Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager –...

26
Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1

Transcript of Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager –...

Page 1: Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.

Hosted Security: Complete Protection With A Peace Of MindLeonard Sim

Client Services Manager – South Asia

Symantec Hosted Services1

Page 2: Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.

Agenda

2

What’s being done now?

There is a new risk

The new approach

Page 3: Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.

Top Information Security Concerns

Protection and Control

Cost Containment Staffing

• Keep threats out

• Control sensitive data

• Enforce compliance

• Do more with less

• Quicker time to benefit

• CAPEX v OPEX

• Limited staff, expertise

• Innovation vs. managing infrastructure

Page 4: Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.

Evolving Threat Landscape

90% of breaches in 2009 involved organized crime targeting corporate information

90% of all email traffic is spam and the Web has become the primary vector for malware delivery

11x increase in unique malware samples in the last two years seen by Symantec

Page 5: Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.

Sophistication of high end threats is evolving rapidlyContinued growth in targeted threats which attack specific companies, persons or systems

Evolving Threat LandscapeNew “Zero Hour” Threats continue to increase

New malicious code signaturesDriven by:

Increase in new threats leading to failure of traditional signature based protection

Readily available malware toolkits

Specialization of highly skilled participants

Huge sums of money$£¥€

Page 6: Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.

It was annoying once….

Page 7: Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.

It’s now malicious

Page 8: Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.

What are they attempting to do.

Incursion

Discovery & Capture

Extraction

Page 9: Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.

Attacks Are Becoming More Complex

Fraudulent IM with Web Link

Compromised Website Hosting Malware

Spoofed Email with Web Link

Comprehensive Protection Needed Across Email, Web, and IM

Page 10: Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.

You Can’t See It BUT It’s There

10

Page 11: Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.

New Web Threats

Page 12: Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.

Facebook Delivered Viruses

Page 13: Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.

Point solutions leave gaps – multi-protocol converged threat analysis and unrivaled accuracy are essential

Early warning systems were built for the old style mass mailing viruses not targeted attacks or smaller attacks from thousands of attackers

A new threat landscape requires a different approach

90%Of all breaches are now driven by highly resourced organized

criminals

2008: total market value of illegally obtained corporate data

$600B - $1T

Page 14: Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.

What’s being done now?

14

Page 15: Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.

How Email Flows To Your Company

Sender

Email Client

Email Server

Email Client

Email Server

Recipient

Page 16: Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.

Traditional Email Security

Email Server

DNS

Email Client

Email Server

DNS

Email Client

Recipient

Mail FlowATTACKS!

Sender

Page 17: Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.

What happens inside…Traditional Email Security

• Emails will have to be received by the device to be processed– Wasted resources and bandwidth

• Majority Signature Based– Most use the same signatures as their desktop AV products

• Some have IP reputation filtering– White listing/black listing based on IP address only

• Will rely on updates by the vendor to keep up to date– Window of vulnerability, time taken for updates to be developed and

delivered

• Will have to increase physical resources once volume of mail increases

Page 18: Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.

The New Approach

18

Page 19: Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.

• Filtration• Sedimentation• Slow Sand Filters• Activated Sludge• Flocculation• Chlorination• Electromagnetic Radiation

• Suspended Particles• Parasites• Bacteria• Algae• Viruses• Fungi

Are these terms familiar?

Page 21: Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.

• DNS Block Lists• Signature• Heuristics• Traffic Shaping• White Lists• Black Lists• Bayesian Filtering• Sandbox

• Viruses• Trojans• Spyware• Spam• Phishing

Are these terms familiar?

Page 22: Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.

How Hosted Email Scanning Works

Sender

Email Client

Email Server

Email Client

Email Server

Recipient

MessageLabsData Centre

Internet

• DNS Block Lists

• Signaturing

• Heuristics

• Traffic Shaping

• White Lists

• Black Lists

• Bayesian Filtering

• Sandbox

Untreated Emails

• Viruses

• Trojans

• Spyware

• Spam

• Phishing Clean Emails

Page 23: Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.

What is Symantec Hosted Security?‘In The Cloud’ Security-as-a-Service

Page 24: Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.

• Procurement

• Deployment

• Testing

• Performance Tuning

• Policy Administration

• Capacity Planning

• High Availability

• Patching

• Upgrades

Management Overhead

Eliminate On-Site Infrastructure

Messaging

Web

• Management

• Traffic Shaping

• AV / AS / Content Filtering

• High Availability

• Management

• AV / AS / Content Filtering

• High Availability

HQ Office Branch Office #1

Branch Office #2…Messaging

Web

• AV / AS / Content Filtering

• High Availability

• AV / AS / Content Filtering

• High Availability

Messaging

Web

• AV / AS / Content Filtering

• High Availability

• AV / AS / Content Filtering

• High Availability

IT Admin

Policy Administration

Management Simplified

Page 25: Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.

Advantages of Hosted Services

25

• Defense in depth with multiple scanning engines

• Multi-protocol protection across email, Web, and IM

• Enforce Acceptable Use Policies and limit data loss

• Affordable, predictable costs managed as OPEX

• Virtually eliminates the need for hardware and software

• Block threats before they reach your network

Reduce Risk

Lower TCO and Simplify

Management

IncreaseConfidence

• Industry-leading Service Level Agreement (SLA)

• 24 / 7 support delivered by dedicated specialists

• Highly scalable, reliable, and energy efficient

Page 26: Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.

Leonard SimClient Services Manager – South [email protected]