st b02 profiting from the cloud new revenue streams with...

68
ST B02 Profiting from the Cloud New revenue streams with Security and Information Protection services Arnaud Taddei EMEA Cloud Solution Architect Service Providers and Telcos

Upload: others

Post on 12-Mar-2020

9 views

Category:

Documents


0 download

TRANSCRIPT

ST B02 Profiting from the Cloud New revenue streams with Security and Information Protection services

Arnaud Taddei EMEA Cloud Solution Architect – Service Providers and Telcos

SYMANTEC VISION 2012

Your Route to SUCCESS

What Matters for Telcos and Service Providers 1

Symantec Unique Value Proposition 2

Mature Services co-Launched on Market 3

Nascent Services being launched on Market 4

Securing the Cloud = Brand Protection + More $$ 5

SYMANTEC VISION 2012

What Matters for Telcos and Service Providers?

SYMANTEC VISION 2012

Key Challenges for Service Providers today … From Risk and Cost

Reducing Total Cost of Ownership

#5

#2 Reduce Churn (Improve Stickiness!)

Brand Protection #3

#4 Impact of Regulation For the SP & Their Customer

SYMANTEC VISION 2012

Key Challenges for Service Providers today … Into Opportunity for Growth!

Business Generation to Improve Revenues

#1

Reducing Total Cost of Ownership

#5

#2 Reduce Churn (Improve Stickiness!)

Brand Protection #3

#4 Impact of Regulation For the SP & Their Customer

SYMANTEC VISION 2012

Generate new Business Improve ARPU

#1

Reduce TCO Fast Time to Market

#5

#2 Reduce Churn Increase Customer Lifetime Value

Protect Brand Differentiate

#3

#4 Demonstrate Compliance

Symantec & Norton Solutions

Monetize Information Protection & Mgmt. for Consumers and Enterprises

Improve Service Levels and Customer Satisfaction

Reduce Complexity, Drive Standardization, BSS Integration

Fulfill EU Directives and Voluntary Frameworks

Protect Information and Devices (Endpoints, Servers, Carrier Network)

Key Challenges for Communication Service Providers

SYMANTEC VISION 2012

Summary of the requirements Service Provider / Telco ASK

• 5 years of Experience at Symantec shows

• Tactical Approach

– Might want to discuss one solution to put on their market

OR

• Strategic Partnership Approach

– Multiple services to launch (up to 13 per Telco so far!)

– Revenue Generation

• Which pauses the question of Sales Enablement, Channel, GTM

– AND Brand Protection (Driver 1 and Driver 3)

• Which pauses the question of the SOC

SYMANTEC VISION 2012

How to Work with Symantec on which Revenue Streams Portfolio

SYMANTEC VISION 2012

The ingredients for Strategic Partnership

New CSP

Cloud / Mobile

Services

Symantec

Services

Symantec

Products

CSPs / Outsourcers Customers

Consumers

SMBs

Enterprises Cube Architecture Framework

xSP

Licensing

Programs

Symantec

CSP Solution

Architects Service

Co-Marketing

Consume Build

Extend

SYMANTEC VISION 2012

Consume Extend Build Use Case Examples

Category Use Cases Examples

Consume • Leverage security as a service from the SYMC Cloud • Cloud management service with onprem agents • Hybrid app, onprem mgmt with a cloud module

• VIP • Email Security.cloud • BE.Cloud

Extend • Extend onprem security management with SaaS agents • Deploy security protection in IaaS • Backup to local as well as cloud storage targets

• CCS with SFDC agent • SEP agent in AWS • NBU to Nirvanix

Build • SYMC technology embedded in 3rd party cloud app • Software in public cloud to protect infrastructure • Deploy software in private cloud to protect customer

• SSL in SFDC • SMF / EV in Email aaS • CSP hardens *aaS servers

SYMANTEC VISION 2012

Customers & Target Market

Enterprise SME SoHo

Consumer Residential

M2M

The Joint Service Stack for CSPs – A Partner Play

ExSP & SSP Service Provider Buying Programs “Pay as you grow” Shared & Managed Services

SYM

AN

TEC

CSP

SER

VIC

ES E

NA

BLE

MEN

T

Symantec.cloud, NGNP, SBTS, SBMF, Norton Power Eraser

Deepsight, SymDroid, Reputation Services, MSS

Norton DNS, Norton Identity Safe

SEP, Norton Internet/Mobile Security, SCSP

Client Management Suite, Symantec Mobile Management

Apps Center

PGP, O3, Norton Anti-Theft, Norton Hotspot Privacy

VIP, VIP Mobile, MPKI

MPKI for Device Authentication (Smart Meter, ...)

