![Page 1: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/1.jpg)
VISIT 2010 – Fujitsu Forum Europe 1
![Page 2: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/2.jpg)
Cloud Computing – Room 13b
Shapingtomorrowwith you.
Confidence in the Cloud –with Symantec and Fujitsuwith you. y j
Andreas ZeitlerVice President EMEA Central, Symantec
10:00 h10:00 h
VISIT 2010 – Fujitsu Forum Europe
![Page 3: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/3.jpg)
3
![Page 4: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/4.jpg)
Confidence in the cloud –i h ji dwith Fujitsu and Symantec
Andreas ZeitlerRegional Vice President EMEA Central
4
![Page 5: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/5.jpg)
MegatrendsMegatrends
• Consumerization of IT
• IT‐ization of Consumer
• Mobility
• Virtualization
• CloudCloud
• Social networks
5
![Page 6: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/6.jpg)
IT Must Evolve to Meet New DemandsIT Must Evolve to Meet New Demands
InformationInformation--CentricCentricCentricCentric
SystemSystem--SystemSystemCentricCentric
• Driver: Business automation
• Driver: Agility with collaboration and knowledge sharing
• Data: Distributed unstructured• Data: Centralized, structured
• Infrastructure: Physical
Data: Distributed, unstructured
• Infrastructure: Virtual, cloud, outsourced
• IT focus: Systems tasks • IT focus: Information tasks
6
![Page 7: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/7.jpg)
The Information‐Centric Model
7
![Page 8: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/8.jpg)
Three challenges of todayThree challenges of today
8
![Page 9: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/9.jpg)
Stuxnet – FactsStuxnet – Facts
9
![Page 10: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/10.jpg)
Stuxnet: Incursion
• Spreads by copying itself to USB drives
LNK vulnerabilityAttacker Victim
– LNK vulnerability
– Autorun.inf
• Spreads via network shares
• Spreads using 3 known and 2 Zero‐day Microsoft vulnerabilities
MS08 067 (vulnerability used by Conficker)Employee
– MS08‐067 (vulnerability used by Conficker)
– LNK: allows automatic spreading via USB keys
– Printer Spooler: allows network spreading to remote machines
Co workers
remote machines
– Undisclosed 1: local privilege escalation vulnerability
U di l d 2 l l i il l tiCo‐workers – Undisclosed 2: local privilege escalation vulnerability
• Default password in Siemens WinCC
10
![Page 11: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/11.jpg)
Denmarkmypremierfutbol.commypremierfutbol.com
••Malaysia
todaysfutbol.com
••
y
![Page 12: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/12.jpg)
Denmarkmypremierfutbol.commypremierfutbol.com
••Malaysia
todaysfutbol.com
••
y
![Page 13: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/13.jpg)
Denmarkmypremierfutbol.commypremierfutbol.com
••Malaysia
todaysfutbol.com
••
y
![Page 14: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/14.jpg)
The victim: S7‐315‐2 and 417 –plus the new 1200 seriesplus the new 1200 series
Siemens S7‐300
14
![Page 15: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/15.jpg)
Percentage of Stuxnet infected hosts withSiemens Step 7 software installerdSiemens Step 7 software installerd
15
![Page 16: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/16.jpg)
Number of new infections by countryNumber of new infections by country
16
![Page 17: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/17.jpg)
Fararo Paya und Vacon2 – 807 – 1410 Hertz for months2 – 807 – 1410 Hertz for months
17
![Page 18: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/18.jpg)
First install of StuxnetFirst install of Stuxnet
18
![Page 19: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/19.jpg)
Infection mechanismInfection mechanism
19
![Page 20: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/20.jpg)
White: Stuxnet Yellow: original Simatic files used for by Stuxnet
f d bl kGrey: System functions Green: Stuxnet data blocks20
![Page 21: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/21.jpg)
How to protect agains Stuxnet
Application hardening
• Symantec Critical System Protection Policies in kernel filter driver mode
Application hardening
•Identify inappropriate access to sensitive information•Identify and clean up internal data spills
Data Loss Prevention
y p p
