delivering integrated cyber defense in the cloud generationmobile device protection machine learning...
TRANSCRIPT
Delivering Integrated Cyber Defense in the Cloud Generation
Panagiotis Sotiriou
Senior Presales Consultant
Greece, Cyprus & Romania
Copyright © 2017 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
The Big Numbers
Internet Security Threat Report Volume 23 | Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Copyright © 2017 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
One attack per month in...
NotPetyaM.E.Docs, 96% ofinitial infectionsin Ukraine
CCleanerMulti staged, selectinginterestingtargets for follow-up
Internet Security Threat Report Volume 23
Copyright © 2018 Symantec Corporation SYMANTEC
PROPRIETARY– Limited Use Only
Copyright © 2017 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Complex User Definition
Evolving Data Attack Surface
Expanding Perimeter
Multi-Phased, Multi-Staged Attacks
4
Copyright © 2017 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Complex User Definition
RegionalOffice
Headquarters Data Center
Security Stack
5
Copyright © 2017 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Complex User Definition
RegionalOffice
Headquarters Data Center
RoamingUsers
Security Stack
6
Copyright © 2017 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Evolving Data Attack Surface
RegionalOffice
Headquarters Data Center
RoamingUsers
Security Stack
7
Copyright © 2017 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Direct Connect Creates Expanded Networks to ProtectThe Expanding Network
RegionalOffice
Headquarters Data Center
RoamingUsers
SSL Encryption
SSL Encryption
Security StackSSL Encryption
8
Copyright © 2017 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Multi-Phased and Multi-Staged Attacks
RegionalOffice
Headquarters Data Center
RoamingUsers
Security Stack
SSL Encryption
SSL Encryption
SSL Encryption
9
Copyright © 2017 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Ensuring Safe Cloud UsageInnovation for the Cloud Generation:
RegionalOffice
Headquarters Data Center
RoamingUsers
10
Copyright © 2017 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Full Packet Capture
Threat Forensics
Incident Workflow
Network Recording Reconstruction
Forensics & Recording
API Cloud Integration
Data Origination and Destination Awareness
Federated User-Based Policy Enforcement
Data Discovery and Machine Learning
Classification
Real-TimeBi-Directional DLP
Data Sovereignty
Cipher and Tokenization
Inline Enforcement Based on Policy
Encryption &Tokenization
Regulatory
Big Data Visualization
Compliance Standards, Reporting
& Enforcement
Reporting &Audit
Mobile Device Protection
Machine Learning
Anti-Malware Engine
Black/White Listing
File Reputation
File Prevalence and Frequency
Endpoint
WebProtection
Internet Classification
Malnet & Reputation
Machine Learning
Multi-Language
Real-Time Risk Scoring
Isolation of Web Traffic
Analytics &Intelligence
Cloud SOC
Anomaly Detection
User Risk Analysis
Cloud Application Risk Scoring
Artificial Intelligence
Integrated Cloud Data Analysis
API Cloud Integration
Machine Learning Data Algorithms
Real-Time Data Aggregation
Data Visualization and Compliance
Reporting
Access &Authorization
Inline Policy Enforcement
Federated Identity Integration
Granular Access Policy for Thousands of Cloud Applications
Advanced Malware
Customizable Detonation
Environments
Real-Time Detonation and
File Analysis
Evasion & Obfuscation
Detection
Visibility &Discovery
Application Identification
Library
Risks Scoringper Application
Compliance Reporting for Sanctioned &
Unsanctioned Apps
Light-weight agents
Low latency communications
Anomaly Detection
Cloud-based PKI & Device Certification
Compliance with IoT Standards
Device / IoT
Messaging
Targeted Attack Protection
Malware & Spam Filtering
Data Loss Prevention
Encryption
Anti-Phishing
Protection &Security
Compliance &Governance
Demands of the Cloud GenerationNeeds Across the Cloud Continuum
11
Copyright © 2017 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
12
Protection &Security
Compliance &Governance
Forensics & Recording
Real-TimeBi-Directional DLP
Encryption &Tokenization
Reporting &Audit
Endpoint
WebProtection
Analytics &Intelligence
Integrated Cloud Data Analysis
Access &Authorization
Advanced Malware
Visibility &Discovery
Device / IoT
Messaging
Demands of the Cloud GenerationVendor Sprawl Across the Cloud Continuum
Copyright © 2017 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Symantec Integrated Cyber Defense Cloud Platform
End
po
int
Web
Pro
tect
ion
Ad
v. M
alw
are
Fore
nsi
cs &
R
eco
rdin
g
An
alyt
ics
&In
telli
gen
ce
Encr
ypti
on
&To
ken
izat
ion
Clo
ud
Dat
aA
nal
ysis
Bi-
Dir
ecti
on
alD
LP
Acc
ess
&A
uth
ori
zati
on
Rep
ort
ing
&
Au
dit
Vis
ibili
ty &
Dis
cove
ry
Dev
ice
/ Io
T
Mes
sagi
ng
Delivering a Simplified Security ModelConsolidating Cloud Security
13
Copyright © 2017 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Web Isolation
Endpoint Protection
Mobile
WebSecurityService
DLPSecure Web Gateway
RiskInsight
MessagingGateway
Web Application Firewall
Advanced Threat Protection
MalwareAnalysis
EndpointManagement
Endpoint Protection
& EDR
Endpoint Protection
CloudVIP
Identity
LocalIntelligence
File
UR
L
Wh
itel
ist
Bla
cklis
t
Cer
tifi
cate
Mac
hin
e Le
arn
ing
SIEM Integration
Data Center Security
EncryptionContent Analysis
Performance Optimization
Cloud DLP CASB
Email Security
WorkloadProtection
Cloud Sandbox
Encryption
Risk &Compliance
Management
EncryptedTraffic
ManagementSecurity Analytics
Third Party Ecosystem
ON
P
RE
MIS
ES
CLO
UD
Cloud Data Protection
StorageProtection
Cyber SecurityServices
14
SOC Workbench
ON
P
RE
MIS
ES
Integrated Cyber Defense Platform
Copyright © 2017 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 15https://www.symantec.com/integration
Thank you