st b02 profiting from the cloud new revenue streams with...
TRANSCRIPT
ST B02 Profiting from the Cloud New revenue streams with Security and Information Protection services
Arnaud Taddei EMEA Cloud Solution Architect – Service Providers and Telcos
SYMANTEC VISION 2012
Your Route to SUCCESS
What Matters for Telcos and Service Providers 1
Symantec Unique Value Proposition 2
Mature Services co-Launched on Market 3
Nascent Services being launched on Market 4
Securing the Cloud = Brand Protection + More $$ 5
SYMANTEC VISION 2012
Key Challenges for Service Providers today … From Risk and Cost
Reducing Total Cost of Ownership
#5
#2 Reduce Churn (Improve Stickiness!)
Brand Protection #3
#4 Impact of Regulation For the SP & Their Customer
SYMANTEC VISION 2012
Key Challenges for Service Providers today … Into Opportunity for Growth!
Business Generation to Improve Revenues
#1
Reducing Total Cost of Ownership
#5
#2 Reduce Churn (Improve Stickiness!)
Brand Protection #3
#4 Impact of Regulation For the SP & Their Customer
SYMANTEC VISION 2012
Generate new Business Improve ARPU
#1
Reduce TCO Fast Time to Market
#5
#2 Reduce Churn Increase Customer Lifetime Value
Protect Brand Differentiate
#3
#4 Demonstrate Compliance
Symantec & Norton Solutions
Monetize Information Protection & Mgmt. for Consumers and Enterprises
Improve Service Levels and Customer Satisfaction
Reduce Complexity, Drive Standardization, BSS Integration
Fulfill EU Directives and Voluntary Frameworks
Protect Information and Devices (Endpoints, Servers, Carrier Network)
Key Challenges for Communication Service Providers
SYMANTEC VISION 2012
Summary of the requirements Service Provider / Telco ASK
• 5 years of Experience at Symantec shows
• Tactical Approach
– Might want to discuss one solution to put on their market
OR
• Strategic Partnership Approach
– Multiple services to launch (up to 13 per Telco so far!)
– Revenue Generation
• Which pauses the question of Sales Enablement, Channel, GTM
– AND Brand Protection (Driver 1 and Driver 3)
• Which pauses the question of the SOC
SYMANTEC VISION 2012
The ingredients for Strategic Partnership
New CSP
Cloud / Mobile
Services
Symantec
Services
Symantec
Products
CSPs / Outsourcers Customers
Consumers
SMBs
Enterprises Cube Architecture Framework
xSP
Licensing
Programs
Symantec
CSP Solution
Architects Service
Co-Marketing
Consume Build
Extend
SYMANTEC VISION 2012
Consume Extend Build Use Case Examples
Category Use Cases Examples
Consume • Leverage security as a service from the SYMC Cloud • Cloud management service with onprem agents • Hybrid app, onprem mgmt with a cloud module
• VIP • Email Security.cloud • BE.Cloud
Extend • Extend onprem security management with SaaS agents • Deploy security protection in IaaS • Backup to local as well as cloud storage targets
• CCS with SFDC agent • SEP agent in AWS • NBU to Nirvanix
Build • SYMC technology embedded in 3rd party cloud app • Software in public cloud to protect infrastructure • Deploy software in private cloud to protect customer
• SSL in SFDC • SMF / EV in Email aaS • CSP hardens *aaS servers
SYMANTEC VISION 2012
Customers & Target Market
Enterprise SME SoHo
Consumer Residential
M2M
The Joint Service Stack for CSPs – A Partner Play
ExSP & SSP Service Provider Buying Programs “Pay as you grow” Shared & Managed Services
SYM
AN
TEC
CSP
SER
VIC
ES E
NA
BLE
MEN
T
Symantec.cloud, NGNP, SBTS, SBMF, Norton Power Eraser
Deepsight, SymDroid, Reputation Services, MSS
Norton DNS, Norton Identity Safe
SEP, Norton Internet/Mobile Security, SCSP
Client Management Suite, Symantec Mobile Management
Apps Center
PGP, O3, Norton Anti-Theft, Norton Hotspot Privacy
VIP, VIP Mobile, MPKI
MPKI for Device Authentication (Smart Meter, ...)
