42
VISIT 2010 – Fujitsu Forum Europe

Confidence in the Cloud – with Symantec and Fujitsu

Embed Size (px)

Citation preview

Page 1: Confidence in the Cloud – with Symantec and Fujitsu

VISIT 2010 – Fujitsu Forum Europe 1

Page 2: Confidence in the Cloud – with Symantec and Fujitsu

Cloud Computing – Room 13b

Shapingtomorrowwith you.

Confidence in the Cloud –with Symantec and Fujitsuwith you. y j

Andreas ZeitlerVice President EMEA Central, Symantec

10:00 h10:00 h

VISIT 2010 – Fujitsu Forum Europe

Page 3: Confidence in the Cloud – with Symantec and Fujitsu

3

Page 4: Confidence in the Cloud – with Symantec and Fujitsu

Confidence in the cloud –i h ji dwith Fujitsu and Symantec

Andreas ZeitlerRegional Vice President EMEA Central

4

Page 5: Confidence in the Cloud – with Symantec and Fujitsu

MegatrendsMegatrends

• Consumerization of IT

• IT‐ization of Consumer

• Mobility

• Virtualization

• CloudCloud

• Social networks

5

Page 6: Confidence in the Cloud – with Symantec and Fujitsu

IT Must Evolve to Meet New DemandsIT Must Evolve to Meet New Demands

InformationInformation--CentricCentricCentricCentric

SystemSystem--SystemSystemCentricCentric

• Driver: Business automation

• Driver: Agility with collaboration and knowledge sharing

• Data: Distributed unstructured• Data: Centralized, structured

• Infrastructure: Physical

Data: Distributed, unstructured

• Infrastructure: Virtual, cloud, outsourced

• IT focus: Systems tasks • IT focus: Information tasks

6

Page 7: Confidence in the Cloud – with Symantec and Fujitsu

The Information‐Centric Model

7

Page 8: Confidence in the Cloud – with Symantec and Fujitsu

Three challenges of todayThree challenges of today

8

Page 9: Confidence in the Cloud – with Symantec and Fujitsu

Stuxnet – FactsStuxnet – Facts

9

Page 10: Confidence in the Cloud – with Symantec and Fujitsu

Stuxnet: Incursion

• Spreads by copying itself to USB drives

LNK vulnerabilityAttacker Victim

– LNK vulnerability

– Autorun.inf

• Spreads via network shares

• Spreads using 3 known and 2 Zero‐day Microsoft vulnerabilities

MS08 067 (vulnerability used by Conficker)Employee

– MS08‐067 (vulnerability used by Conficker)

– LNK: allows automatic spreading via USB keys

– Printer Spooler: allows network spreading to remote machines

Co workers

remote machines 

– Undisclosed 1: local privilege escalation vulnerability

U di l d 2 l l i il l tiCo‐workers – Undisclosed 2: local privilege escalation vulnerability 

• Default password in Siemens WinCC

10

Page 11: Confidence in the Cloud – with Symantec and Fujitsu

Denmarkmypremierfutbol.commypremierfutbol.com

••Malaysia

todaysfutbol.com

••

y

Page 12: Confidence in the Cloud – with Symantec and Fujitsu

Denmarkmypremierfutbol.commypremierfutbol.com

••Malaysia

todaysfutbol.com

••

y

Page 13: Confidence in the Cloud – with Symantec and Fujitsu

Denmarkmypremierfutbol.commypremierfutbol.com

••Malaysia

todaysfutbol.com

••

y

Page 14: Confidence in the Cloud – with Symantec and Fujitsu

The victim: S7‐315‐2 and 417 –plus the new 1200 seriesplus the new 1200 series

Siemens S7‐300

14

Page 15: Confidence in the Cloud – with Symantec and Fujitsu

Percentage of Stuxnet infected hosts withSiemens Step 7 software installerdSiemens Step 7 software installerd

15

Page 16: Confidence in the Cloud – with Symantec and Fujitsu

Number of new infections by countryNumber of new infections by country

16

Page 17: Confidence in the Cloud – with Symantec and Fujitsu

Fararo Paya und Vacon2 – 807 – 1410 Hertz for months2 – 807 – 1410 Hertz for months

