build a cyber resilient network with symantec
DESCRIPTION
Cyber resilience explained, the current threat landscape explored and the Symantec solution.TRANSCRIPT
![Page 1: Build a Cyber Resilient Network with Symantec](https://reader036.vdocuments.us/reader036/viewer/2022070303/54b4a3284a79598f468b45f5/html5/thumbnails/1.jpg)
Building a Cyber Resilient Network with Symantec
Chris Collier
Presales Specialist - Security
![Page 2: Build a Cyber Resilient Network with Symantec](https://reader036.vdocuments.us/reader036/viewer/2022070303/54b4a3284a79598f468b45f5/html5/thumbnails/2.jpg)
Agenda
–What is Cyber Resilience?
–Current Threat Landscape
–Symantec Global Intelligence Network
–Symantec Security Solutions Overview
–Summary
–Q&A
2
![Page 3: Build a Cyber Resilient Network with Symantec](https://reader036.vdocuments.us/reader036/viewer/2022070303/54b4a3284a79598f468b45f5/html5/thumbnails/3.jpg)
What is Cyber Resilience?
![Page 4: Build a Cyber Resilient Network with Symantec](https://reader036.vdocuments.us/reader036/viewer/2022070303/54b4a3284a79598f468b45f5/html5/thumbnails/4.jpg)
4
Cyber Risk & Resilience
TODAY’S APPROACH NEEDS TO BE RE-IMAGINED.
![Page 5: Build a Cyber Resilient Network with Symantec](https://reader036.vdocuments.us/reader036/viewer/2022070303/54b4a3284a79598f468b45f5/html5/thumbnails/5.jpg)
Hyper Connected
World
Rapid IT Evolution
Agile Targeted Threat
Cyber Risk
Increased dependency on
connected services and information
exchange
(i.e. Online & On-Demand Web and
Cloud Services)
IT platforms, devices & services evolving at a pace
we have never seen before
(i.e. Mobile, Virtualisation, Social Media Technologies)
Threats & Actors leveraging hyper
connectivity, IT evolution and weak traditional
boundary style security approaches
(i.e. APT’s, Hackitivism, Insider Abuse,
Reputation Damage)
INCREASEED BUSINESS
IMPACT
What is Driving Cyber Security Phenomena?
![Page 6: Build a Cyber Resilient Network with Symantec](https://reader036.vdocuments.us/reader036/viewer/2022070303/54b4a3284a79598f468b45f5/html5/thumbnails/6.jpg)
Current Threat Landscape
![Page 7: Build a Cyber Resilient Network with Symantec](https://reader036.vdocuments.us/reader036/viewer/2022070303/54b4a3284a79598f468b45f5/html5/thumbnails/7.jpg)
Current Threat Landscape - ISTR
![Page 8: Build a Cyber Resilient Network with Symantec](https://reader036.vdocuments.us/reader036/viewer/2022070303/54b4a3284a79598f468b45f5/html5/thumbnails/8.jpg)
Current Threat Landscape – Targeted Attacks
![Page 9: Build a Cyber Resilient Network with Symantec](https://reader036.vdocuments.us/reader036/viewer/2022070303/54b4a3284a79598f468b45f5/html5/thumbnails/9.jpg)
Current Threat Landscape – Data Breaches
1200 x Laptops lost/stolen every week
40% of ex-employees take data with them
Average cost of data breach – £1.9m
![Page 10: Build a Cyber Resilient Network with Symantec](https://reader036.vdocuments.us/reader036/viewer/2022070303/54b4a3284a79598f468b45f5/html5/thumbnails/10.jpg)
Current Threat Landscape – Mobile Threats
![Page 11: Build a Cyber Resilient Network with Symantec](https://reader036.vdocuments.us/reader036/viewer/2022070303/54b4a3284a79598f468b45f5/html5/thumbnails/11.jpg)
Summary
• No business is safe from attack – regardless of its size
• Attackers are being more selective in who they target
• Obtaining information is key – if an attacker could make money from it, it’s a potential target
Below are some qualifying questions that can help you determine a security solution requirement:
• What are you currently doing to safeguard your data?