Storage Foundation, VOM
BE.cloud, NBU, Norton Online Backup, Norton 360
Norton Zone
EV. Cloud, Enterprise Vault, NGNP (Mobile Messaging)
Control Compliance Suite, DLP, Vulnerability Mgmt.
NGNP Enterprise / Parental Controls
O3
Clean Pipe Services
Security Intelligence Services
Safe Web Services
Endpoint Security Services
Endpoint Mgmt. Services
Encryption Services
Authentication Services
Storage Services
Backup Services
Sec. Personal Cloud Services
Archiving Services
IT Compliance Services
Corp. & Cons. Control Serv.
Cloud Brokerage Services
Application Mgmt. Services
Secure M2M Services
Personal Care Services Norton Live Services
SYMANTEC VISION 2012
What is trend vs nascent? (includes Residential, SOHO, SMB, Enterprise segments)
• Current areas of Services being launched
– Clean Pipe (including Core Network, Mail Traffic, Web Traffic, etc.)
– Data Protection (including Backup, Cloud Backup, Archiving, etc.)
– Endpoint Security (Fixed, Mobile Devices, etc.)
– Cloud Brokerage (includes O3, .cloud in Market Places, etc.)
• Nascent Situations
– Public SOC powered by MSS to secure the cloud + to provide Public SOC
– Many new demands to extend clouds with Encryption, VIP, CSP, DLP, etc.
– From Securing the Cloud as a major concern …
– … To turn the problem into a new revenue stream with CCS, DLP, CSP, etc.
SYMANTEC VISION 2012
Clean Pipe is a fundamental topic
• 2 Marketing Good News
– Tap Water as we know is ‘clean’ … What’s coming out of Data Pipes is ‘dirty’
– How to market water … it is the same for everyone. Yet, Nestlé, etc. gave it a brand!
• Limited to Messaging Security 5 years ago
• Impacted by the Outbound Spam issues 4 years ago
• Moved to Web Security 3 years ago
• Entered Core Network Security 2 years ago
• Now under re-definition
– Parental Control, Anti-Botnet,
– SMS Anti-Spam, SMS Anti-Fraud,
– Country level Data Rentention projects
– Strong Link to the Device (see Device and Endpoint based Services)
SYMANTEC VISION 2012
TELENOR– Secure Messaging services to Enterprises
• Customer Requirements:
– Clean Pipe Solution…
– …with per customer quarantine
– …and Customer Self-Care
– Not exactly the best fit for Symantec Messaging Gateway !
• Architect’s job
– Collect the bricks to build a solution from the requirements
– Find a messaging technology partner: Message Systems
– Build the architecture with Symantec products: Traffic Shaper and Message Filter
– Articulate the requirements to cover the missing features
– Adapt the Solution to moving requirements !
Partnering for success – Building solution competition cannot
SYMANTEC VISION 2012
TELENOR– Secure Messaging services to Enterprises Final Architecture
Web UI
Sun T6320
Momentum Cluster Manager
Sun T6320
Momentum Cluster Node
N+1 Failover
Sun T6320
Symantec Brightmail
Traffic Shaper in active-
active
Database Synchronisation
VIP1
VIP2
VRRP
Failover
Internet
Web Server Zone
Postgres DB zone
Quarantine Zone
Quarantine
Storage
Mail routing decision based
on Customer preferences
Delivery to Quarantine based
on domain or user preferences
Customer
AdminCustomer Admin
modifies domain and user preferences
Queue
Storage
DB and
Logs
SYMANTEC VISION 2012
TELENOR– Secure Messaging services to Enterprises Immediate benefit to Telenor’s customer
90% Spam volume decrease
200% Clean mail volume increase
SYMANTEC VISION 2012
…
NGNP: Network-based security management
SGSN INTERNET
GGSN
MMSC SMSC
Mail WAP
Radio Access Network (RAN)
Consumers
Mobile Core Network Service Layer Internet
Next Generation
Network Protection
Subscriber Notification and Malware Recovery Option
Virus
Enterprises NGNP addresses both customer segments, consumer and enterprise
Traffic Analysis Module
Malware Recovery Option
SYMANTEC VISION 2012
…
NGNP: Cross-selling the Norton portfolio
SGSN INTERNET
GGSN
MMSC SMSC
Mail WAP
Radio Access Network (RAN)
Consumers
Mobile Core Network Service Layer Internet
Next Generation
Network Protection
Subscriber Notification and Malware Recovery Option
Virus
Enterprises NGNP addresses both customer segments, consumer and enterprise
Traffic Analysis Module
Malware Recovery Option
• Norton Internet Security • Norton Mobile Security • Norton Tablet Security • Norton 360 • Norton Power Eraser, ...
