Post on 16-Apr-2017
Building Trust – Best Practices for Protecting Data in the Cloud 1
Building Trust;Best Practices for Protecting Data in the Cloud
Siân JohnEMEA Chief Strategist Symantec
Always On and EverywhereDigital World Enhances or Replaces Much of the Physical World
2Building Trust – Best Practices for Protecting Data in the Cloud
Applications and Data Are Moving to The Cloud
Building Trust – Best Practices for Protecting Data in the Cloud 3
Building Trust – Best Practices for Protecting Data in the Cloud 4
Information is exploding
202040ZB
20157.9ZB
20101.2ZB
Building Trust – Best Practices for Protecting Data in the Cloud 5
The Drive for Data Privacy
Lack of Business Ownership
Data Growth
Emerging Technology
Regulations
Lack of Visibility
Evolving Threat landscape
Press Headlines
Reputation
Business Opportunity
Customer Trust
Drivers Inhibitors
6
Privacy most Important when Customers choose products or services
Symantec State of Privacy Report 2015https://www.symantec.com/content/en/us/about/presskits/b-state-of-privacy-report-2015.pdf
.
Delivering great customer service
Keeping your data safe and secure
Delivering quality products / services
Treating their employees and suppliers fairly
Being environmentally friendly
82%
86%
69%
56%
88%
Building Trust – Best Practices for Protecting Data in the Cloud
Not all Organisations have the same level of Consumer Trust for Securing Data
7
https://www.symantec.com/content/en/us/about/presskits/b-state-of-privacy-report-2015.pdf.
Hospitals / medical services
Banks Government Technology companies (i.e. Google, Microsoft)
Retailers (Including online shops)
Social media sites (i.e. Facebook, Twitter)
69% 66%
45%
22% 20%
10%
Organisations whose business models are based on data (tech
companies and social media companies) appear less trusted
to keep customer data completely secure
Data Trust Chain
Building Trust – Best Practices for Protecting Data in the Cloud
8
SSL
Mobile/BYOD/IoT Endpoints
The Cloud Generation Security ChallengeA Shifting Expanse of Blind Spots
HeadquartersData Center
RegionalOffice
TraditionalSecurity Stack
Expanding Use of Encryption Creates Blind Spots
Traditional Security Stack Has Lost Significant Visibility As Resources Go
Direct-to-Net
Cloud Applications Causing Organizations to Lose Control Over Their Resources
Rapidly Growing Landscape of Unprotected Devices
Users
Cloud Applications And Services
Building Trust – Best Practices for Protecting Data in the Cloud
Complications of Cloud Adoption
• Who Owns the Comprehensive Service Level Agreements?
• Single Pane of Glass?
• Redundancy & High-Availability?
• Vendor Compatibility?
Cloud Web Gateway
Provider
Cloud DLP Provider
Cloud Data Encryption
Provider
Cloud Access Control
Provider
Cloud SandboxProvider
Cloud Breach Analysis
Cloud Forensic / Recording
Cloud EmailScanning
Cloud DDoS
UBA
Innovation for the Cloud Generation: Industry Has Created Cloud Security Chaos
Building Trust – Best Practices for Protecting Data in the Cloud 9
10
Gaining Control of the Cloud
Building Trust – Best Practices for Protecting Data in the Cloud
Visibility
Authentication
Data Protection
Secure Environment
Adaptive Security
Automation
Ease of Use
…know what is running / stored where…
…ensure only right users can access the right apps/data…
…safeguard my data everywhere and at all times…
…ensure the environment is protected from malware and advanced threats…
…security stays in-sync and scales with my constantly changing Cloud environment…
…be able to automatically apply the right security with minimal human intervention…
…manage my complex hybrid world from single control point…
Innovation for the Cloud Generation:Securing A New World of Devices, Networks and Applications
11
Protection fromAdvanced
Threats
Securing the Mobile Workforce
Ensuring Safe
Cloud Usage
Information Protection
Advanced Threat Protection
Email WebEndpoint
Cloud Generation Security
Building Trust – Best Practices for Protecting Data in the Cloud
12
Mobile/BYOD/IoT Endpoints
Enable Enterprises to Securely Embrace the CloudEnsuring Safe Cloud Usage
HeadquartersData Center
RegionalOffice
Users
Building Trust – Best Practices for Protecting Data in the Cloud
Capability One Symantec Solution
Cloud & App-based Web Traffic Cleansing Cloud Gateway
Inspect User Communication for Advanced Malware Cloud-Based Sandbox
Visibility into Cloud Application Usage by Users Application Discovery
User-Centric DLP Data Loss Prevention
User-Based Cloud Application Authorization Cloud Broker
Audit Acceptable-Use with Real-Time Analytics Cloud Analytics
182Mweb attacks
blocked last year
Discovered
430 millionnew unique pieces
of malware last year
12,000+Cloud applications
discovered and protected
Innovation for the Cloud Generation:Protecting Against Advanced Threats – Global Intelligence Network
175M Consumer and Enterprise
endpoints protected
9 global threat response centers with
3000 Researchers and Engineers
2 Billion emails scanned per day
1 Billionpreviously unseen web requests scanned daily
Cloud Global Intelligence Sourced From:
100Msocial engineering scams blocked last
year
1Bmalicious emails stopped last year
Building Trust – Best Practices for Protecting Data in the Cloud 13
A Portfolio to Deliver Cloud Generation Security
Building Trust – Best Practices for Protecting Data in the Cloud 14
Bluecoat and Symantec Defining the Future of Cyber Security
HeadquartersData Center
RegionalOffice
RoamingUsers
Next GenerationEndpoints (IoT/Mobile)
Web ProtectionEncrypted Traffic
Tokenized Data storageAdvance Malware Analysis
Next-Generation SOCData Loss Prevention
Managed Security ServiceNext Gen Endpoint
Mail Protection
Security Stack
Cloud Adoption and Protection
Maximise Benefit from Cloud Usage• Build and Maintain Trust• Choose the Right Cloud(s)• Secure Digital Transformation
Minimise Cloud Risk• Understand and Control your Cloud Usage• Know your Data• Harmonise Security Policies• Control Migration to the Cloud
Ensure Compliance• Protect Data in and for the Cloud• Audit Cloud Activity
Building Trust – Best Practices for Protecting Data in the Cloud 15
Value of Adopting Security Best Practice
Thank you!
Copyright © 2016 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Building Trust – Best Practices for Protecting Data in the Cloud 16
Presenter’s NamePresenter’s EmailPresenter’s Phone