building trust; best practics for protecting data in the cloud

16
Building Trust – Best Practices for Protecting Data in the Cloud 1 Building Trust; Best Practices for Protecting Data in the Cloud Siân John EMEA Chief Strategist Symantec

Upload: symantec

Post on 16-Apr-2017

737 views

Category:

Technology


5 download

TRANSCRIPT

Page 1: Building Trust; best practics for protecting data in the cloud

Building Trust – Best Practices for Protecting Data in the Cloud 1

Building Trust;Best Practices for Protecting Data in the Cloud

Siân JohnEMEA Chief Strategist Symantec

Page 2: Building Trust; best practics for protecting data in the cloud

Always On and EverywhereDigital World Enhances or Replaces Much of the Physical World

2Building Trust – Best Practices for Protecting Data in the Cloud

Page 3: Building Trust; best practics for protecting data in the cloud

Applications and Data Are Moving to The Cloud

Building Trust – Best Practices for Protecting Data in the Cloud 3

Page 4: Building Trust; best practics for protecting data in the cloud

Building Trust – Best Practices for Protecting Data in the Cloud 4

Information is exploding

202040ZB

20157.9ZB

20101.2ZB

Page 5: Building Trust; best practics for protecting data in the cloud

Building Trust – Best Practices for Protecting Data in the Cloud 5

The Drive for Data Privacy

Lack of Business Ownership

Data Growth

Emerging Technology

Regulations

Lack of Visibility

Evolving Threat landscape

Press Headlines

Reputation

Business Opportunity

Customer Trust

Drivers Inhibitors

Page 6: Building Trust; best practics for protecting data in the cloud

6

Privacy most Important when Customers choose products or services

Symantec State of Privacy Report 2015https://www.symantec.com/content/en/us/about/presskits/b-state-of-privacy-report-2015.pdf

.

Delivering great customer service

Keeping your data safe and secure

Delivering quality products / services

Treating their employees and suppliers fairly

Being environmentally friendly

82%

86%

69%

56%

88%

Building Trust – Best Practices for Protecting Data in the Cloud

Page 7: Building Trust; best practics for protecting data in the cloud

Not all Organisations have the same level of Consumer Trust for Securing Data

7

https://www.symantec.com/content/en/us/about/presskits/b-state-of-privacy-report-2015.pdf.

Hospitals / medical services

Banks Government Technology companies (i.e. Google, Microsoft)

Retailers (Including online shops)

Social media sites (i.e. Facebook, Twitter)

69% 66%

45%

22% 20%

10%

Organisations whose business models are based on data (tech

companies and social media companies) appear less trusted

to keep customer data completely secure

Data Trust Chain

Building Trust – Best Practices for Protecting Data in the Cloud

Page 8: Building Trust; best practics for protecting data in the cloud

8

SSL

Mobile/BYOD/IoT Endpoints

The Cloud Generation Security ChallengeA Shifting Expanse of Blind Spots

HeadquartersData Center

RegionalOffice

TraditionalSecurity Stack

Expanding Use of Encryption Creates Blind Spots

Traditional Security Stack Has Lost Significant Visibility As Resources Go

Direct-to-Net

Cloud Applications Causing Organizations to Lose Control Over Their Resources

Rapidly Growing Landscape of Unprotected Devices

Users

Cloud Applications And Services

Building Trust – Best Practices for Protecting Data in the Cloud

Page 9: Building Trust; best practics for protecting data in the cloud

Complications of Cloud Adoption

• Who Owns the Comprehensive Service Level Agreements?

• Single Pane of Glass?

• Redundancy & High-Availability?

• Vendor Compatibility?