SYMANTEC VISION 2012
Features of “Parental Control”
1. Content Filtration
Offers different categories to block the content, including the pre-defined ones for the different age of child.
«up to 7 years», «from 7 to 12 years» «older 13 years» + 6 additional options
2. Time control Allows to limit the internet connectivity for the child, by managing daily and weekly calendar.
3. Report about visited Internet resources
Allows to get the detailed report about internet sites visited by children by getting it to the e-mail on weekly or monthly basis.
Additional option
Network antivirus
Provides high level protection for downloading traffic, no software installation to the client PC is required
Total solution from “Beeline” «Parental Control» is implemented according to clean pipe principle - negative
Internet content is not delivered to home, connected to the service.
SYMANTEC VISION 2012
Data Protection is entering new patterns
• From Hosted Backup and Archive 5 years ago (Cybernest)
• To Remote Backup Services 3 years ago (HP)
• Now to new patterns
– Cloud Backup (a la Nirvanix)
• A push model that helps cloud transformation
– That is pushing the need for APPLIANCES (everyone forgets RESTORE!)
– Cloud based Backup
• NOBU for File Restore and BE.Cloud
– And Cloud Archiving
• EV.Cloud
– To Collaboration Services
• Norton Zone
SYMANTEC VISION 2012
Who is Cybernest?
• Telkom SA is the incumbent Fixed Line Telco in South Africa
• Telkom SA has two strategic new business development initiatives in South Africa
– Mobile Services
– ICT Services
• Cybernest was formed to target the hosted IT services landscape in South Africa
– Portion of the internal IT operations wrapped into a separate branded business unit
– Existing 20 years of supporting Telkom turned into an entity with external focus and revenue generation objectives.
SYMANTEC VISION 2012
The Target Solution Implemented
• Consolidate the different back up environments to Netbackup
– One Simple Licence Model
– Leverage the scale across different areas for cost improvement
– Deploy Netbackup Reporter across all environments for improved management visibility
• Drive a Disk Based Backup Solution
– Leverage Symantec Pure Disk features for Data Deduplication and remote site replication
• Reduce Tape Libraries to two instances
– Tape capability in place if recovery of old backups needed
– Some Companies' policies still require Tape and have not yet matured to support Disk only
SYMANTEC VISION 2012
• Improved Efficiency
– Increased Backup Success
– Reduced Restore failures
• Cost Benefits
– Significant Operational Cost reduction
• Competitive Service Offering
– Enabled Tiering and Remote Site Backups
– Competitively Priced Offering
Benefits Derived Summary
With Margin still 60%+
Cheaper than Local
Competitor on
$/Gb/Month offering
With Margin for 10
server, average 5Gb/svr
backup image- 16%+
Cheaper than Large
Cloud Backup Provider
SYMANTEC VISION 2012
Secure Storage Offer
Storage Node
Bern
Geo redundancy
• Geo redundancy thanks to two
storage nodes in the Swisscom
Data Centre
• 99.99% availability
• Access via the Swisscom
network
• Data security guaranteed via
several protection mechanisms
• Exceptionally scalable from von
GB to PB
• Web-based Management
Swisscom
Netz
Storage Node
Zürich
SYMANTEC VISION 2012
Application
Secure Storage NAS
Virtual Disk
Storage Pool
X
MO
Secure Storage Concept SSL transport with Encryption
IP Plus
Zürich
Bern
Internet
Secure Storage Customer network
Customer Server
X
X
SAP
Service Access Point: Secure Storage on IP-Plus Backbone
Storage Pool: logical storage area
Managed Object (MO)
Swisscom
Extranet
Storage Pool
Storage Pool
MO
SYMANTEC VISION 2012
Symantec is Archiving
EV On premise
EV Private Cloud
EV Hybrid Cloud
EV.cloud 100% SaaS
The Enterprise Vault suite represents a large ecosystem of technologies providing customers with different levels of information management capabilities, regardless of […] their internal information governance processes.