17

Page 18: Confidence in the Cloud – with Symantec and Fujitsu

First install of StuxnetFirst install of Stuxnet

18

Page 19: Confidence in the Cloud – with Symantec and Fujitsu

Infection mechanismInfection mechanism

19

Page 20: Confidence in the Cloud – with Symantec and Fujitsu

White: Stuxnet Yellow: original Simatic files used for by Stuxnet

f d bl kGrey: System functions Green: Stuxnet data blocks20

Page 21: Confidence in the Cloud – with Symantec and Fujitsu

How to protect agains Stuxnet

Application hardening

• Symantec Critical System Protection Policies in kernel filter driver mode

Application hardening

•Identify inappropriate access to sensitive information•Identify and clean up internal data spills

Data Loss Prevention

y p p

•Many infection vectors appear to be delivered by removable media

Removable Media Device Control

•Many infection vectors appear to be delivered by removable media•Restrict automatic launch of content on removable media 

Hardening of Information-Repositories

•Core repositories of intellectual property are primary targets

g p

21

Page 22: Confidence in the Cloud – with Symantec and Fujitsu

Symantec’s Enterprise Vision

Confidence in the Connected World

S d f i iSecure and Manage Your Information‐Driven Enterprise, across Physical, Virtual, and Cloud

22

Page 23: Confidence in the Cloud – with Symantec and Fujitsu

Dynamic infrastuctureDynamic infrastucture

Manage Take Advantage Leverage Hosted Private Clouds of Public Clouds Services

2323

Page 24: Confidence in the Cloud – with Symantec and Fujitsu

Dynamic InfrastructuresDynamic Infrastructures 

Dynamic Infrastructures

Managed Infrastructure

Managed OfficeManaged Data Center

Managed Maintenance

ServiceDesk

Infrastructure Workplace as a S S i S S i

Managed Maintenance

Infrastructure as a service

o p ace as aService 

Server as a Service  Storage as a Service 

Infrastructure Solutions Office SolutionsData Center Solutions

Infrastructure Products & Services

Network

Server ClientsStorage

Infrastructure Software

Copyright 2010 FUJITSU LIMITED

24

Page 25: Confidence in the Cloud – with Symantec and Fujitsu

Symantec Infrastructure Solutions for Cloud Computingfor Cloud Computing

Cloud Requirements

KeyTechnologies

Symantec SolutionsRequirements Technologies

Virtualized servers

Virtualized storage

Solutions

Security & Compliance

Storage ManagementService-based

Scalable and Elastic Virtualized storage

Scale out architectures

Automated HA/DR

C dit HW

Storage Management

Clustered Storage

Backup and Archive

A il bilit

Scalable and Elastic

Shared

Quality of ServiceCommodity HW Availability

Endpoint Virtualization

Cloud Advisory Svcs

25

Page 26: Confidence in the Cloud – with Symantec and Fujitsu

Symantec ‘s IT Security Strategy – also for clouds

Develop and EnforceDevelop and Enforcell

Policy Driven and Risk BasedIT PoliciesIT Policies

Information andProtect the Information Information and Protect the Information

Authenticate Identities Identity Centric

Well Managed over aManage Systems

Protect the InfrastructureProtect the Infrastructure Secure InfrastructureProtect the InfrastructureProtect the Infrastructure Secure Infrastructure

26

Page 27: Confidence in the Cloud – with Symantec and Fujitsu

Symantec as a provider of cloud technologies

SLAActual 

September 2010

Symantec as a provider of cloud technologies

AntiSpam effectiveness 99% 99.99997%

Spam false positive rate 0.0003% 0.000008%

AntiVirus false positive rate 0.0001% 0.000005%

Email & Web Service Availability 100% 100%

Average Web scanning time 100 ms 30.2 ms

27

Page 28: Confidence in the Cloud – with Symantec and Fujitsu

billionemails in September 91.7% spampbillionweb requests inweb requests in SeptemberMillion pieces of Malware capturedi S t 2010

1 million only by Sk tiin Sept 2010

Thousand new websites w/

Skeptic

malware or spyware were detected in Sept 2010

28

Page 29: Confidence in the Cloud – with Symantec and Fujitsu

Symantec isSymantec

Symantec is #1 in SaaS

G l

Other SecurityGoogle

MicrosoftIntelIntel (McAfee/MX Logic)

