security. Nasser Kettani Chief Technology Officer Microsoft, Middle East and Africa

EM L01 Introduction to Mobile

Best Practices in Securing a Multicloud World

with Advanced Protection

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

2018 Cyber Security Predictions

Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk

How technology changed fraud investigations. Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011

Prevent and Detect Malware with Symantec Advanced Threat Protection: Network

Symantec Complete Website Security

Securing Office 365 with Symantec

Mobile Field Worker Security Advocate Series: Customer Conversation Guide. Research by IDC, 2015

AKAMAI CLOUD SECURITY SOLUTIONS

Securing Your Enterprise in the Cloud. IT executives must be ready to move to the cloud safely

VMware Hybrid Cloud Solution

Service Provider View of Cyber Security. July 2017

SYMANTEC DATA CENTER SECURITY

Comodo Certificate Manager

The Device Has Left the Building

What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco

Symantec Protection Suite Add-On for Hosted Security

Asset Discovery with Symantec Control Compliance Suite WHITE PAPER

2015 VORMETRIC INSIDER THREAT REPORT

Govern every identity, Inspect every packet. Transform IT to the Department of YES

Symantec Endpoint Protection 14

Securing Your Most Sensitive Data

IBM Security Network Protection Solutions

Encryption Vision & Strategy

white paper SMS Authentication: 10 Things to Know Before You Buy

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

CA Security Management

Identiteettien hallinta ja sovellusturvallisuus. Timo Lohenoja, CISPP Systems Engineer, F5 Networks

Kaspersky Security. The Power to Protect Your Organization

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

Office 365 Buyers Guide: Best Practices for Securing Office 365

Imperva Incapsula Website Security

2018 Edition. Security and Compliance for Office 365

ABOUT COMODO. Year Established: 1998 Ownership: Private Employees: over 700

Cloud-Security: Show-Stopper or Enabling Technology?

Five Reasons It s Time For Secure Single Sign-On

Next Generation Authentication

SIEM: Five Requirements that Solve the Bigger Business Issues

2017 THALES DATA THREAT REPORT

GUIDE. MetaDefender Kiosk Deployment Guide

Securing the SMB Cloud Generation

May the (IBM) X-Force Be With You

Personal Cybersecurity

Kaspersky Small Office Security 5. Product presentation

Symantec Complete Website Security

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

Copyright 2011 Trend Micro Inc.

How to Secure Your Cloud with...a Cloud?

IBM Next Generation Intrusion Prevention System

Symantec VIP Quick Start Guide. Helping your users. Version 1.0. Author Maren Peasley Symantec. All rights reserved.

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

Symantec Cloud Workload Protection

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

June 2 nd, 2016 Security Awareness

Getting over Ransomware - Plan your Strategy for more Advanced Threats

Data safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments.

Cyber fraud and its impact on the NHS: How organisations can manage the risk

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

ISACA West Florida Chapter - Cybersecurity Event

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

Prevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise,

Nine Steps to Smart Security for Small Businesses

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

The emerging battle between Cyber Defense and Cybercrime: How Technology is changing to keep Company and HR data safe

IC B01: Internet Security Threat Report: How to Stay Protected

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity

Symantec Small Business Solutions

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

AT&T Endpoint Security

Putting Trust Into The Network Securing Your Network Through Trusted Access Control

THALES DATA THREAT REPORT

Endpoint Protection : Last line of defense?

Putting security first for critical online brand assets. cscdigitalbrand.services

Altitude Software. Data Protection Heading 2018

Passwords Are Dead. Long Live Multi-Factor Authentication. Chris Webber, Security Strategist

How Cyber-Criminals Steal and Profit from your Data

Intel and Symantec: Improving performance, security, manageability and data protection

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

Hardening the Education. with NGFW. Narongveth Yutithammanurak Business Development Manager 23 Feb 2012

The Evolution of Data Center Security, Risk and Compliance

Enterprise & Cloud Security

Guide Series. How to upgrade to Microsoft Windows 10? Guide Series

How do you decide what s best for you?