Storage Foundation, VOM

BE.cloud, NBU, Norton Online Backup, Norton 360

Norton Zone

EV. Cloud, Enterprise Vault, NGNP (Mobile Messaging)

Control Compliance Suite, DLP, Vulnerability Mgmt.

NGNP Enterprise / Parental Controls

O3

Clean Pipe Services

Security Intelligence Services

Safe Web Services

Endpoint Security Services

Endpoint Mgmt. Services

Encryption Services

Authentication Services

Storage Services

Backup Services

Sec. Personal Cloud Services

Archiving Services

IT Compliance Services

Corp. & Cons. Control Serv.

Cloud Brokerage Services

Application Mgmt. Services

Secure M2M Services

Personal Care Services Norton Live Services

SYMANTEC VISION 2012

What is trend vs nascent? (includes Residential, SOHO, SMB, Enterprise segments)

• Current areas of Services being launched

– Clean Pipe (including Core Network, Mail Traffic, Web Traffic, etc.)

– Data Protection (including Backup, Cloud Backup, Archiving, etc.)

– Endpoint Security (Fixed, Mobile Devices, etc.)

– Cloud Brokerage (includes O3, .cloud in Market Places, etc.)

• Nascent Situations

– Public SOC powered by MSS to secure the cloud + to provide Public SOC

– Many new demands to extend clouds with Encryption, VIP, CSP, DLP, etc.

– From Securing the Cloud as a major concern …

– … To turn the problem into a new revenue stream with CCS, DLP, CSP, etc.

SYMANTEC VISION 2012

Some Clean Pipe Use Cases

SYMANTEC VISION 2012

Clean Pipe is a fundamental topic

• 2 Marketing Good News

– Tap Water as we know is ‘clean’ … What’s coming out of Data Pipes is ‘dirty’

– How to market water … it is the same for everyone. Yet, Nestlé, etc. gave it a brand!

• Limited to Messaging Security 5 years ago

• Impacted by the Outbound Spam issues 4 years ago

• Moved to Web Security 3 years ago

• Entered Core Network Security 2 years ago

• Now under re-definition

– Parental Control, Anti-Botnet,

– SMS Anti-Spam, SMS Anti-Fraud,

– Country level Data Rentention projects

– Strong Link to the Device (see Device and Endpoint based Services)

SYMANTEC VISION 2012

TELENOR– Secure Messaging services to Enterprises

• Customer Requirements:

– Clean Pipe Solution…

– …with per customer quarantine

– …and Customer Self-Care

– Not exactly the best fit for Symantec Messaging Gateway !

• Architect’s job

– Collect the bricks to build a solution from the requirements

– Find a messaging technology partner: Message Systems

– Build the architecture with Symantec products: Traffic Shaper and Message Filter

– Articulate the requirements to cover the missing features

– Adapt the Solution to moving requirements !

Partnering for success – Building solution competition cannot

SYMANTEC VISION 2012

TELENOR– Secure Messaging services to Enterprises Final Architecture

Web UI

Sun T6320

Momentum Cluster Manager

Sun T6320

Momentum Cluster Node

N+1 Failover

Sun T6320

Symantec Brightmail

Traffic Shaper in active-

active

Database Synchronisation

VIP1

VIP2

VRRP

Failover

Internet

Web Server Zone

Postgres DB zone

Quarantine Zone

Quarantine

Storage

Mail routing decision based

on Customer preferences

Delivery to Quarantine based

on domain or user preferences

Customer

AdminCustomer Admin

modifies domain and user preferences

Queue

Storage

DB and

Logs

SYMANTEC VISION 2012

TELENOR– Secure Messaging services to Enterprises Immediate benefit to Telenor’s customer

