Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager –...

Post on 30-Dec-2015

218 views 0 download

Tags:

Transcript of Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager –...

Hosted Security: Complete Protection With A Peace Of MindLeonard Sim

Client Services Manager – South Asia

Symantec Hosted Services1

Agenda

2

What’s being done now?

There is a new risk

The new approach

Top Information Security Concerns

Protection and Control

Cost Containment Staffing

• Keep threats out

• Control sensitive data

• Enforce compliance

• Do more with less

• Quicker time to benefit

• CAPEX v OPEX

• Limited staff, expertise

• Innovation vs. managing infrastructure

Evolving Threat Landscape

90% of breaches in 2009 involved organized crime targeting corporate information

90% of all email traffic is spam and the Web has become the primary vector for malware delivery

11x increase in unique malware samples in the last two years seen by Symantec

Sophistication of high end threats is evolving rapidlyContinued growth in targeted threats which attack specific companies, persons or systems

Evolving Threat LandscapeNew “Zero Hour” Threats continue to increase

New malicious code signaturesDriven by:

Increase in new threats leading to failure of traditional signature based protection

Readily available malware toolkits

Specialization of highly skilled participants

Huge sums of money$£¥€

It was annoying once….

It’s now malicious

What are they attempting to do.

Incursion

Discovery & Capture

Extraction

Attacks Are Becoming More Complex

Fraudulent IM with Web Link

Compromised Website Hosting Malware

Spoofed Email with Web Link

Comprehensive Protection Needed Across Email, Web, and IM

You Can’t See It BUT It’s There

10

New Web Threats

Facebook Delivered Viruses

Point solutions leave gaps – multi-protocol converged threat analysis and unrivaled accuracy are essential

Early warning systems were built for the old style mass mailing viruses not targeted attacks or smaller attacks from thousands of attackers

A new threat landscape requires a different approach

90%Of all breaches are now driven by highly resourced organized

criminals

2008: total market value of illegally obtained corporate data

$600B - $1T

What’s being done now?

14

How Email Flows To Your Company

Sender

Email Client

Email Server

Email Client

Email Server

Recipient

Traditional Email Security

Email Server

DNS

Email Client

Email Server

DNS

Email Client

Recipient

Mail FlowATTACKS!

Sender

What happens inside…Traditional Email Security

• Emails will have to be received by the device to be processed– Wasted resources and bandwidth

• Majority Signature Based– Most use the same signatures as their desktop AV products

• Some have IP reputation filtering– White listing/black listing based on IP address only

• Will rely on updates by the vendor to keep up to date– Window of vulnerability, time taken for updates to be developed and

delivered

• Will have to increase physical resources once volume of mail increases

The New Approach

18

• Filtration• Sedimentation• Slow Sand Filters• Activated Sludge• Flocculation• Chlorination• Electromagnetic Radiation

• Suspended Particles• Parasites• Bacteria• Algae• Viruses• Fungi

Are these terms familiar?

• DNS Block Lists• Signature• Heuristics• Traffic Shaping• White Lists• Black Lists• Bayesian Filtering• Sandbox

• Viruses• Trojans• Spyware• Spam• Phishing

Are these terms familiar?

How Hosted Email Scanning Works

Sender

Email Client

Email Server

Email Client

Email Server

Recipient

MessageLabsData Centre

Internet

• DNS Block Lists

• Signaturing

• Heuristics

• Traffic Shaping

• White Lists

• Black Lists

• Bayesian Filtering

• Sandbox

Untreated Emails

• Viruses

• Trojans

• Spyware

• Spam

• Phishing Clean Emails

What is Symantec Hosted Security?‘In The Cloud’ Security-as-a-Service

• Procurement

• Deployment

• Testing

• Performance Tuning

• Policy Administration

• Capacity Planning

• High Availability

• Patching

• Upgrades

Management Overhead

Eliminate On-Site Infrastructure

Messaging

Web

• Management

• Traffic Shaping

• AV / AS / Content Filtering

• High Availability

• Management

• AV / AS / Content Filtering

• High Availability

HQ Office Branch Office #1

Branch Office #2…Messaging

Web

• AV / AS / Content Filtering

• High Availability

• AV / AS / Content Filtering

• High Availability

Messaging

Web

• AV / AS / Content Filtering

• High Availability

• AV / AS / Content Filtering

• High Availability

IT Admin

Policy Administration

Management Simplified

Advantages of Hosted Services

25

• Defense in depth with multiple scanning engines

• Multi-protocol protection across email, Web, and IM

• Enforce Acceptable Use Policies and limit data loss

• Affordable, predictable costs managed as OPEX

• Virtually eliminates the need for hardware and software

• Block threats before they reach your network

Reduce Risk

Lower TCO and Simplify

Management

IncreaseConfidence

• Industry-leading Service Level Agreement (SLA)

• 24 / 7 support delivered by dedicated specialists

• Highly scalable, reliable, and energy efficient

Leonard SimClient Services Manager – South Asialsim@messagelabs.com