8
Symantec Enterprise Security: Strategy and Roadmap Matt Reid VP, Security Business Practice, ITS Partners

Issa symc la 5min mr

  • Upload
    issa-la

  • View
    111

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Issa symc la 5min mr

Symantec Enterprise Security:Strategy and Roadmap

Matt Reid

VP, Security Business Practice, ITS Partners

Page 2: Issa symc la 5min mr

About ITS

Key Security Trends

Existing Symantec Franchises

Go forward Product Strategy

Product Roadmap

.

Agenda

Page 3: Issa symc la 5min mr

Headquartered in Grand Rapids, MI

Symantec National Partner & Platinum Partner

Symantec Partner of the Year 2005*, 2007* & 2011

All Symantec Expert Competencies

Work with about 15% of the US Fortune 500, several of the Nations largest

healthcare providers & some of the largest Federal agencies and departments.

About ITS Partners

Page 4: Issa symc la 5min mr

Key Trends Reshaping the Enterprise Security Market

RESURGENCE OF ENDPOINT Rapid shift to mobile and IoT

DISAPPEARING PERIMETER Decreasingly relevant with “fuzzy” perimeter

RAPID CLOUD ADOPTION Enterprise data and applications moving to cloud

SERVICES Security as a Service; box fatigue

CYBERSECURITY Governments and regulators playing ever larger role

4Copyright © 2015 Symantec Corporation

Page 5: Issa symc la 5min mr

Symantec Enterprise Security | STRONG FRANCHISES

5

#1 share; AAArating

nine quarters in a row

Endpoint Security

#1 share; 100% uptime with

<0.0003% FPs 5 years in a row

Email Security

#1 DLP share;

100% of Fortune 100

Data Protection

#1 share

6B certificate lookups/day

TrustServices

13B validations every day

100% uptime last 5 years

Authentication & Authorization

ManagedSecurity Services

12 Yrs Gartner MQ leader

30B logs analyzed/day

Copyright © 2015 Symantec Corporation

Page 6: Issa symc la 5min mr

Symantec Enterprise Security | PRODUCT STRATEGY

6

Threat Protection

ENDPOINTS DATA CENTER GATEWAYS

• Advanced Threat Protection Across All Control Points• Built-In Forensics and Remediation Within Each Control Point• Integrated Protection of Server Workloads: On-Premise, Virtual, and Cloud• Cloud-based Management for Endpoints, Datacenter, and Gateways

Unified Security Analytics Platform

Log andTelemetryCollection

Unified IncidentManagement and Customer Hub

Inline Integrationsfor Closed-loopActionable Intelligence

Regional and Industry Benchmarking

Integrated Threatand BehavioralAnalysis

Information Protection

DATA IDENTITIES

• Integrated Data and Identity Protection• Cloud Security Broker for Cloud and Mobile Apps• User and Behavioral Analytics• Cloud-based Encryption and Key Management

Users

Data

Apps

Cloud

Endpoints

Gateways

Data Center

Cyber Security ServicesMonitoring, Incident Response, Simulation, Adversary Threat Intelligence

Copyright © 2015 Symantec Corporation

Page 7: Issa symc la 5min mr

Symantec Enterprise Security | ROADMAP

7

Enhanced ProductNew Product

THREATPROTECTION

INFORMATIONPROTECTION

CYBERSECURITYSERVICES

UNIFIEDSECURITY ANALYTICS

Email Securitywith DLP

ATP(Network)

Cloud EndpointManagement

EndpointRemediation

Cloud Workload Protection

BiometricAuthentication

DLP/Office365

CloudSecurity Broker

User Behavioral Analytics

IdentityAs a Service

Cloud basedKey Management

IR RetainerService

ATP MonitoringService

IR Readiness Assessment

MSS Self-Service Admin Portal

SimulationService IR Managed Service

MSS Log MgmtAs a Service

Incident Investigation App

Targeted Attack Detection App

Analytics PlatformGen. Availability

SymGaugeApp (TasteTest)

Analytics Platform Customer Preview

Analytics Platform Internal Preview

Analytics Platform3rd Party SDK

ATP(Email, Endpoint)

EndpointForensics

Datacenter SecurityAs a Service

DLP/Box.Net

DLP/SFDC & WDAY

MoneyballApp

DLPAs a Service

Rapid Release Cycles

Preview Releases

Page 8: Issa symc la 5min mr

Thank you!

Copyright © 2015 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

Matt Reid

[email protected]

8