90% Spam volume decrease

200% Clean mail volume increase

SYMANTEC VISION 2012

NGNP: Network-based security management

SGSN INTERNET

GGSN

MMSC SMSC

Mail WAP

Radio Access Network (RAN)

Consumers

Mobile Core Network Service Layer Internet

Next Generation

Network Protection

Subscriber Notification and Malware Recovery Option

Virus

Enterprises NGNP addresses both customer segments, consumer and enterprise

Traffic Analysis Module

Malware Recovery Option

SYMANTEC VISION 2012

NGNP: Cross-selling the Norton portfolio

SGSN INTERNET

GGSN

MMSC SMSC

Mail WAP

Radio Access Network (RAN)

Consumers

Mobile Core Network Service Layer Internet

Next Generation

Network Protection

Subscriber Notification and Malware Recovery Option

Virus

Enterprises NGNP addresses both customer segments, consumer and enterprise

Traffic Analysis Module

Malware Recovery Option

• Norton Internet Security • Norton Mobile Security • Norton Tablet Security • Norton 360 • Norton Power Eraser, ...

SYMANTEC VISION 2012

Features of “Parental Control”

1. Content Filtration

Offers different categories to block the content, including the pre-defined ones for the different age of child.

«up to 7 years», «from 7 to 12 years» «older 13 years» + 6 additional options

2. Time control Allows to limit the internet connectivity for the child, by managing daily and weekly calendar.

3. Report about visited Internet resources

Allows to get the detailed report about internet sites visited by children by getting it to the e-mail on weekly or monthly basis.

Additional option

Network antivirus

Provides high level protection for downloading traffic, no software installation to the client PC is required

Total solution from “Beeline” «Parental Control» is implemented according to clean pipe principle - negative

Internet content is not delivered to home, connected to the service.

SYMANTEC VISION 2012

Some Data Protection Examples

SYMANTEC VISION 2012

Data Protection is entering new patterns

• From Hosted Backup and Archive 5 years ago (Cybernest)

• To Remote Backup Services 3 years ago (HP)

• Now to new patterns

– Cloud Backup (a la Nirvanix)

• A push model that helps cloud transformation

– That is pushing the need for APPLIANCES (everyone forgets RESTORE!)

– Cloud based Backup

• NOBU for File Restore and BE.Cloud

– And Cloud Archiving

• EV.Cloud

– To Collaboration Services

• Norton Zone

SYMANTEC VISION 2012

Who is Cybernest?

• Telkom SA is the incumbent Fixed Line Telco in South Africa

• Telkom SA has two strategic new business development initiatives in South Africa

– Mobile Services

– ICT Services

• Cybernest was formed to target the hosted IT services landscape in South Africa

– Portion of the internal IT operations wrapped into a separate branded business unit

– Existing 20 years of supporting Telkom turned into an entity with external focus and revenue generation objectives.

SYMANTEC VISION 2012

The Target Solution Implemented

• Consolidate the different back up environments to Netbackup

– One Simple Licence Model

– Leverage the scale across different areas for cost improvement

– Deploy Netbackup Reporter across all environments for improved management visibility

• Drive a Disk Based Backup Solution

– Leverage Symantec Pure Disk features for Data Deduplication and remote site replication

• Reduce Tape Libraries to two instances

– Tape capability in place if recovery of old backups needed

– Some Companies' policies still require Tape and have not yet matured to support Disk only

SYMANTEC VISION 2012

• Improved Efficiency

– Increased Backup Success

– Reduced Restore failures

• Cost Benefits

– Significant Operational Cost reduction

• Competitive Service Offering

– Enabled Tiering and Remote Site Backups

– Competitively Priced Offering

Benefits Derived Summary

With Margin still 60%+

Cheaper than Local

Competitor on

$/Gb/Month offering

With Margin for 10

server, average 5Gb/svr

backup image- 16%+

Cheaper than Large

Cloud Backup Provider

SYMANTEC VISION 2012

Simplified backup to the cloud

SYMANTEC VISION 2012

Secure Storage Offer

Storage Node

Bern

Geo redundancy

• Geo redundancy thanks to two

storage nodes in the Swisscom

Data Centre

• 99.99% availability

• Access via the Swisscom

network

• Data security guaranteed via

several protection mechanisms

• Exceptionally scalable from von

GB to PB

• Web-based Management

Swisscom

Netz

Storage Node

Zürich

SYMANTEC VISION 2012

Application

Secure Storage NAS

Virtual Disk

Storage Pool

X

MO

Secure Storage Concept SSL transport with Encryption

IP Plus

Zürich

Bern

Internet

Secure Storage Customer network

Customer Server

X

X

SAP

Service Access Point: Secure Storage on IP-Plus Backbone

Storage Pool: logical storage area

Managed Object (MO)

