Building a Cyber Resilient Network with Symantec
Chris Collier
Presales Specialist - Security
Agenda
–What is Cyber Resilience?
–Current Threat Landscape
–Symantec Global Intelligence Network
–Symantec Security Solutions Overview
–Summary
–Q&A
2
What is Cyber Resilience?
4
Cyber Risk & Resilience
TODAY’S APPROACH NEEDS TO BE RE-IMAGINED.
Hyper Connected
World
Rapid IT Evolution
Agile Targeted Threat
Cyber Risk
Increased dependency on
connected services and information
exchange
(i.e. Online & On-Demand Web and
Cloud Services)
IT platforms, devices & services evolving at a pace
we have never seen before
(i.e. Mobile, Virtualisation, Social Media Technologies)
Threats & Actors leveraging hyper
connectivity, IT evolution and weak traditional
boundary style security approaches
(i.e. APT’s, Hackitivism, Insider Abuse,
Reputation Damage)
INCREASEED BUSINESS
IMPACT
What is Driving Cyber Security Phenomena?
Current Threat Landscape
Current Threat Landscape - ISTR
Current Threat Landscape – Targeted Attacks
Current Threat Landscape – Data Breaches
1200 x Laptops lost/stolen every week
40% of ex-employees take data with them
Average cost of data breach – £1.9m
Current Threat Landscape – Mobile Threats
Summary
• No business is safe from attack – regardless of its size
• Attackers are being more selective in who they target
• Obtaining information is key – if an attacker could make money from it, it’s a potential target
Below are some qualifying questions that can help you determine a security solution requirement:
• What are you currently doing to safeguard your data?
• How are your emails protected?
• Do you use mobile devices in your organisation?
• What industry regulations do you have to comply with?
• How are you protecting your end users workstations?
Symantec Global Intelligence Network
Global ExpertiseMore researchers
Comprehensive data sourcesMore virus samples analyzedExtensive customer support
In-depth AnalysisSignatures: AV,AS,IPS,GEB,
SPAM, White listsDeepSight Database
IT Policies and Controls Rigorous False Positive Testing
Automated UpdatesFast & Accurate
Variety of Distribution MethodsRelevant Information
Relevancy
Accuracy
Protection
ResponseCenters
Users
Symantec Security IntelligenceGlobal Intelligence Network
Symantec Security Solutions Overview
Symantec Security Strategy
Global Intelligence Network (GIN)
200+m Nodes Globally
40% Global email Monitored
2.5+m “decoy” accounts
200+ Countries
Enforce IT Policies
Control Compliance Suite (CCS)
Protect Information
Data Loss Prevention & Encryption
(DLP/PGP)
Trusted Interactions
Protect The Infrastructure
Symantec Protection Suite (SPS)
Manage & Remediate
Altiris (ITMS)Managed Security Services (MSS)
Mobile Devices
Mobile Management Suite/ Appcenter
(MDM)
Critical SystemsSymantec.cloud
Protect Interactions
Critical Systems Protection (CSP) Symantec VIP
WorkflowO3
Summary
• Most extensive portfolio of businessprotection solutions available
• More experience – 30+ years of protectingthe world’s systems and information
• Comprehensive and up-to-date protection against the latest threats
• Market leadership - in both security and data protection
• Trusted technology - Symantec protects 99% of the Fortune 500
Symantec Protects More Businesses
Information ProtectionPreemptive Security Alerts Threat Triggered Actions
Global Scope and ScaleWorldwide Coverage 24x7 Event Logging
Rapid Detection
Threat Activity• 240,000 sensors• 200+ countries
Malcode Intelligence• 130M client, server,
gateways• Global coverage
Vulnerabilities• 32,000+ vulnerabilities
• 11,000 vendors• 72,000 technologies
Spam/Phishing• 2.5M decoy accounts
• 8B+ email messages/daily• 1B+ web requests/daily
Questions?