Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager –...
-
Upload
marcia-hudson -
Category
Documents
-
view
215 -
download
0
Embed Size (px)
Transcript of Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager –...

Hosted Security: Complete Protection With A Peace Of MindLeonard Sim
Client Services Manager – South Asia
Symantec Hosted Services1

Agenda
2
What’s being done now?
There is a new risk
The new approach

Top Information Security Concerns
Protection and Control
Cost Containment Staffing
• Keep threats out
• Control sensitive data
• Enforce compliance
• Do more with less
• Quicker time to benefit
• CAPEX v OPEX
• Limited staff, expertise
• Innovation vs. managing infrastructure

Evolving Threat Landscape
90% of breaches in 2009 involved organized crime targeting corporate information
90% of all email traffic is spam and the Web has become the primary vector for malware delivery
11x increase in unique malware samples in the last two years seen by Symantec

Sophistication of high end threats is evolving rapidlyContinued growth in targeted threats which attack specific companies, persons or systems
Evolving Threat LandscapeNew “Zero Hour” Threats continue to increase
New malicious code signaturesDriven by:
Increase in new threats leading to failure of traditional signature based protection
Readily available malware toolkits
Specialization of highly skilled participants
Huge sums of money$£¥€

It was annoying once….

It’s now malicious

What are they attempting to do.
Incursion
Discovery & Capture
Extraction

Attacks Are Becoming More Complex
Fraudulent IM with Web Link
Compromised Website Hosting Malware
Spoofed Email with Web Link
Comprehensive Protection Needed Across Email, Web, and IM

You Can’t See It BUT It’s There
10

New Web Threats

Facebook Delivered Viruses

Point solutions leave gaps – multi-protocol converged threat analysis and unrivaled accuracy are essential
Early warning systems were built for the old style mass mailing viruses not targeted attacks or smaller attacks from thousands of attackers
A new threat landscape requires a different approach
90%Of all breaches are now driven by highly resourced organized
criminals
2008: total market value of illegally obtained corporate data
$600B - $1T

What’s being done now?
14

How Email Flows To Your Company
Sender
Email Client
Email Server
Email Client
Email Server
Recipient

Traditional Email Security
Email Server
DNS
Email Client
Email Server
DNS
Email Client
Recipient
Mail FlowATTACKS!
Sender

What happens inside…Traditional Email Security
• Emails will have to be received by the device to be processed– Wasted resources and bandwidth
• Majority Signature Based– Most use the same signatures as their desktop AV products
• Some have IP reputation filtering– White listing/black listing based on IP address only
• Will rely on updates by the vendor to keep up to date– Window of vulnerability, time taken for updates to be developed and
delivered
• Will have to increase physical resources once volume of mail increases

The New Approach
18

• Filtration• Sedimentation• Slow Sand Filters• Activated Sludge• Flocculation• Chlorination• Electromagnetic Radiation
• Suspended Particles• Parasites• Bacteria• Algae• Viruses• Fungi
Are these terms familiar?

How Water Flows To Your Home
Reservoir
Home
• Filtration
• Sedimentation
• Slow Sand Filters
• Activated Sludge
• Flocculation
• Chlorination
• Electromagnetic Radiation
Untreated Water
• Suspended Particles
• Parasites
• Bacteria
• Algae
• Viruses
• Fungi
Clean Water

• DNS Block Lists• Signature• Heuristics• Traffic Shaping• White Lists• Black Lists• Bayesian Filtering• Sandbox
• Viruses• Trojans• Spyware• Spam• Phishing
Are these terms familiar?

How Hosted Email Scanning Works
Sender
Email Client
Email Server
Email Client
Email Server
Recipient
MessageLabsData Centre
Internet
• DNS Block Lists
• Signaturing
• Heuristics
• Traffic Shaping
• White Lists
• Black Lists
• Bayesian Filtering
• Sandbox
Untreated Emails
• Viruses
• Trojans
• Spyware
• Spam
• Phishing Clean Emails

What is Symantec Hosted Security?‘In The Cloud’ Security-as-a-Service

• Procurement
• Deployment
• Testing
• Performance Tuning
• Policy Administration
• Capacity Planning
• High Availability
• Patching
• Upgrades
Management Overhead
Eliminate On-Site Infrastructure
Messaging
Web
• Management
• Traffic Shaping
• AV / AS / Content Filtering
• High Availability
• Management
• AV / AS / Content Filtering
• High Availability
HQ Office Branch Office #1
Branch Office #2…Messaging
Web
• AV / AS / Content Filtering
• High Availability
• AV / AS / Content Filtering
• High Availability
Messaging
Web
• AV / AS / Content Filtering
• High Availability
• AV / AS / Content Filtering
• High Availability
IT Admin
Policy Administration
Management Simplified

Advantages of Hosted Services
25
• Defense in depth with multiple scanning engines
• Multi-protocol protection across email, Web, and IM
• Enforce Acceptable Use Policies and limit data loss
• Affordable, predictable costs managed as OPEX
• Virtually eliminates the need for hardware and software
• Block threats before they reach your network
Reduce Risk
Lower TCO and Simplify
Management
IncreaseConfidence
• Industry-leading Service Level Agreement (SLA)
• 24 / 7 support delivered by dedicated specialists
• Highly scalable, reliable, and energy efficient

Leonard SimClient Services Manager – South [email protected]