Swisscom

Extranet

Storage Pool

Storage Pool

MO

SYMANTEC VISION 2012

Symantec is Archiving

EV On premise

EV Private Cloud

EV Hybrid Cloud

EV.cloud 100% SaaS

The Enterprise Vault suite represents a large ecosystem of technologies providing customers with different levels of information management capabilities, regardless of […] their internal information governance processes.

SYMANTEC VISION 2012

Enterprise Vault.cloud - Retain Control & Offload The Burden

Enterprise Vault.cloud

Email Storage Management

Email E-Discovery

Email Compliance¹

Mailbox Continuity option

Purely Hosted

• No hardware, software, or plug-ins to install and maintain • Low upfront investment & total cost of ownership • Flat fee per mailbox per month includes service upgrades

Unlimited Storage & Rapid Search

• Unlimited email storage and retention • Rapid search results from scalable grid architecture • No mailbox size limits for end users

Enterprise-class Infrastructure & Security • Redundant, scalable, Tier 4 data centers • Data encrypted in transit & at rest • 24/7/365 support included in cost of service

¹ AdvisorMail in Symantec.cloud

SYMANTEC VISION 2012

Eskom (Electricity Supply Commission)

Company:

Transaction: $1,944,000: 30000 users of EV.cloud (growing to 36000 next year)

Sponsor: Sean Maritz – Infrastructure Special Projects Director

Sales Cycle: 8 months

Purchase Driver: Eskom is migrating from Groupwise to Exchange 2010. This will triple storage requirements,

preferred a managed outcome (unlimited storage SLA). Exchange is now centralised so the need

for email continuity is a priority. Compliance and eDiscovery mandate to be implemented.

What’s different

about this one?:

Eskom is a parastatal organization. The legal, compliance and security requirements for a cloud

based solution that Eskom have agreed with Symantec.cloud sets a precedent for public sector to

follow. Eskom has become a “lead agency” for cloud adoption.

Mimecast had been working on this opportunity for 2 years, would have been their largest

customer globally. The cloud team in South Africa – based on positioning EV.cloud as a managed

outcome – were given the opportunity to suggest mandatory criteria for solution selection.

Favorite Aspect of

the Deal:

Eskom generates approximately 95% of the electricity used in South Africa and

approximately 45% of the electricity used in Africa. Eskom generates, transmits and

distributes electricity to industrial, mining, commercial, agricultural and residential customers

and redistributors.

SYMANTEC VISION 2012

Some Cloud Brokerage Use Cases with O3 and with .Cloud

SYMANTEC VISION 2012

Cloud Brokerage

• End Customers are using 20+ different Clouds TODAY in EMEA

• Telcos have no time to BUILD, they want to act as BROKER

• Different ways to offer value

– Leverage Symantec .cloud services via a Market Place

– Offer a managed O3 as a Cloud Firewall to the brokerage

– Securise the Cloud Management Platform

• openstack-based, VMWare, Parallels, Jamcracker, AppDirect, etc.

SYMANTEC VISION 2012

Anti-Spam

Anti-Virus

Image Control

Content Control

IM Anti-virus IM Content Control

Email Security.cloud Web Security.cloud

Archiving

Email Management.cloud

Continuity

URL filter Anti-Spyware Anti-Virus

Roaming User

Endpoint Protection.cloud

Endpoint Protection

Email Encryption.cloud

Policy Based Encryption Boundary Encryption

IM Security.cloud

34

SYMANTEC VISION 2012

Step 1:- Customers are directed to CDW online store to trial

Customer clicks on free trial

link

SYMANTEC VISION 2012

The Security Problem

Can control Identity?

Joe

Smith Identity control

Can you do Security Information Management?