SYMANTEC VISION 2012
Enterprise Vault.cloud - Retain Control & Offload The Burden
Enterprise Vault.cloud
Email Storage Management
Email E-Discovery
Email Compliance¹
Mailbox Continuity option
Purely Hosted
• No hardware, software, or plug-ins to install and maintain • Low upfront investment & total cost of ownership • Flat fee per mailbox per month includes service upgrades
Unlimited Storage & Rapid Search
• Unlimited email storage and retention • Rapid search results from scalable grid architecture • No mailbox size limits for end users
Enterprise-class Infrastructure & Security • Redundant, scalable, Tier 4 data centers • Data encrypted in transit & at rest • 24/7/365 support included in cost of service
¹ AdvisorMail in Symantec.cloud
SYMANTEC VISION 2012
Eskom (Electricity Supply Commission)
Company:
Transaction: $1,944,000: 30000 users of EV.cloud (growing to 36000 next year)
Sponsor: Sean Maritz – Infrastructure Special Projects Director
Sales Cycle: 8 months
Purchase Driver: Eskom is migrating from Groupwise to Exchange 2010. This will triple storage requirements,
preferred a managed outcome (unlimited storage SLA). Exchange is now centralised so the need
for email continuity is a priority. Compliance and eDiscovery mandate to be implemented.
What’s different
about this one?:
Eskom is a parastatal organization. The legal, compliance and security requirements for a cloud
based solution that Eskom have agreed with Symantec.cloud sets a precedent for public sector to
follow. Eskom has become a “lead agency” for cloud adoption.
Mimecast had been working on this opportunity for 2 years, would have been their largest
customer globally. The cloud team in South Africa – based on positioning EV.cloud as a managed
outcome – were given the opportunity to suggest mandatory criteria for solution selection.
Favorite Aspect of
the Deal:
Eskom generates approximately 95% of the electricity used in South Africa and
approximately 45% of the electricity used in Africa. Eskom generates, transmits and
distributes electricity to industrial, mining, commercial, agricultural and residential customers
and redistributors.
SYMANTEC VISION 2012
Cloud Brokerage
• End Customers are using 20+ different Clouds TODAY in EMEA
• Telcos have no time to BUILD, they want to act as BROKER
• Different ways to offer value
– Leverage Symantec .cloud services via a Market Place
– Offer a managed O3 as a Cloud Firewall to the brokerage
– Securise the Cloud Management Platform
• openstack-based, VMWare, Parallels, Jamcracker, AppDirect, etc.
SYMANTEC VISION 2012
Anti-Spam
Anti-Virus
Image Control
Content Control
IM Anti-virus IM Content Control
Email Security.cloud Web Security.cloud
Archiving
Email Management.cloud
Continuity
URL filter Anti-Spyware Anti-Virus
Roaming User
Endpoint Protection.cloud
Endpoint Protection
Email Encryption.cloud
Policy Based Encryption Boundary Encryption
IM Security.cloud
34
SYMANTEC VISION 2012
Step 1:- Customers are directed to CDW online store to trial
Customer clicks on free trial
link
SYMANTEC VISION 2012
The Security Problem
Can control Identity?
Joe
Smith Identity control
Can you do Security Information Management?
