cloud computing security john abrena - chicago tour
DESCRIPTION
Small Business Technology Tour 2011 - http://techtour2011chicago.eventbrite.com/TRANSCRIPT
Presentation Identifier Goes Here 1
Using Cloud-Based Services to Secure and Manage your Information
John AbrenaDirector, Cloud Services - En Pointe Technologies
Risk = Uncertainty that Matters
My Security Syllogism
Information has value
We protect things of value
Therefore:We must protect information
NAME
Social Security NumberDrivers License Number
Credit Card Number
Here is Proof
Security vs. Privacy
PRIVACYWHAT (WHY) information needs to be
protected
SECURITYHOW to protect information
Bill Boni
CISO, Motorola
“Understand the business,
understand what makes it
successful, identify the
factors that can put that
success at risk, and then
find ways of managing that
risk through technical,
operational or procedural
safeguards”
The Changing Threat Landscape
Data Breaches
Global Intelligence NetworkIdentifies more threats, takes action faster & minimizes impact
Information ProtectionPreemptive Security Alerts Threat Triggered Actions
Global Scope and ScaleWorldwide Coverage 24x7 Event Logging
Rapid Detection
Attack Activity• 240,000
sensors• 200+ countries
Malware Intelligence• 130M client, server,
gateways monitored• Global coverage
Vulnerabilities• 32,000+ vulnerabilities
• 11,000 vendors• 72,000 technologies
Spam/Phishing• 2.5M decoy accounts
• 8B+ email messages/day• 1B+ web requests/day
Calgary, Alberta
Culver City, CAMountain View, CA Austin, TX
Alexandria, VA
Reading, EnglandDublin, Ireland
Chengdu, ChinaTokyo, Japan
Sydney, AU
Chennai, India
Pune, India
Taipei, Taiwan
San Francisco, CA
• Attackers are increasingly targeting end users by compromising high-traffic, trusted websites.
• Attackers are moving their operations to regions with emerging Internet infrastructures and, in some
instances, developing and maintaining their own service provisioning.
• Cross-functional industry cooperation in the security community is becoming imperative.
Internet Security Threat Report XIVOverarching Themes
Data Breaches Identities Exposed
Internet Security Threat Report XIVData Breach Trends
Threat Agents
Malicious Insiders
Hackers and Cyber-Criminals
Well-meaning Insiders
Presentation Identifier Goes Here 12
How we can help…….
Simplify IT with Symantec’s Cloud-Based Solutions
Symantec & The Cloud
Consume Build Extend
Simplify IT with Symantec’s Cloud-Based Solutions 14
Consuming Public Clouds
Services availableto the general public
Virtual private and community cloud services
Services provided by a single entity for that entity
Greater financial and technical leverage:scale, but also risk
Greater ownership and control:both financial and technical
Private
Hybrid
Community
Public
Leverage
Cont
rol
Low HighLow
High
Simplify IT with Symantec’s Cloud-Based Solutions
Cloud Computing – Public Clouds
15
Outcome/Value
Process
Software
Platform
Infrastructure
SaaS
Simplify IT with Symantec’s Cloud-Based Solutions 16
Easy to scale
Easy to deploy
Pay as you go$
Easy to use
No hardware or software
Automatic updates
Benefits for Consuming Cloud Services
Symantec Solutions
17
Protocol Security • Email Security.cloud• Web Security.cloud• IM Security.cloud
Endpoint Security • Endpoint Security.cloud
Information Availability
• Enterprise Vault.cloud• Email Continuity• Backup Exec.cloud
Authentication• VeriSign Identity
Protection
Security Incident & Event Management
• Managed Security Service
ConsumeCloud Service
Simplify IT with Symantec’s Cloud-Based Solutions
Simplify IT with Symantec’s Cloud-Based Solutions
Easy to scale
Easy to deploy
Pay as you go$
Pre-integrated apps
No hardware or software
Automatic updates
18
100% protection against both known & unknown viruses
24/7 customer support
Industry leading SLAs
Easy to use
19
11.0
million
security services users
55
thousandsecurity services clients
11years
Providing services in the cloud
100countries
+
Simplify IT with Symantec’s Cloud-Based Solutions
Final Thoughts on the Importance of Security• “Security” is essential to facilitate and preserve “privacy”
• There are numerous ethical issues that must be addressed as we continue to evolve our information society. Some that transcend technology and some that are manifest as a result of technology
Presentation Identifier Goes Here 20
Simplify IT with Symantec’s Cloud-Based Solutions 21
Closing Thoughts
Cloud services can reduce the growing complexity of IT
SaaS is an easy way to start taking advantage of the cloud
Symantec’s portfolio of services can assist your SaaS strategy
SaaS is simple, and easy to test
Thank you!
Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
22
John AbrenaDirector, Cloud ServicesEn Pointe Technologies (www.enpointe.com)[email protected]