Hosted Security: Complete Protection With A Peace Of MindLeonard Sim
Client Services Manager – South Asia
Symantec Hosted Services1
Agenda
2
What’s being done now?
There is a new risk
The new approach
Top Information Security Concerns
Protection and Control
Cost Containment Staffing
• Keep threats out
• Control sensitive data• Enforce compliance
• Do more with less
• Quicker time to benefit• CAPEX v OPEX
• Limited staff, expertise
• Innovation vs. managing infrastructure
Evolving Threat Landscape
90% of breaches in 2009 involved organized crime targeting corporate information
90% of all email traffic is spam and the Web has become the primary vector for malware delivery
11x increase in unique malware samples in the last two years seen by Symantec
Sophistication of high end threats is evolving rapidlyContinued growth in targeted threats which attack specific companies, persons or systems
Evolving Threat LandscapeNew “Zero Hour” Threats continue to increase
New malicious code signaturesDriven by:
Increase in new threats leading to failure of traditional signature based protection
Readily available malware toolkits
Specialization of highly skilled participants
Huge sums of money$£¥€
It was annoying once….
It’s now malicious
What are they attempting to do.
Incursion
Discovery & Capture
Extraction
Attacks Are Becoming More Complex
Fraudulent IM with Web Link
Compromised Website Hosting Malware
Spoofed Email with Web Link
Comprehensive Protection Needed Across Email, Web, and IM
You Can’t See It BUT It’s There
10
New Web Threats
Facebook Delivered Viruses
Point solutions leave gaps – multi-protocol converged threat analysis and unrivaled accuracy are essential
Early warning systems were built for the old style mass mailing viruses not targeted attacks or smaller attacks from thousands of attackers
A new threat landscape requires a different approach
90%Of all breaches are now driven by highly resourced organized
criminals
2008: total market value of illegally obtained corporate data
$600B - $1T
What’s being done now?
14
How Email Flows To Your Company
Sender
Email Client
Email Server
Email Client
Email Server
Recipient
Traditional Email Security
Email Server
DNS
Email Client
Email ServerDNS
Email Client
Recipient
Mail FlowATTACKS!
Sender
What happens inside…Traditional Email Security
• Emails will have to be received by the device to be processed– Wasted resources and bandwidth
• Majority Signature Based– Most use the same signatures as their desktop AV products
• Some have IP reputation filtering– White listing/black listing based on IP address only
• Will rely on updates by the vendor to keep up to date– Window of vulnerability, time taken for updates to be developed and
delivered• Will have to increase physical resources once volume of mail
increases
The New Approach
18
• Filtration• Sedimentation• Slow Sand Filters• Activated Sludge• Flocculation• Chlorination• Electromagnetic Radiation
• Suspended Particles• Parasites• Bacteria• Algae• Viruses• Fungi
Are these terms familiar?
How Water Flows To Your Home
Reservoir
Home
• Filtration
• Sedimentation
• Slow Sand Filters
• Activated Sludge
• Flocculation
• Chlorination
• Electromagnetic Radiation
Untreated Water
• Suspended Particles
• Parasites
• Bacteria
• Algae
• Viruses
• Fungi
Clean Water
• DNS Block Lists• Signature• Heuristics• Traffic Shaping• White Lists• Black Lists• Bayesian Filtering• Sandbox
• Viruses• Trojans• Spyware• Spam• Phishing
Are these terms familiar?
How Hosted Email Scanning Works
Sender
Email Client
Email Server
Email Client
Email Server
Recipient
MessageLabsData Centre
Internet
• DNS Block Lists
• Signaturing
• Heuristics
• Traffic Shaping
• White Lists
• Black Lists
• Bayesian Filtering
• Sandbox
Untreated Emails
• Viruses
• Trojans
• Spyware
• Spam
• Phishing Clean Emails
What is Symantec Hosted Security?‘In The Cloud’ Security-as-a-Service
• Procurement
• Deployment
• Testing
• Performance Tuning
• Policy Administration
• Capacity Planning
• High Availability
• Patching
• Upgrades
Management Overhead
Eliminate On-Site Infrastructure
Messaging
Web
• Management
• Traffic Shaping
• AV / AS / Content Filtering
• High Availability
• Management
• AV / AS / Content Filtering
• High Availability
HQ Office Branch Office #1
Branch Office #2…Messaging
Web
• AV / AS / Content Filtering
• High Availability
• AV / AS / Content Filtering
• High Availability
Messaging
Web
• AV / AS / Content Filtering
• High Availability
• AV / AS / Content Filtering
• High Availability
IT Admin
Policy Administration
Management Simplified
Advantages of Hosted Services
25
• Defense in depth with multiple scanning engines
• Multi-protocol protection across email, Web, and IM
• Enforce Acceptable Use Policies and limit data loss
• Affordable, predictable costs managed as OPEX
• Virtually eliminates the need for hardware and software
• Block threats before they reach your network
Reduce Risk
Lower TCO and Simplify
Management
IncreaseConfidence
• Industry-leading Service Level Agreement (SLA)
• 24 / 7 support delivered by dedicated specialists
• Highly scalable, reliable, and energy efficient
Leonard SimClient Services Manager – South [email protected]
Top Related