Logs
Events
Security Information Management
Data Leakage?
Data Loss Prevention
Controls, Audits and Compliance?
CCS
Control Compliance Suite
CISO Perimeter Locked to ‘Physical’ IT
SYMANTEC VISION 2012
O3 Gateway
Any SAAS or Web Application
Internal or External
Any user store
(ADS, LDAP,
RDBMS)
Any user on any device
P
• SYMC hosted Web console
• Multi-tenant
• Service & ID centric policy definition
• Gateway configuration
• Policy synchronization
• Gateway Status Monitoring
• Runtime engine
• Policy enforcement point
• Single tenant
• Access broker or proxy
• Information security gateway (proxy)
• 2 Network Interfaces - Portal and Monitoring
• Hosted or managed
O3 Intelligence center
M
Admin with optional
strong auth redential
SYMANTEC VISION 2012
CISO Landscape with O3
CISO Sets Policies
Joe
Smith
Identity, SSO and Federation are Controled
Logs
Events Normalised
Data Loss Protection
CCS
Controls and Compliance
SymForce (Universal Collector for CCS)
Identity control
Security Information Management
Data Loss Prevention
Control Compliance Suite
Coming Coming
SIM + MSS in H2 2012
CISO Perimeter extended to the Cloud
Cloud is not toxic anymore but a business opportunity
SYMANTEC VISION 2012
O3 for Telcos
• Demonstrated by Orange Business Services at
– Les Assises de la Sécurité: French Speaking biggest Security Event
(at Monaco in October)
• What matters for a Telco:
– O3 at the breaking point between the MPLS vs the International network
– A telco can offer a differenciated bundle with the pipes
– Augments Clean Pipe!
SYMANTEC VISION 2012
Endpoint Services Revolutionized with Mobility
• Firstly are you offering Endpoint Security Services?
– Aware of the major success stories on Norton for Consumers?
– With a SEPaaS approach like A1?
– Leveraging SEP.Cloud?
• Are you offering Endpoint Management Services?
– With EMMaaS approach?
• Mobility
– Want to base your service on a multitenant MDM Solution?
– Or more interested by an AppCenter approach (Nukona)?
– (See presentation from Lionel Gonzalez ST B03)
SYMANTEC VISION 2012
The Customer
• A1 (Telekom Austria)
– National Incumbent Telco in Austria
• Fixed & Mobile Operator servicing Residential and Business Customers
• Revenues of over €4Bn ($4.5Bn)
– Market Share
• Fixed (Broadband): 51% (1.2M subscribers)
• Mobile (All): 41% market share (5.1M subscribers)
– A1 Build and also Consume Cloud Services
• Interested in hosting services for smaller ISPs
– 3 Datacenters in Austria
• Operators and DCs in 5 other countries across Central & Eastern Europe
SYMANTEC VISION 2012
Project Overview
• Cloud Categorization (Cube Model)
– SaaS, Public Cloud for SMB & Enterprise
• Project Goals
– Bring a hosted security offering to market for B2B customer consumption • One platform for all customers
• Ability to integrate with / support existing portal
– No exposure of the management portal
• Packaged Self Care for SMB
• Self Management for Enterprise
• Key challenges
– Portal integration
– Flexible Multi-tenant management/reporting
• Competition
– McAfee
– F-Secure
SYMANTEC VISION 2012
Symantec Fit
• Leadership
– Security Leader
– Market Knowledge
– Industry Awards
– SMEs
• Differentiators
– Integration to existing portal
• Provisioning, Management, Reporting
• API
– Performance (Manager and Client)
– Scalable, Resilient architecture
SYMANTEC VISION 2012
Solution Architecture
SMB
Enterprise
Symantec Endpoint
Protection Manager
Service Provider’s Data Center
Microsoft SQL Server
DB
Self Care Portal
Symantec Endpoint
Protection Manager
Microsoft SQL Server
DB
Service Provider’s Data Center 2
Portal provisions new customer and users
SMB customers get access to pre-package Endpoint Security offerings
A predefined deployment packaged is made available for download SEP automatically
retrieves security policies and updates
Enterprise customers will get a dedicated portal to offer more flexibility in the service definition
SEP installation package is created on demand and made available through the portal
Deployment and Migrations made easy with Symantec Endpoint Protection Integration Component
Disaster recovery requires a second SEP Manager deployment with synchronization
Above 5000 users, the use of an external database is recommended
SEP Manager will then scale horizontally
Clients can be configured to failover between sites
SYMANTEC VISION 2012
Technical Sales Process & Lessons Learned
• Standard Service Provider Sell
– Cube methodology, Expertise, References, PoC, RFP
– Gain thought leadership - Write the RFP => Win!