• How are your emails protected?
• Do you use mobile devices in your organisation?
• What industry regulations do you have to comply with?
• How are you protecting your end users workstations?
![Page 12: Build a Cyber Resilient Network with Symantec](https://reader036.vdocuments.us/reader036/viewer/2022070303/54b4a3284a79598f468b45f5/html5/thumbnails/12.jpg)
Symantec Global Intelligence Network
![Page 13: Build a Cyber Resilient Network with Symantec](https://reader036.vdocuments.us/reader036/viewer/2022070303/54b4a3284a79598f468b45f5/html5/thumbnails/13.jpg)
Global ExpertiseMore researchers
Comprehensive data sourcesMore virus samples analyzedExtensive customer support
In-depth AnalysisSignatures: AV,AS,IPS,GEB,
SPAM, White listsDeepSight Database
IT Policies and Controls Rigorous False Positive Testing
Automated UpdatesFast & Accurate
Variety of Distribution MethodsRelevant Information
Relevancy
Accuracy
Protection
ResponseCenters
Users
Symantec Security IntelligenceGlobal Intelligence Network
![Page 14: Build a Cyber Resilient Network with Symantec](https://reader036.vdocuments.us/reader036/viewer/2022070303/54b4a3284a79598f468b45f5/html5/thumbnails/14.jpg)
Symantec Security Solutions Overview
![Page 15: Build a Cyber Resilient Network with Symantec](https://reader036.vdocuments.us/reader036/viewer/2022070303/54b4a3284a79598f468b45f5/html5/thumbnails/15.jpg)
Symantec Security Strategy
Global Intelligence Network (GIN)
200+m Nodes Globally
40% Global email Monitored
2.5+m “decoy” accounts
200+ Countries
Enforce IT Policies
Control Compliance Suite (CCS)
Protect Information
Data Loss Prevention & Encryption
(DLP/PGP)
Trusted Interactions
Protect The Infrastructure
Symantec Protection Suite (SPS)
Manage & Remediate
Altiris (ITMS)Managed Security Services (MSS)
Mobile Devices
Mobile Management Suite/ Appcenter
(MDM)
Critical SystemsSymantec.cloud
Protect Interactions
Critical Systems Protection (CSP) Symantec VIP
WorkflowO3
![Page 16: Build a Cyber Resilient Network with Symantec](https://reader036.vdocuments.us/reader036/viewer/2022070303/54b4a3284a79598f468b45f5/html5/thumbnails/16.jpg)
Summary
![Page 17: Build a Cyber Resilient Network with Symantec](https://reader036.vdocuments.us/reader036/viewer/2022070303/54b4a3284a79598f468b45f5/html5/thumbnails/17.jpg)
• Most extensive portfolio of businessprotection solutions available
• More experience – 30+ years of protectingthe world’s systems and information
• Comprehensive and up-to-date protection against the latest threats
• Market leadership - in both security and data protection
• Trusted technology - Symantec protects 99% of the Fortune 500
Symantec Protects More Businesses
Information ProtectionPreemptive Security Alerts Threat Triggered Actions
Global Scope and ScaleWorldwide Coverage 24x7 Event Logging
Rapid Detection
Threat Activity• 240,000 sensors• 200+ countries
Malcode Intelligence• 130M client, server,
gateways• Global coverage
Vulnerabilities• 32,000+ vulnerabilities
• 11,000 vendors• 72,000 technologies
Spam/Phishing• 2.5M decoy accounts
• 8B+ email messages/daily• 1B+ web requests/daily
![Page 18: Build a Cyber Resilient Network with Symantec](https://reader036.vdocuments.us/reader036/viewer/2022070303/54b4a3284a79598f468b45f5/html5/thumbnails/18.jpg)
Questions?