Logs

Events

Security Information Management

Data Leakage?

Data Loss Prevention

Controls, Audits and Compliance?

CCS

Control Compliance Suite

CISO Perimeter Locked to ‘Physical’ IT

SYMANTEC VISION 2012

O3 Gateway

Any SAAS or Web Application

Internal or External

Any user store

(ADS, LDAP,

RDBMS)

Any user on any device

P

• SYMC hosted Web console

• Multi-tenant

• Service & ID centric policy definition

• Gateway configuration

• Policy synchronization

• Gateway Status Monitoring

• Runtime engine

• Policy enforcement point

• Single tenant

• Access broker or proxy

• Information security gateway (proxy)

• 2 Network Interfaces - Portal and Monitoring

• Hosted or managed

O3 Intelligence center

M

Admin with optional

strong auth redential

SYMANTEC VISION 2012

CISO Landscape with O3

CISO Sets Policies

Joe

Smith

Identity, SSO and Federation are Controled

Logs

Events Normalised

Data Loss Protection

CCS

Controls and Compliance

SymForce (Universal Collector for CCS)

Identity control

Security Information Management

Data Loss Prevention

Control Compliance Suite

Coming Coming

SIM + MSS in H2 2012

CISO Perimeter extended to the Cloud

Cloud is not toxic anymore but a business opportunity

SYMANTEC VISION 2012

O3 for Telcos

• Demonstrated by Orange Business Services at

– Les Assises de la Sécurité: French Speaking biggest Security Event

(at Monaco in October)

• What matters for a Telco:

– O3 at the breaking point between the MPLS vs the International network

– A telco can offer a differenciated bundle with the pipes

– Augments Clean Pipe!

SYMANTEC VISION 2012

Endpoint and Devices

SYMANTEC VISION 2012

Endpoint Services Revolutionized with Mobility

• Firstly are you offering Endpoint Security Services?

– Aware of the major success stories on Norton for Consumers?

– With a SEPaaS approach like A1?

– Leveraging SEP.Cloud?

• Are you offering Endpoint Management Services?

– With EMMaaS approach?

• Mobility

– Want to base your service on a multitenant MDM Solution?

– Or more interested by an AppCenter approach (Nukona)?

– (See presentation from Lionel Gonzalez ST B03)

SYMANTEC VISION 2012

The Customer

• A1 (Telekom Austria)

– National Incumbent Telco in Austria

• Fixed & Mobile Operator servicing Residential and Business Customers

• Revenues of over €4Bn ($4.5Bn)

– Market Share

• Fixed (Broadband): 51% (1.2M subscribers)

• Mobile (All): 41% market share (5.1M subscribers)

– A1 Build and also Consume Cloud Services

• Interested in hosting services for smaller ISPs

– 3 Datacenters in Austria

• Operators and DCs in 5 other countries across Central & Eastern Europe

SYMANTEC VISION 2012

Project Overview

• Cloud Categorization (Cube Model)

– SaaS, Public Cloud for SMB & Enterprise

• Project Goals

– Bring a hosted security offering to market for B2B customer consumption • One platform for all customers

• Ability to integrate with / support existing portal

– No exposure of the management portal

• Packaged Self Care for SMB

• Self Management for Enterprise

• Key challenges

– Portal integration

– Flexible Multi-tenant management/reporting

• Competition

– McAfee

– F-Secure

SYMANTEC VISION 2012

Symantec Fit

• Leadership

– Security Leader

– Market Knowledge

– Industry Awards

– SMEs

• Differentiators

– Integration to existing portal

• Provisioning, Management, Reporting

• API

– Performance (Manager and Client)

– Scalable, Resilient architecture

SYMANTEC VISION 2012

Solution Architecture

SMB

Enterprise

Symantec Endpoint

Protection Manager

Service Provider’s Data Center

Microsoft SQL Server

DB

Self Care Portal

Symantec Endpoint

Protection Manager

Microsoft SQL Server

DB

Service Provider’s Data Center 2

Portal provisions new customer and users

SMB customers get access to pre-package Endpoint Security offerings

A predefined deployment packaged is made available for download SEP automatically

retrieves security policies and updates

Enterprise customers will get a dedicated portal to offer more flexibility in the service definition

SEP installation package is created on demand and made available through the portal

Deployment and Migrations made easy with Symantec Endpoint Protection Integration Component

Disaster recovery requires a second SEP Manager deployment with synchronization

Above 5000 users, the use of an external database is recommended

SEP Manager will then scale horizontally

Clients can be configured to failover between sites

SYMANTEC VISION 2012

Technical Sales Process & Lessons Learned

• Standard Service Provider Sell

– Cube methodology, Expertise, References, PoC, RFP

– Gain thought leadership - Write the RFP => Win!