•Many infection vectors appear to be delivered by removable media
Removable Media Device Control
•Many infection vectors appear to be delivered by removable media•Restrict automatic launch of content on removable media
Hardening of Information-Repositories
•Core repositories of intellectual property are primary targets
g p
21
![Page 22: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/22.jpg)
Symantec’s Enterprise Vision
Confidence in the Connected World
S d f i iSecure and Manage Your Information‐Driven Enterprise, across Physical, Virtual, and Cloud
22
![Page 23: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/23.jpg)
Dynamic infrastuctureDynamic infrastucture
Manage Take Advantage Leverage Hosted Private Clouds of Public Clouds Services
2323
![Page 24: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/24.jpg)
Dynamic InfrastructuresDynamic Infrastructures
Dynamic Infrastructures
Managed Infrastructure
Managed OfficeManaged Data Center
Managed Maintenance
ServiceDesk
Infrastructure Workplace as a S S i S S i
Managed Maintenance
Infrastructure as a service
o p ace as aService
Server as a Service Storage as a Service
Infrastructure Solutions Office SolutionsData Center Solutions
Infrastructure Products & Services
Network
Server ClientsStorage
Infrastructure Software
Copyright 2010 FUJITSU LIMITED
24
![Page 25: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/25.jpg)
Symantec Infrastructure Solutions for Cloud Computingfor Cloud Computing
Cloud Requirements
KeyTechnologies
Symantec SolutionsRequirements Technologies
Virtualized servers
Virtualized storage
Solutions
Security & Compliance
Storage ManagementService-based
Scalable and Elastic Virtualized storage
Scale out architectures
Automated HA/DR
C dit HW
Storage Management
Clustered Storage
Backup and Archive
A il bilit
Scalable and Elastic
Shared
Quality of ServiceCommodity HW Availability
Endpoint Virtualization
Cloud Advisory Svcs
25
![Page 26: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/26.jpg)
Symantec ‘s IT Security Strategy – also for clouds
Develop and EnforceDevelop and Enforcell
Policy Driven and Risk BasedIT PoliciesIT Policies
Information andProtect the Information Information and Protect the Information
Authenticate Identities Identity Centric
Well Managed over aManage Systems
Protect the InfrastructureProtect the Infrastructure Secure InfrastructureProtect the InfrastructureProtect the Infrastructure Secure Infrastructure
26
![Page 27: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/27.jpg)
Symantec as a provider of cloud technologies
SLAActual
September 2010
Symantec as a provider of cloud technologies
AntiSpam effectiveness 99% 99.99997%
Spam false positive rate 0.0003% 0.000008%
AntiVirus false positive rate 0.0001% 0.000005%
Email & Web Service Availability 100% 100%
Average Web scanning time 100 ms 30.2 ms
27
![Page 28: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/28.jpg)
billionemails in September 91.7% spampbillionweb requests inweb requests in SeptemberMillion pieces of Malware capturedi S t 2010
1 million only by Sk tiin Sept 2010
Thousand new websites w/
Skeptic
malware or spyware were detected in Sept 2010
28
![Page 29: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/29.jpg)
Symantec isSymantec
Symantec is #1 in SaaS
G l
Other SecurityGoogle
MicrosoftIntelIntel (McAfee/MX Logic)
IDC: Worldwide Messaging Security SaaS Revenue by Vendor July 200929
29
![Page 30: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/30.jpg)
31k
33k
11m
12m
27k
29k
10m
11m
21k
23k
25k
8m0
9m
17k
19k
21k
6m
7m
15k 5m Q1
FY09Q2 Q3 Q4 Q1
FY10Q2 Q3 Q4 Q1
FY`11Q1
FY09Q2 Q3 Q4 Q1
FY10Q2 Q3 Q4 Q1
FY`11
Thousand Thousand businessesbusinesses
MillionMillionusersusersbusinessesbusinesses usersusers
3030
![Page 31: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/31.jpg)
SaaS Adoption –our shared opportunity with Fujitsuour shared opportunity with Fujitsu% of Companies Adopting Hosted Email Security
54%54%UKNordicsUS
38%USGermany
22%18%
26% 27%
15%
20%
26%
11% 13% 11%15%
5%9%
0% 1%
SoHO Small Business Medium Business Enterprise
3131
![Page 32: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/32.jpg)
Confidence Enables the CloudConfidence Enables the Cloud
Trust between cloud service providers
C fid
Trust between cloud service providers and cloud service consumers is the key enabler of the cloud model.
