Information Technology Information and Systems Security/Compliance Information Security
The New frontiers in Information Security
-
Upload
vineet-sood -
Category
Technology
-
view
73 -
download
0
description
Transcript of The New frontiers in Information Security
Wipro Leading Edge - 2010 •1
Vineet SoodDirector Channels & Alliances
New Frontiers in Security
2
More information in more
places, accessed from more
points, than ever before
Symantec Enterprise Vision and Strategy
Protecting the Infrastructure
Trend 1 – Keeping the Bad Guys Out
Trend 1 – Keeping the Bad Guys Out
• Bermuda Triangle - FW + IDS + AV
• Protection = Prevention + Detection
– End of Road for IDS
– Emergence of IPS
• Insider Threat Emerged
– Host Protection
– Assesment tools/Sniffers
Trend 1 – Keeping the Bad Guys Out
Trend 2 – Letting the Good Guys In
Business is Changing; Security Must
Enabling Secure Business Access
Trend 2 – Letting the Good Guys In
• Boundaryless Org - Thinning of PERIMETER
– Each End pt becomes a Gateway
– Work from Anywhere/Anytime (2 of the 3 Any’s)
• Integration of Technology
– Evolution of UTM’s & End Point Suites
– Genesis of NAC & Secure Access
• Security/Incident Monitoring
– Protection = Prevention + Detection + Response
– Closed Loop? Still a Dream
Trend 3 – Keeping Good things In
Protecting Information
Trend 3 – Keeping Good things In
• Data Loss Prevention
– Network, Storage & End Point
• Regulatory Compliance
– Technical Controls
• Ability to recover things
– Back up & HA
• Identity Mgmt Back in Vogue
Trend 4 – Security Industry Grows up
Mergers & Acquisitions Hot-Up
Trend 4 – Security Industry Grows up
• Acquisitions Galore in Past 2 to 3 yrs
– Macfee, RSA, Archsight, Cogent, IronPort, Big Fix, Tricipher, Fortify, Arcot
– Verisign, PGP + GE, Msg Labs, Vontu, BrightMail, Mi5
• All Major Players in Security Bandwagon
– Symantec, IBM, HP, Cisco, MS, Intel, Google
• Soc + NoC Consolidation
– Back up & HA
It’s a ON-DEMAND World
I want to work the way I want
to work
Staff work can be done by 3rd party
I want to share INFO who are you
to say I can’t
New Dimensions @ Work
Key IT Trends of Future
Consumerisation of IT
IT-ization of the Consumer
Mobile
Social
Virtual & Cloud
Mobility
By 2011 1 billion mobile devices will access internet
Sophisticated Attackers
On July 13 2010 a unique form of malware was discovered that was
attempting to take control of industrial infrastructure around the world
We Protected PCs & Macs for years now
SMART Devices are now connecting to the Internet to offer new features
They will require same security, ability to update, remote support.
Inferences for the Future
Everything Revolves Around People and Information
Business and Personal Digital Personae Have Merged
Simple and Secure Access To Information Is Expected
The Enterprise Is More Scalable and Cost Effective
New Frontiers of Security in Future
Everything Revolves Around People and Information
Confidential - Internal Only
CONFIDENCE
People Information
Identity Protection Context
Building the Human Firewall
Thank you!
Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
•22
Thursday, December 2, 2010
| Renaissance Mumbaiwww.symantec.com/in/vision2010