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Transcription:

Securing The Cloud in Today's Threat Landscape David Dzienciol Vice President, Channels & SMB Asia Pacific Japan Region September 2011

Digital data is up 600% in 5 years to 988 exabytes in 2010 88% of companies cannot answer what are our information risks today in less than two weeks Corporate information grows ~66% every year Each day 600 million email messages are sent containing unencrypted confidential data Value of digital information stolen in 2009 was ~ $1 trillion By 2011 1 billion mobile devices will access the internet 98% of data breaches in 2009 came from servers Corporations will spend $6.4 billion on Cloud in 2014 up from $3.8 billion in 2010 17% of physical servers virtualized by 2010 2

Cloud Services Revenue 2010 to 2015 SERVICE 2010 2015 CAGR SaaS $10B $21.3 B 16% PaaS $1.3B $2.4B 13% Iaas: Compute $2.2B $15.5 B 48% IaaS: Storage $.12B $2.9B 89% Iaas: Backup $.46B $1.2B 22% Gartner, June 2011 3

1990 s Anti-virus + Infrastructure Protection Security + Storage + Compliance Information Management and Protection 2011 Peter Norton Computing Confidence in a Connected World Extend core product leadership into complementary markets Accelerate our Vision Evaluate where there is rapid change Evolving the Symantec Vision and Brand Symantec Partner Engage 2011 4

Trust Trust is the key characteristic of the cloud service consumerprovider model. IDC 2010 The checkmark logo symbolizes the company's focus on enabling confidence and ensuring customers have simple and secure access to their information from anywhere, seamlessly moving between their personal and professional lives 5

6

Threat Landscape A fundamental shift Old Motivation Hacking Cyber Crime Cyber Espionage Cyber Warfare 7

Threat Landscape Prices on the Underground Economy 8

Threat Landscape Who is being attacked? Enterprises Small Businesses End-Users Governments - Targeted Attacks - Bank accounts - ID Theft - Cyber Sabotage - Data Breaches - Business disruption - Scammed for dollars - Cyber Espionage - End-user disruption - Removal costs - Hactivism - DDOS attacks 9

Threat Landscape How are we being attacked? It can start with an attachment Buried inside may be an embedded Flash object Which leverages a vulnerability to deliver malware Agenda.pdf 10

Threat Landscape How are we being attacked? More likely it will be a link Seems innocuous, right? Well not so fast 11

Threat Landscape How are we being attacked? More likely it will be a link Seems innocuous, right? Well not so fast Hover over the link to see the real link buried underneath Clicking the link brings you to a malicious web site 12

Threat Landscape How are we being attacked? Or maybe some one posts a link to your Facebook page John Doe: Hi Gerry, Check out this cool video of me surfing: bit.ly/e20z3v Again, there s that pesky shortened link who knows where you ll end up 13

Threat Landscape How are we being attacked? Or the web site itself will infect you just by visiting it For example, the neighborhood pizza store might be infected How many pizza stores have a fulltime IT guy on staff looking out for trouble? 14

Threat Landscape How are we being attacked? Or it could be: Hidden in other software On a USB Behind a fake system message 15

Threat Landscape How often are we being attacked? 3,050,000,000 12 14 321 4,501 17,432 30,000 59,526 6,798,338 2,895,802 240,000,000 attacks blocked by million browser domains phishing new bot Symantec infected bot 0day public vulnerabilities AV new signatures plug-in C&C hosts hosting malware SCADA computers 2010 servers vulnerabilities malware variants 14 new 0day vulnerabilities 163 new mobile vulnerabilities 6,253 new vulnerabilities 286,000,000 new malware variants In the time it takes to give this presentation, we will block more than 365,000 attacks! 16

Threat Landscape Why are we being attacked? Mostly because of: Steal Resources Steal Information Extortion Money Destroy - Send spam - Part of a DDOS attack - Steal sensitive info e.g. banking credentials - Old fashion con - Sit back and wait for the $s to roll in - Hackitivism - Cyber-Sabotage Examples: Rustock Zeus Rogue AV Stuxnet 17

Employees Connect In A Whole New Way Edits Checks Downloads Updates Uploads Completes ROI Facebook lead status on company on salesforce.com. Updates Posts models a expense report in status link new the latest presentation to on with product say his his demo big Facebook team meeting group Concur. on profile. Office YouTube. from today! page. Live. SharePoint. 18

What Does That Mean For IT Security? Yikes!!! Internal IT Outsourcer DSP/ISP Streamed Applications Salesforce.com SuccessFactors Gmail FaceBook SPN Back-up Applications Applications & Data Applications & Data Data POS MRP CRM Xbox Work PC Home PC Tablets Mobile Phone Other Endpoints Applications Applications Applications Applications Applications Data Data Data Data Data Security Security Security Security Security 19

Symantec is Focused on Meeting The Security Challenges Develop and Enforce IT Policies Protect the Information Authenticate Identities Manage Systems Control Compliance Suite Data Loss Prevention Suite and Encryption VeriSign Identity and Authentication IT Management Suite Protect the Infrastructure Symantec Protection Suites 20

Symantec Cloud Perspectives Consume Security as a Service customers consume our products and solutions information from the cloud Extend Solutions to enable customers to extend their security reach for cloud services Build Solutions that enable the creation of secure and well managed public and private clouds 21