Information Governance
Confidence
Information Privacy
Information Management
I f ti S it
Information Availability
Information Security
32
![Page 33: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/33.jpg)
Thank you!Thank you!yy
Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
Thi d t i id d f i f ti l l d i t i t d d d ti i All ti l ti t th i f ti i thi d t ith i li dThis document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
33
![Page 34: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/34.jpg)
Digital information increased 73 percent in 2008 to an estimated g p487 billion gigabytes
80‐100 million virtual machines are being created per year or 273,972 per day or 11,375 per hour.
Number of physical servers in the World today: 50 million
By 2013 60 percent of servers workloads will be virtualized
“Market for Enterprise Cloud servers will grow from $8 4 billionMarket for Enterprise Cloud servers will grow from $8.4 billion opportunity in 2010 to $12.6 billion in 2014 (IDC)
34
![Page 35: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/35.jpg)
Symantec Solutions for Virtualization and Cloud ComputingComputing
• Symantec helps customers adopt virtualization and cloud computing with confidence:
– Manage Private Clouds
– Take Advantage of Public Clouds
L H t d S i– Leverage Hosted Services
• Adopt an Information‐centric Model to secure and manage across physical virtual and cloudacross physical, virtual, and cloud
35
![Page 36: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/36.jpg)
Encryption / ERM
EmailSecurity
Remote Access/ Monitoring
Encryption / ERM DLP
Web SecurityEndpoint Management
Monitoring
ArchivingBackup
Endpoint Protection
Addressable market in 2013
3636
![Page 37: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/37.jpg)
%%
Partners are d i iPartners are d i idriving more driving more of our growthof our growth
3737
![Page 38: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/38.jpg)
Cloud Services and Deployment ModelsCloud Services and Deployment Models
Types of Cloud ServicesTypes of Cloud Services
Infrastructure (IaaS)Servers, Storage
Platform (PaaS)Middleware
Software (SaaS)Applications
Cloud Deployment Models
Services available to Public
Private and public Hybrid
Services provided by Private
p y
the general public services coordinated to provide a solution
a single entity on behalf of that entity
38
![Page 39: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/39.jpg)
Finding ROI in the CloudFinding ROI in the Cloud
“A hybrid model will, and should, predominate for the next 10 years.” Gartner 2009Gartner 2009
39
![Page 40: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/40.jpg)
Top Challenges in Moving to a Private or Public CloudTop Challenges in Moving to a Private or Public CloudSecurity/Compliance
Price
Immature Technology
Availability
Integration w/ Existing IT PublicPrivate
Staff Skill Sets
Availability
Ability to meet SLAs
Change in Policies/Processes
0 10 20 30 40 50 60 70 80
Vendor Lock‐in
0 10 20 30 40 50 60 70 80Source: IDC, Cloud Computing Attitudes, April 2010, n = 255.
40
![Page 41: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/41.jpg)
Targeted AttacksTargeted Attacks
53% of providers of critical infrastructure have seen targeted attacks against their
Infrastructure in the last twelf months. On average they had 2 attacks.g y
41
![Page 42: Confidence in the Cloud – with Symantec and Fujitsu](https://reader033.vdocument.in/reader033/viewer/2022042716/55c757eabb61eb4d778b4684/html5/thumbnails/42.jpg)
42