– Take the risk out of saying “Yes”

• Perception is reality

– Make sure the POC has close fit with production environment

– Make sure all costs (esp MS Stack) are understood

• Set expectations to include Professional Services & Education

– Customer built there own integration for API

– They did not know SEP

– They did not know the architecture or best practice for deployment

– They did not know how to operate the platform efficiently and effectively

• Objections

– Difficult to deploy

– Difficult to differentiate to customer and sell value

– Intrusive & resource heavy client will impact user experience

– Price

SYMANTEC VISION 2012

SOC and Public SOC

SYMANTEC VISION 2012

SOC and Public SOC

• SOC = Security Operations Center

– BIG problem for Telcos and Service Providers: NO SOC

– NO SOC = NO PROOF that the Cloud Services are Safe

– All good but examples of Services hacked in the first hour

– Brand Reputation at Risk

• Recipe for Success

1) Leverage Symantec Managed Security Services MSS

2) Turn the problem into an advantage and offer MSS Services to your customers

Move to a Public SOC

SYMANTEC VISION 2012

• Hosted Log Retention Service

– Per device or Enterprise wide option

• Security Monitoring & Analysis Services

– Essential or Advanced Service

– Per device or Enterprise wide option

• Vulnerability Management Service

• VeriSign® Internet Defense Network

• Symantec DeepSight™ Intelligence Services

– DeepSight Starter Pack / Advanced Pack

– DeepSight 8.0 Silver, Gold, and Platinum Early Warning Services

– DeepSight DataFeeds 4.0

• Managed Firewall Protection

– Essential (limited changes/assistance)

– Advanced (unlimited)

• Managed IDP Protection

– Advanced (fully-managed only)

• Managed Endpoint Protection

– Essential (co-managed)

– Advanced (fully-managed)

• Symantec IDP Solution with Sourcefire™

• Symantec Security Information Manager

MANAGED SECURITY SERVICES

Symantec’s Threat Monitoring & Reporting Solutions

INTELLIGENCE SERVICES ON-PREMISE SOLUTIONS

SYMANTEC VISION 2012

Causes of a Security Incident

System Vulnerabilities

System Misconfiguration

User Activity Prevention Edge to Endpoint

Visibility Global

Intelligence Context and Relevance Detection

SYMANTEC VISION 2012

Protecting the Enterprise – A Solution Framework

Target Attacks Threat Trends Vulnerabilities Malicious Code Fraud Activity

Retain Analyze Advise

Collect Remediate

Threat Intelligence

Analysis & Prioritization

Visibility & Control

Sustainable Operations

24 x 7 Global Budget Staff

SYMANTEC VISION 2012

Protecting the Enterprise – Symantec’s Unique Solution

Target Attacks Threat Trends Vulnerabilities Malicious Code Fraud Activity

Retain Analyze Advise

Collect Remediate

Threat Intelligence

Analysis & Prioritization

Visibility & Control

Sustainable Operations

24 x 7 Global Budget Staff

Unparalleled Intelligence

Context and Relevance Actionable Guidance

Edge-to-Endpoint Monitoring

Security Expertise 24x7, Global Leadership

Threat Intelligence

Analysis & Prioritization

Visibility & Control

SYMANTEC VISION 2012

Symantec MSS Capabilities

Threat Intelligence

Attack Activity • 240,000 sensors • 200+ countries

Malware Intelligence • 133M client, server,

gateways monitored • Global coverage

Vulnerabilities • 40,000+ vulnerabilities • 14,000 vendors • 105,000 technologies

Spam/Phishing • 5M decoy accounts • 8B+ email messages/day • 1B+ web requests/day

