hosted security: complete protection with a peace of mind

26
Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1

Upload: aolani

Post on 25-Feb-2016

24 views

Category:

Documents


3 download

DESCRIPTION

Hosted Security: Complete Protection With A Peace Of Mind. Leonard Sim Client Services Manager – South Asia Symantec Hosted Services. Agenda. There is a new risk. What’s being done now?. The new approach. Top Information Security Concerns. Protection and Control. Cost Containment. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Hosted Security: Complete Protection With A Peace Of Mind

Hosted Security: Complete Protection With A Peace Of MindLeonard Sim

Client Services Manager – South Asia

Symantec Hosted Services1

Page 2: Hosted Security: Complete Protection With A Peace Of Mind

Agenda

2

What’s being done now?

There is a new risk

The new approach

Page 3: Hosted Security: Complete Protection With A Peace Of Mind

Top Information Security Concerns

Protection and Control

Cost Containment Staffing

• Keep threats out

• Control sensitive data• Enforce compliance

• Do more with less

• Quicker time to benefit• CAPEX v OPEX

• Limited staff, expertise

• Innovation vs. managing infrastructure

Page 4: Hosted Security: Complete Protection With A Peace Of Mind

Evolving Threat Landscape

90% of breaches in 2009 involved organized crime targeting corporate information

90% of all email traffic is spam and the Web has become the primary vector for malware delivery

11x increase in unique malware samples in the last two years seen by Symantec

Page 5: Hosted Security: Complete Protection With A Peace Of Mind

Sophistication of high end threats is evolving rapidlyContinued growth in targeted threats which attack specific companies, persons or systems

Evolving Threat LandscapeNew “Zero Hour” Threats continue to increase

New malicious code signaturesDriven by:

Increase in new threats leading to failure of traditional signature based protection

Readily available malware toolkits

Specialization of highly skilled participants

Huge sums of money$£¥€

Page 6: Hosted Security: Complete Protection With A Peace Of Mind

It was annoying once….

Page 7: Hosted Security: Complete Protection With A Peace Of Mind

It’s now malicious

Page 8: Hosted Security: Complete Protection With A Peace Of Mind

What are they attempting to do.

Incursion

Discovery & Capture

Extraction

Page 9: Hosted Security: Complete Protection With A Peace Of Mind

Attacks Are Becoming More Complex

Fraudulent IM with Web Link

Compromised Website Hosting Malware

Spoofed Email with Web Link

Comprehensive Protection Needed Across Email, Web, and IM

Page 10: Hosted Security: Complete Protection With A Peace Of Mind

You Can’t See It BUT It’s There

10

Page 11: Hosted Security: Complete Protection With A Peace Of Mind

New Web Threats

Page 12: Hosted Security: Complete Protection With A Peace Of Mind

Facebook Delivered Viruses

Page 13: Hosted Security: Complete Protection With A Peace Of Mind

Point solutions leave gaps – multi-protocol converged threat analysis and unrivaled accuracy are essential

Early warning systems were built for the old style mass mailing viruses not targeted attacks or smaller attacks from thousands of attackers

A new threat landscape requires a different approach

90%Of all breaches are now driven by highly resourced organized

criminals

2008: total market value of illegally obtained corporate data

$600B - $1T

Page 14: Hosted Security: Complete Protection With A Peace Of Mind

What’s being done now?

14

Page 15: Hosted Security: Complete Protection With A Peace Of Mind

How Email Flows To Your Company

Sender

Email Client

Email Server

Email Client

Email Server

Recipient

Page 16: Hosted Security: Complete Protection With A Peace Of Mind

Traditional Email Security

Email Server

DNS

Email Client

Email ServerDNS

Email Client

Recipient

Mail FlowATTACKS!

Sender

Page 17: Hosted Security: Complete Protection With A Peace Of Mind

What happens inside…Traditional Email Security

• Emails will have to be received by the device to be processed– Wasted resources and bandwidth

• Majority Signature Based– Most use the same signatures as their desktop AV products

• Some have IP reputation filtering– White listing/black listing based on IP address only

• Will rely on updates by the vendor to keep up to date– Window of vulnerability, time taken for updates to be developed and

delivered• Will have to increase physical resources once volume of mail

increases

Page 18: Hosted Security: Complete Protection With A Peace Of Mind

The New Approach

18

Page 19: Hosted Security: Complete Protection With A Peace Of Mind

• Filtration• Sedimentation• Slow Sand Filters• Activated Sludge• Flocculation• Chlorination• Electromagnetic Radiation

• Suspended Particles• Parasites• Bacteria• Algae• Viruses• Fungi

Are these terms familiar?

Page 21: Hosted Security: Complete Protection With A Peace Of Mind

• DNS Block Lists• Signature• Heuristics• Traffic Shaping• White Lists• Black Lists• Bayesian Filtering• Sandbox

• Viruses• Trojans• Spyware• Spam• Phishing

Are these terms familiar?

Page 22: Hosted Security: Complete Protection With A Peace Of Mind

How Hosted Email Scanning Works

Sender

Email Client

Email Server

Email Client

Email Server

Recipient

MessageLabsData Centre

Internet

• DNS Block Lists

• Signaturing

• Heuristics

• Traffic Shaping

• White Lists

• Black Lists

• Bayesian Filtering

• Sandbox

Untreated Emails

• Viruses

• Trojans

• Spyware

• Spam

• Phishing Clean Emails

Page 23: Hosted Security: Complete Protection With A Peace Of Mind

What is Symantec Hosted Security?‘In The Cloud’ Security-as-a-Service

Page 24: Hosted Security: Complete Protection With A Peace Of Mind

• Procurement

• Deployment

• Testing

• Performance Tuning

• Policy Administration

• Capacity Planning

• High Availability

• Patching

• Upgrades

Management Overhead

Eliminate On-Site Infrastructure

Messaging

Web

• Management

• Traffic Shaping

• AV / AS / Content Filtering

• High Availability

• Management

• AV / AS / Content Filtering

• High Availability

HQ Office Branch Office #1

Branch Office #2…Messaging

Web

• AV / AS / Content Filtering

• High Availability

• AV / AS / Content Filtering

• High Availability

Messaging

Web

• AV / AS / Content Filtering

• High Availability

• AV / AS / Content Filtering

• High Availability

IT Admin

Policy Administration

Management Simplified

Page 25: Hosted Security: Complete Protection With A Peace Of Mind

Advantages of Hosted Services

25

• Defense in depth with multiple scanning engines

• Multi-protocol protection across email, Web, and IM

• Enforce Acceptable Use Policies and limit data loss

• Affordable, predictable costs managed as OPEX

• Virtually eliminates the need for hardware and software

• Block threats before they reach your network

Reduce Risk

Lower TCO and Simplify

Management

IncreaseConfidence

• Industry-leading Service Level Agreement (SLA)

• 24 / 7 support delivered by dedicated specialists

• Highly scalable, reliable, and energy efficient

Page 26: Hosted Security: Complete Protection With A Peace Of Mind

Leonard SimClient Services Manager – South [email protected]