– Take the risk out of saying “Yes”
• Perception is reality
– Make sure the POC has close fit with production environment
– Make sure all costs (esp MS Stack) are understood
• Set expectations to include Professional Services & Education
– Customer built there own integration for API
– They did not know SEP
– They did not know the architecture or best practice for deployment
– They did not know how to operate the platform efficiently and effectively
• Objections
– Difficult to deploy
– Difficult to differentiate to customer and sell value
– Intrusive & resource heavy client will impact user experience
– Price
SYMANTEC VISION 2012
SOC and Public SOC
• SOC = Security Operations Center
– BIG problem for Telcos and Service Providers: NO SOC
– NO SOC = NO PROOF that the Cloud Services are Safe
– All good but examples of Services hacked in the first hour
– Brand Reputation at Risk
• Recipe for Success
1) Leverage Symantec Managed Security Services MSS
2) Turn the problem into an advantage and offer MSS Services to your customers
Move to a Public SOC
SYMANTEC VISION 2012
• Hosted Log Retention Service
– Per device or Enterprise wide option
• Security Monitoring & Analysis Services
– Essential or Advanced Service
– Per device or Enterprise wide option
• Vulnerability Management Service
• VeriSign® Internet Defense Network
•
• Symantec DeepSight™ Intelligence Services
– DeepSight Starter Pack / Advanced Pack
– DeepSight 8.0 Silver, Gold, and Platinum Early Warning Services
– DeepSight DataFeeds 4.0
• Managed Firewall Protection
– Essential (limited changes/assistance)
– Advanced (unlimited)
• Managed IDP Protection
– Advanced (fully-managed only)
• Managed Endpoint Protection
– Essential (co-managed)
– Advanced (fully-managed)
• Symantec IDP Solution with Sourcefire™
• Symantec Security Information Manager
MANAGED SECURITY SERVICES
Symantec’s Threat Monitoring & Reporting Solutions
INTELLIGENCE SERVICES ON-PREMISE SOLUTIONS
SYMANTEC VISION 2012
Causes of a Security Incident
System Vulnerabilities
System Misconfiguration
User Activity Prevention Edge to Endpoint
Visibility Global
Intelligence Context and Relevance Detection
SYMANTEC VISION 2012
Protecting the Enterprise – A Solution Framework
Target Attacks Threat Trends Vulnerabilities Malicious Code Fraud Activity
Retain Analyze Advise
Collect Remediate
Threat Intelligence
Analysis & Prioritization
Visibility & Control
Sustainable Operations
24 x 7 Global Budget Staff
SYMANTEC VISION 2012
Protecting the Enterprise – Symantec’s Unique Solution
Target Attacks Threat Trends Vulnerabilities Malicious Code Fraud Activity
Retain Analyze Advise
Collect Remediate
Threat Intelligence
Analysis & Prioritization
Visibility & Control
Sustainable Operations
24 x 7 Global Budget Staff
Unparalleled Intelligence
Context and Relevance Actionable Guidance
Edge-to-Endpoint Monitoring
Security Expertise 24x7, Global Leadership
Threat Intelligence
Analysis & Prioritization
Visibility & Control
SYMANTEC VISION 2012
Symantec MSS Capabilities
Threat Intelligence
Attack Activity • 240,000 sensors • 200+ countries
Malware Intelligence • 133M client, server,
gateways monitored • Global coverage
Vulnerabilities • 40,000+ vulnerabilities • 14,000 vendors • 105,000 technologies
Spam/Phishing • 5M decoy accounts • 8B+ email messages/day • 1B+ web requests/day
Identifies more threats, takes action faster & prevents impact
Symantec™ Global Intelligence Network
SYMANTEC VISION 2012
Solution Spectra vs Customer Subsegment Mapping
Different Customers means Different Solutions
SYMANTEC VISION 2012
Services overview: Event and incident management
Service overview