Identifies more threats, takes action faster & prevents impact

Symantec™ Global Intelligence Network

SYMANTEC VISION 2012

Solution Spectra vs Customer Subsegment Mapping

Different Customers means Different Solutions

SYMANTEC VISION 2012

Services overview: Event and incident management

Service overview

• Near-real time logging, and monitoring

• Log correlation with other technologies and Symantec’s

Global Intelligence Network

• Log analysis and incident identification

• Incident escalation, tracking and closure

• Automatic inclusion of logs from Log Retention Devices

Key functions

• 24x7 log monitoring and incident management

• Correlation against other systems

• Correlation against Symantec Global Intelligence Network

(GIN)

Business value

• Prioritised alerts

• Remediation plans

• On-call support for critical vulnerabilities

• Management reports and dashboards

Key outputs

SYMANTEC VISION 2012

Securing the Cloud

SYMANTEC VISION 2012

The Cube The Symantec SP Framework to support Service Providers in building own

customized data and security services for their target markets

SYMANTEC VISION 2012

MiniCubes Vizualized

58 CSP Cube

SYMANTEC VISION 2012

MiniCubes participating into an SMB and Enterprise Service

Cube Principles In Action

Their Interfaces are now in Play

They are part of a Service

They are sourced, built and are making money $

SYMANTEC VISION 2012

Cube principles in action – Virtual Desktop Infrastructure

SYMANTEC VISION 2012

Cube principles in action – Virtual Desktop Infrastructure

SYMANTEC VISION 2012

CSA Security Guidelines : Domains

• Cloud Computing Architectural Framework Cloud Architecture

• Governance and Enterprise Risk Management

• Legal and Electronic Discovery

• Compliance and Audit

• Information Lifecycle Management

• Portability and Interoperability

Governing in the Cloud

• Traditional Security, Business Continuity, and Disaster Recover

• Data Center Operations

• Incident Response, Notification, and Remediation

• Application Security

• Encryption and Key Management

• Identity and Access Management

• Virtualization

Operating in the Cloud

SYMANTEC VISION 2012

Governing the Cloud

Cloud Security Alliance Domains

Governance and Enterprise Risk Management

Legal and Electronic Discovery

Compliance

Audit

Information

Lifecycle Management

Portability

and Interoperability

Service

Platform

Infrastructure

SYMANTEC VISION 2012

Operating the Cloud

Cloud Security Alliance Domains

Traditional Security, Business Continuity,

and Disaster Recovery

DataCenter Operations

Incident

Response Notification Remediation

Application

Security

Encryption

And Key

Management

Identity

and Access Management

Virtualization

Service

Platform

Infrastructure

SYMANTEC VISION 2012

Symantec Security Information Manager Event Correlation Incident Management Remediation Log Retention Security Monitoring DeepSight

Control Compliance Suite Policy Management Technical Controls Reporting and Remediation

Infrastructure Security Infrastructure Layer

Distribution Network

Storage

Network

Security Information Management

Processing

Mirroring or Replication

Storage Virtualization (heterogeneous) Volume Management

SFHA (Storage Foundation HA)

FileStore

SAV for NAS AntiMalware at Storage level

Data Loss Prevention Discover Data Insight

Brightmail Trafic Shaper Antispam at Network

Endpoint Protection Critical System Protection Endpoint Protection System Hardening Exploit Prevention

Cluster

Veritas Cluster Service Geographical Cluster Business Continuity

Data Loss Prevention Network Prevent Monitor

Altiris Server Management Suite Provisioning Automation Monitoring Remediation

IPS/IDS

NetBackup Backup Data Retention Business Continuity

Enterprise Vault eDiscovery Data Retention

Web Gateway BotNet Detection

Brightmail Gateway Antispam Encryption

Symantec.cloud Web Security Messaging Security

Symantec Managed Security Services Event Correlation Incident Management Remediation Log Retention Security Monitoring

SYMANTEC VISION 2012

Conclusions

SYMANTEC VISION 2012

Symantec Envisions Future Clouds as Safe Clouds

• Great article

http://www.symantec.com/about/news/release/article.jsp?prid=20121105_01

• Forthcoming Blog

Thank you!

Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

Arnaud Taddei

[email protected]

+41 79 506 1129