Symantec Cloud Strategy Focus Areas 1. Security as a Service How does Symantec leverage cloud models to deliver security solutions? 2. Secure Cloud Consumption How does Symantec secure our customer s access to other public cloud services? 3. Secure Cloud Enablement How does Symantec enable customers to secure their own private clouds? 22

1. Security as a Service How Does Symantec Leverage Cloud Models To Deliver Security Solutions? Symantec.cloud: 16 Datacenters on 5 continents, 11M customers are protected by our services, 14 preintegrated apps. Supported by our industry-leading service-level agreement WW leader in messaging Security (SaaS) WW leader in Web Security Hosted Services (IDC) Symantec Health Safe & Symantec Health Image Share Future: Symantec Protection Center Online And 23

Security as a Service (Continued) How Does Symantec Leverage Cloud Models To Deliver Security Solutions? Trust Services SSL, Hosted PKI, Verisign Identity Protection / User Authentication Average 2.1 Billion OCSP look-ups per day 500,000 CRL downloads per day >500M seals served per day >100K websites showing the VeriSign Seal >1.3 Billion active SSL Certs in the market >80 million desktops showing Seal-in-Search SSL Customer Coverage: 95% of Fortune 500, world s 40 largest banks, 90% of Internet Retailers top 500 VeriSign 3 Brands (VRSN, GeoTrust & Thawte) represents approximately 55% of the entire SSL install base 24

Exclusive Channel Offering 2 Flavors Basic Web Site Anti-Malware Check GeoTrust Web Site Anti-Malware Scan Simple add to cart option Non branded bundle component Standalone Product Offering Branded Add basic website anti-malware check Get daily anti-malware scans for up to 5 pages Protect customers web site - Assure customers that your site has been scanned Find out fast if they get hacked - Avoid getting blacklisted by search engines - Get daily anti-malware scans for up to 50 pages NOTE: Unlike the Trust Seal there are no restrictions on who can buy anti-malware scanning product. Any website can buy this product regardless of SSL, brands, or other security products provided they are not restricted due to security trade/import compliance rules.

Vulnerability Assessment Feature Enhancement Key Features Free with the purchase of every VeriSign Extended Validation or Secure site Pro SSL Certificate Targeted scan helps quickly identify and take action against the most common exploitable weaknesses that post the biggest risk to business operations. Vulnerability assessment includes: An automatic weekly An actionable report Rescan option post remediation

2. Secure Cloud Consumption How Does Symantec Secure Our Customer s Access To Other Public Cloud Services? Enable Cloud Ready Access (Data Loss Prevention, User-Authentication) Partnership Example: + MOUNTAIN VIEW, Calif. December 9, 2009 Symantec Corp. (Nasdaq: SYMC) today announced it is offering its next-generation security and enterprise-class storage management solutions through the Amazon Elastic Compute Cloud (Amazon EC2)... 27

3. Secure Cloud Enablement How Does Symantec Enable Secure Private Clouds In The Enterprise? Leverage existing capabilities to enable a Cloud Ready enterprise What is the critical information to protect? Where is this data? How will it be used? Data Loss Prevention Does the critical information have the right level of control? Encryption How will heterogeneous access and broad network connectivity be controlled? Verisign User-authentication / VIP, Network Access Control How will security and performance be managed in a highly virtualized environment? Critical Systems Protection, Endpoint Management How can automation be used to abstract services from the infrastructure that provides them? Workflow 28

Enablers of the Future & Confidence & Trust New Symantec Capabilities User Authentication Device Authentication Encryption Fraud Detection Trust Services 29

The Trust Equation +7312862 +4583601 +4664572 Users & Devices Trust Public and Private Clouds Must verify the security and reputation of the online organization Must be able to present identity credentials before accessing sensitive or personal information Trust Cloud Trust Information Trust Identity / Devices Must establish trust with their users through security and reputation Must authenticate and manage user identities VeriSign Authentication Services Mission: To enable businesses and individuals to use the Internet with confidence 30

Symantec s VeriSign Identity and Access Management TRUST For Users & Devices TRUST For Businesses User & Device Authentication Client PKI Device PKI VIP OTP Strong Authentication Fraud Detection Service Trust Services SSL Certificates Trust Seal Product Code Signing 31

People Information Develop & Enforce IT Policies Protect Information Authenticate Identities Manage Systems Protect the Infrastructure 32

What happens in Singapore ends up on Facebook, Twitter, MySpace

Thank you! David Dzienciol David_Dzienciol@symantec.com Copyright 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 34