• Near-real time logging, and monitoring
• Log correlation with other technologies and Symantec’s
Global Intelligence Network
• Log analysis and incident identification
• Incident escalation, tracking and closure
• Automatic inclusion of logs from Log Retention Devices
Key functions
• 24x7 log monitoring and incident management
• Correlation against other systems
• Correlation against Symantec Global Intelligence Network
(GIN)
Business value
• Prioritised alerts
• Remediation plans
• On-call support for critical vulnerabilities
• Management reports and dashboards
Key outputs
SYMANTEC VISION 2012
The Cube The Symantec SP Framework to support Service Providers in building own
customized data and security services for their target markets
SYMANTEC VISION 2012
MiniCubes participating into an SMB and Enterprise Service
Cube Principles In Action
Their Interfaces are now in Play
They are part of a Service
They are sourced, built and are making money $
SYMANTEC VISION 2012
CSA Security Guidelines : Domains
• Cloud Computing Architectural Framework Cloud Architecture
• Governance and Enterprise Risk Management
• Legal and Electronic Discovery
• Compliance and Audit
• Information Lifecycle Management
• Portability and Interoperability
Governing in the Cloud
• Traditional Security, Business Continuity, and Disaster Recover
• Data Center Operations
• Incident Response, Notification, and Remediation
• Application Security
• Encryption and Key Management
• Identity and Access Management
• Virtualization
Operating in the Cloud
SYMANTEC VISION 2012
Governing the Cloud
Cloud Security Alliance Domains
Governance and Enterprise Risk Management
Legal and Electronic Discovery
Compliance
Audit
Information
Lifecycle Management
Portability
and Interoperability
Service
Platform
Infrastructure
SYMANTEC VISION 2012
Operating the Cloud
Cloud Security Alliance Domains
Traditional Security, Business Continuity,
and Disaster Recovery
DataCenter Operations
Incident
Response Notification Remediation
Application
Security
Encryption
And Key
Management
Identity
and Access Management
Virtualization
Service
Platform
Infrastructure
SYMANTEC VISION 2012
Symantec Security Information Manager Event Correlation Incident Management Remediation Log Retention Security Monitoring DeepSight
Control Compliance Suite Policy Management Technical Controls Reporting and Remediation
Infrastructure Security Infrastructure Layer
Distribution Network
Storage
Network
Security Information Management
Processing
Mirroring or Replication
Storage Virtualization (heterogeneous) Volume Management
SFHA (Storage Foundation HA)
FileStore
SAV for NAS AntiMalware at Storage level
Data Loss Prevention Discover Data Insight
Brightmail Trafic Shaper Antispam at Network
Endpoint Protection Critical System Protection Endpoint Protection System Hardening Exploit Prevention
Cluster
Veritas Cluster Service Geographical Cluster Business Continuity
Data Loss Prevention Network Prevent Monitor
Altiris Server Management Suite Provisioning Automation Monitoring Remediation
IPS/IDS
NetBackup Backup Data Retention Business Continuity
Enterprise Vault eDiscovery Data Retention
Web Gateway BotNet Detection
Brightmail Gateway Antispam Encryption
Symantec.cloud Web Security Messaging Security
Symantec Managed Security Services Event Correlation Incident Management Remediation Log Retention Security Monitoring
SYMANTEC VISION 2012
Symantec Envisions Future Clouds as Safe Clouds
• Great article
http://www.symantec.com/about/news/release/article.jsp?prid=20121105_01
• Forthcoming Blog
Thank you!
Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Arnaud Taddei
+41 79 506 1129