IDC: Worldwide Messaging Security SaaS Revenue by Vendor July 200929

29

Page 30: Confidence in the Cloud – with Symantec and Fujitsu

31k

33k

11m

12m

27k

29k

10m

11m

21k

23k

25k

8m0

9m

17k

19k

21k

6m

7m

15k 5m Q1

FY09Q2 Q3 Q4 Q1

FY10Q2 Q3 Q4 Q1

FY`11Q1

FY09Q2 Q3 Q4 Q1

FY10Q2 Q3 Q4 Q1

FY`11

Thousand Thousand businessesbusinesses

MillionMillionusersusersbusinessesbusinesses usersusers

3030

Page 31: Confidence in the Cloud – with Symantec and Fujitsu

SaaS Adoption –our shared opportunity with Fujitsuour shared opportunity with Fujitsu% of Companies Adopting Hosted Email Security

54%54%UKNordicsUS

38%USGermany

22%18%

26% 27%

15%

20%

26%

11% 13% 11%15%

5%9%

0% 1%

SoHO Small Business Medium Business Enterprise

3131

Page 32: Confidence in the Cloud – with Symantec and Fujitsu

Confidence Enables the CloudConfidence Enables the Cloud

Trust between cloud service providers

C fid

Trust between cloud service providers and cloud service consumers is the key enabler of the cloud model. 

Information Governance

Confidence

Information Privacy

Information Management

I f ti S it

Information Availability

Information Security

32

Page 33: Confidence in the Cloud – with Symantec and Fujitsu

Thank you!Thank you!yy

Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

Thi d t i id d f i f ti l l d i t i t d d d ti i All ti l ti t th i f ti i thi d t ith i li dThis document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

33

Page 34: Confidence in the Cloud – with Symantec and Fujitsu

Digital information increased 73 percent in 2008 to an estimated g p487 billion gigabytes

80‐100 million virtual machines are being created per year or 273,972 per day or 11,375 per hour.

Number of physical servers in the World today: 50 million

By 2013 60 percent of servers workloads will be virtualized

“Market for Enterprise Cloud servers will grow from $8 4 billionMarket  for  Enterprise Cloud servers will grow from $8.4 billion opportunity in 2010 to $12.6 billion in 2014 (IDC)

34

Page 35: Confidence in the Cloud – with Symantec and Fujitsu

Symantec Solutions for Virtualization and Cloud ComputingComputing

• Symantec helps customers adopt virtualization and cloud computing with confidence:

– Manage Private Clouds

– Take Advantage of Public Clouds

L H t d S i– Leverage Hosted Services

• Adopt an Information‐centric Model to secure and manage across physical virtual and cloudacross physical, virtual, and cloud

35

Page 36: Confidence in the Cloud – with Symantec and Fujitsu

Encryption / ERM

EmailSecurity

Remote Access/ Monitoring

Encryption / ERM DLP

Web SecurityEndpoint Management

Monitoring 

ArchivingBackup

Endpoint Protection

Addressable market in 2013

3636

Page 37: Confidence in the Cloud – with Symantec and Fujitsu

%%

Partners are d i iPartners are d i idriving more driving more of our growthof our growth

3737

Page 38: Confidence in the Cloud – with Symantec and Fujitsu

Cloud Services and Deployment ModelsCloud Services and Deployment Models

Types of Cloud ServicesTypes of Cloud Services

Infrastructure (IaaS)Servers, Storage

Platform (PaaS)Middleware

Software (SaaS)Applications

Cloud Deployment Models

Services available to Public

Private and public Hybrid

Services provided by Private

p y

the general public services coordinated to provide a solution

a single entity on behalf of that entity

38

Page 39: Confidence in the Cloud – with Symantec and Fujitsu

Finding ROI in the CloudFinding ROI in the Cloud

“A hybrid model will, and should, predominate for the next 10 years.”  Gartner 2009Gartner 2009   

39

Page 40: Confidence in the Cloud – with Symantec and Fujitsu

Top Challenges in Moving to a Private or Public CloudTop Challenges in Moving to a Private or Public CloudSecurity/Compliance

Price

Immature Technology

Availability

Integration w/ Existing IT PublicPrivate

Staff Skill Sets

Availability

Ability to meet SLAs

Change in Policies/Processes

0 10 20 30 40 50 60 70 80

Vendor Lock‐in

0 10 20 30 40 50 60 70 80Source:  IDC, Cloud Computing Attitudes, April 2010, n = 255.

40

Page 41: Confidence in the Cloud – with Symantec and Fujitsu

Targeted AttacksTargeted Attacks

53%  of providers of critical infrastructure have seen targeted attacks against their

Infrastructure in the last twelf months. On average they had 2 attacks.g y

41

Page 42: Confidence in the Cloud – with Symantec and Fujitsu

42