Symantec Security Refresh
Chris Collier
Presales Specialist
Agenda
–Current Threat Landscape
–Symantec Global Intelligence Network
–Symantec Security Solutions Overview
–Summary
–Q&A
–Upcoming Security Webinars
2
Current Threat Landscape
Current Threat Landscape - ISTR
Current Threat Landscape – Targeted Attacks
Current Threat Landscape – Data Breaches
1200 x Laptops lost/stolen every week
40% of ex-employees take data with them
Average cost of data breach – £1.9m
Current Threat Landscape – Mobile Threats
Current Threat Landscape – Email
Summary
• No business is safe from attack – regardless of its size
• Attackers are being more selective in who they target
• Obtaining information is key – if an attacker could make money from it, it’s a potential target
Below are some qualifying questions that can help you determine a security solution requirement:
• What are you currently doing to safeguard your data?
• How are your emails protected?
• Do you use mobile devices in your organisation?
• What industry regulations do you have to comply with?
• How are you protecting your end users workstations?
Symantec Global Intelligence Network
Global ExpertiseMore researchers
Comprehensive data sourcesMore virus samples analyzedExtensive customer support
In-depth AnalysisSignatures: AV,AS,IPS,GEB,
SPAM, White listsDeepSight Database
IT Policies and Controls Rigorous False Positive Testing
Automated UpdatesFast & Accurate
Variety of Distribution MethodsRelevant Information
Relevancy
Accuracy
Protection
ResponseCenters
Users
Symantec Security IntelligenceGlobal Intelligence Network
Symantec Security Solutions Overview
Symantec Security Strategy
Global Intelligence Network (GIN)
200+m Nodes Globally 40% Global email Monitored
2.5+m “decoy” accounts200+ Countries
Malicious Insider
Well Meaning Insider
Malicious Outsider
Threats
Enforce IT Policies
Policy Access Controls
Control Compliance Suite (CCS)
Protect Information
Data Loss Prevention & Encryption
(DLP/PGP)
Where Who Control
Endpoint Storage Data in-transit
Trusted Interactions
With Symantec O3
Identity Protection (2 factor authentication)
Fraud Detection Public Key Infrastructure
Protect The Infrastructure
Mail Servers, Gateway Servers
Symantec Protection Suite (SPS)
Endpoint: AV, Spy, Device & App Control
Manage & RemediatePatch ManagementAsset Management Asset Deployment
Migration
Altiris (ITMS)Symantec Security
Information Manager (SSIM)
Mobile Devices
Process People Technology
Protective monitoring Incident management
Incident Closure
Mobile Management Suite/ Appcenter
(MDM)
iOS, AndroidWindows 7
PhoneTablets
Critical SystemProtection for the ‘un-patchable’
Legacy systemsHardening
Symantec.cloud
Protect Interactions
Critical Systems Protection (CSP)
Validation and ID Protection (VIP)
Workflow
Summary
• Most extensive portfolio of businessprotection solutions available
• More experience – 30+ years of protectingthe world’s systems and information
• Comprehensive and up-to-date protection against the latest threats
• Market leadership - in both security and data protection
• Trusted technology - Symantec protects 99% of the Fortune 500
Symantec Protects More Businesses
Information ProtectionPreemptive Security Alerts Threat Triggered Actions
Global Scope and ScaleWorldwide Coverage 24x7 Event Logging
Rapid Detection
Threat Activity• 240,000 sensors• 200+ countries
Malcode Intelligence• 130M client, server,
gateways• Global coverage
Vulnerabilities• 32,000+ vulnerabilities
• 11,000 vendors• 72,000 technologies
Spam/Phishing• 2.5M decoy accounts
• 8B+ email messages/daily• 1B+ web requests/daily
Upcoming Security Webinars
Upcoming Security Webinars
Click Here to Register
Questions?