Cloud Web Gateway

Provider

Cloud DLP Provider

Cloud Data Encryption

Provider

Cloud Access Control

Provider

Cloud SandboxProvider

Cloud Breach Analysis

Cloud Forensic / Recording

Cloud EmailScanning

Cloud DDoS

UBA

Innovation for the Cloud Generation: Industry Has Created Cloud Security Chaos

Building Trust – Best Practices for Protecting Data in the Cloud 9

Page 10: Building Trust; best practics for protecting data in the cloud

10

Gaining Control of the Cloud

Building Trust – Best Practices for Protecting Data in the Cloud

Visibility

Authentication

Data Protection

Secure Environment

Adaptive Security

Automation

Ease of Use

…know what is running / stored where…

…ensure only right users can access the right apps/data…

…safeguard my data everywhere and at all times…

…ensure the environment is protected from malware and advanced threats…

…security stays in-sync and scales with my constantly changing Cloud environment…

…be able to automatically apply the right security with minimal human intervention…

…manage my complex hybrid world from single control point…

Page 11: Building Trust; best practics for protecting data in the cloud

Innovation for the Cloud Generation:Securing A New World of Devices, Networks and Applications

11

Protection fromAdvanced

Threats

Securing the Mobile Workforce

Ensuring Safe

Cloud Usage

Information Protection

Advanced Threat Protection

Email WebEndpoint

Cloud Generation Security

Building Trust – Best Practices for Protecting Data in the Cloud

Page 12: Building Trust; best practics for protecting data in the cloud

12

Mobile/BYOD/IoT Endpoints

Enable Enterprises to Securely Embrace the CloudEnsuring Safe Cloud Usage

HeadquartersData Center

RegionalOffice

Users

Building Trust – Best Practices for Protecting Data in the Cloud

Capability One Symantec Solution

Cloud & App-based Web Traffic Cleansing Cloud Gateway

Inspect User Communication for Advanced Malware Cloud-Based Sandbox

Visibility into Cloud Application Usage by Users Application Discovery

User-Centric DLP Data Loss Prevention

User-Based Cloud Application Authorization Cloud Broker

Audit Acceptable-Use with Real-Time Analytics Cloud Analytics

Page 13: Building Trust; best practics for protecting data in the cloud

182Mweb attacks

blocked last year

Discovered

430 millionnew unique pieces

of malware last year

12,000+Cloud applications

discovered and protected

Innovation for the Cloud Generation:Protecting Against Advanced Threats – Global Intelligence Network

175M Consumer and Enterprise

endpoints protected

9 global threat response centers with

3000 Researchers and Engineers

2 Billion emails scanned per day

1 Billionpreviously unseen web requests scanned daily

Cloud Global Intelligence Sourced From:

100Msocial engineering scams blocked last

year

1Bmalicious emails stopped last year

Building Trust – Best Practices for Protecting Data in the Cloud 13

Page 14: Building Trust; best practics for protecting data in the cloud

A Portfolio to Deliver Cloud Generation Security

Building Trust – Best Practices for Protecting Data in the Cloud 14

Bluecoat and Symantec Defining the Future of Cyber Security

HeadquartersData Center

RegionalOffice

RoamingUsers

Next GenerationEndpoints (IoT/Mobile)

Web ProtectionEncrypted Traffic

Tokenized Data storageAdvance Malware Analysis

Next-Generation SOCData Loss Prevention

Managed Security ServiceNext Gen Endpoint

Mail Protection

Security Stack

Page 15: Building Trust; best practics for protecting data in the cloud

Cloud Adoption and Protection

Maximise Benefit from Cloud Usage• Build and Maintain Trust• Choose the Right Cloud(s)• Secure Digital Transformation

Minimise Cloud Risk• Understand and Control your Cloud Usage• Know your Data• Harmonise Security Policies• Control Migration to the Cloud

Ensure Compliance• Protect Data in and for the Cloud• Audit Cloud Activity

Building Trust – Best Practices for Protecting Data in the Cloud 15

Value of Adopting Security Best Practice

Page 16: Building Trust; best practics for protecting data in the cloud

Thank you!

Copyright © 2016 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

Building Trust – Best Practices for Protecting Data in the Cloud 16

Presenter’s NamePresenter’s EmailPresenter’s Phone