The New frontiers in Information Security

22
Wipro Leading Edge - 2010 1 Vineet Sood Director Channels & Alliances New Frontiers in Security

description

With New Dimensions getting Introduced @ Work every year this Presentation to Top CIO's in India showcases changing trends in Information Security Trend 1 – Keeping the Bad Guys Out Trend 2 – Letting the Good Guys In Trend 3 – Keeping Good things In

Transcript of The New frontiers in Information Security

Page 1: The New frontiers in Information Security

Wipro Leading Edge - 2010 •1

Vineet SoodDirector Channels & Alliances

New Frontiers in Security

Page 2: The New frontiers in Information Security

2

More information in more

places, accessed from more

points, than ever before

Symantec Enterprise Vision and Strategy

Page 3: The New frontiers in Information Security

Protecting the Infrastructure

Trend 1 – Keeping the Bad Guys Out

Page 4: The New frontiers in Information Security

Trend 1 – Keeping the Bad Guys Out

• Bermuda Triangle - FW + IDS + AV

• Protection = Prevention + Detection

– End of Road for IDS

– Emergence of IPS

• Insider Threat Emerged

– Host Protection

– Assesment tools/Sniffers

Page 5: The New frontiers in Information Security

Trend 1 – Keeping the Bad Guys Out

Page 6: The New frontiers in Information Security

Trend 2 – Letting the Good Guys In

Business is Changing; Security Must

Enabling Secure Business Access

Page 7: The New frontiers in Information Security

Trend 2 – Letting the Good Guys In

• Boundaryless Org - Thinning of PERIMETER

– Each End pt becomes a Gateway

– Work from Anywhere/Anytime (2 of the 3 Any’s)

• Integration of Technology

– Evolution of UTM’s & End Point Suites

– Genesis of NAC & Secure Access

• Security/Incident Monitoring

– Protection = Prevention + Detection + Response

– Closed Loop? Still a Dream

Page 8: The New frontiers in Information Security

Trend 3 – Keeping Good things In

Protecting Information

Page 9: The New frontiers in Information Security

Trend 3 – Keeping Good things In

• Data Loss Prevention

– Network, Storage & End Point

• Regulatory Compliance

– Technical Controls

• Ability to recover things

– Back up & HA

• Identity Mgmt Back in Vogue

Page 10: The New frontiers in Information Security

Trend 4 – Security Industry Grows up

Mergers & Acquisitions Hot-Up

Page 11: The New frontiers in Information Security

Trend 4 – Security Industry Grows up

• Acquisitions Galore in Past 2 to 3 yrs

– Macfee, RSA, Archsight, Cogent, IronPort, Big Fix, Tricipher, Fortify, Arcot

– Verisign, PGP + GE, Msg Labs, Vontu, BrightMail, Mi5

• All Major Players in Security Bandwagon

– Symantec, IBM, HP, Cisco, MS, Intel, Google

• Soc + NoC Consolidation

– Back up & HA

Page 12: The New frontiers in Information Security

It’s a ON-DEMAND World

I want to work the way I want

to work

Staff work can be done by 3rd party

I want to share INFO who are you

to say I can’t

New Dimensions @ Work

Page 13: The New frontiers in Information Security

Key IT Trends of Future

Consumerisation of IT

IT-ization of the Consumer

Mobile

Social

Virtual & Cloud

Page 15: The New frontiers in Information Security

By 2011 1 billion mobile devices will access internet

Page 16: The New frontiers in Information Security

Sophisticated Attackers

On July 13 2010 a unique form of malware was discovered that was

attempting to take control of industrial infrastructure around the world

Page 17: The New frontiers in Information Security

We Protected PCs & Macs for years now

SMART Devices are now connecting to the Internet to offer new features

They will require same security, ability to update, remote support.

Page 18: The New frontiers in Information Security

Inferences for the Future

Everything Revolves Around People and Information

Business and Personal Digital Personae Have Merged

Simple and Secure Access To Information Is Expected

The Enterprise Is More Scalable and Cost Effective

Page 19: The New frontiers in Information Security

New Frontiers of Security in Future

Page 20: The New frontiers in Information Security

Everything Revolves Around People and Information

Confidential - Internal Only

CONFIDENCE

People Information

Identity Protection Context

Page 21: The New frontiers in Information Security

Building the Human Firewall

Page 22: The New frontiers in Information Security

Thank you!

Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

•22

Thursday, December 2, 2010

| Renaissance Mumbaiwww.symantec.com/in/vision2010