1 / 26

Hosted Security: Complete Protection With A Peace Of Mind

Hosted Security: Complete Protection With A Peace Of Mind. Leonard Sim Client Services Manager – South Asia Symantec Hosted Services. Agenda. There is a new risk. What’s being done now?. The new approach. Top Information Security Concerns. Protection and Control. Cost Containment.

aolani
Download Presentation

Hosted Security: Complete Protection With A Peace Of Mind

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services

  2. Agenda There is a new risk What’s being done now? The new approach

  3. Top Information Security Concerns Protection and Control Cost Containment Staffing • Keep threats out • Control sensitive data • Enforce compliance • Do more with less • Quicker time to benefit • CAPEX v OPEX • Limited staff, expertise • Innovation vs. managing infrastructure

  4. Evolving Threat Landscape 90%of breaches in 2009 involved organized crime targeting corporate information 11x increase in unique malware samples in the last two years seen by Symantec 90%of all email traffic is spam and the Web has become the primary vector for malware delivery

  5. Evolving Threat LandscapeNew “Zero Hour” Threats continue to increase New malicious code signatures Driven by: Readily available malware toolkits Specialization of highly skilled participants Huge sums of money $£¥€ Increase in new threats leading to failure of traditional signature based protection Sophistication of high end threats is evolving rapidly Continued growth in targeted threats which attack specific companies, persons or systems

  6. It was annoying once….

  7. It’s now malicious

  8. What are they attempting to do. Extraction Incursion Discovery & Capture

  9. Attacks Are Becoming More Complex Spoofed Email with Web Link Fraudulent IM with Web Link Compromised Website Hosting Malware Comprehensive Protection Needed Across Email, Web, and IM

  10. You Can’t See It BUT It’s There

  11. New Web Threats

  12. Facebook Delivered Viruses

  13. A new threat landscape requires a different approach 90% Point solutions leave gaps – multi-protocol converged threat analysis and unrivaled accuracy are essential Of all breaches are now driven by highly resourced organized criminals Early warning systems were built for the old style mass mailing viruses not targeted attacks or smaller attacks from thousands of attackers 2008: total market value of illegally obtained corporate data $600B - $1T

  14. What’s being done now?

  15. How Email Flows To Your Company Email Client Email Client Email Server Email Server Sender Recipient

  16. Traditional Email Security Mail Flow ATTACKS! Email Client Email Server DNS Sender Recipient Email Client Email Server DNS

  17. What happens inside…Traditional Email Security • Emails will have to be received by the device to be processed • Wasted resources and bandwidth • Majority Signature Based • Most use the same signatures as their desktop AV products • Some have IP reputation filtering • White listing/black listing based on IP address only • Will rely on updates by the vendor to keep up to date • Window of vulnerability, time taken for updates to be developed and delivered • Will have to increase physical resources once volume of mail increases

  18. The New Approach

  19. Are these terms familiar? • Suspended Particles • Parasites • Bacteria • Algae • Viruses • Fungi • Filtration • Sedimentation • Slow Sand Filters • Activated Sludge • Flocculation • Chlorination • Electromagnetic Radiation

  20. How Water Flows To Your Home Home • Filtration • Sedimentation • Slow Sand Filters • Activated Sludge • Flocculation • Chlorination • Electromagnetic Radiation Reservoir Clean Water • Untreated Water • Suspended Particles • Parasites • Bacteria • Algae • Viruses • Fungi

  21. Are these terms familiar? • Viruses • Trojans • Spyware • Spam • Phishing • DNS Block Lists • Signature • Heuristics • Traffic Shaping • White Lists • Black Lists • Bayesian Filtering • Sandbox

  22. How Hosted Email Scanning Works • DNS Block Lists • Signaturing • Heuristics • Traffic Shaping • White Lists • Black Lists • Bayesian Filtering • Sandbox • Untreated Emails • Viruses • Trojans • Spyware • Spam • Phishing Clean Emails Email Client Email Client MessageLabs Data Centre Email Server Email Server Sender Recipient Internet

  23. What is Symantec Hosted Security?‘In The Cloud’ Security-as-a-Service

  24. Eliminate On-Site Infrastructure HQ Office Branch Office #1 Branch Office #2… Messaging Messaging Messaging • Management • Traffic Shaping • AV / AS / Content Filtering • High Availability • AV / AS / Content Filtering • High Availability • AV / AS / Content Filtering • High Availability Web Web Web • Management • AV / AS / Content Filtering • High Availability • AV / AS / Content Filtering • High Availability • AV / AS / Content Filtering • High Availability Management Simplified Management Overhead • Procurement • Deployment • Testing • Performance Tuning • Policy Administration • Capacity Planning • Policy Administration • High Availability • Patching • Upgrades IT Admin

  25. Advantages of Hosted Services Lower TCO and Simplify Management Reduce Risk Increase Confidence • Affordable, predictable costs managed as OPEX • Virtually eliminates the need for hardware and software • Block threats before they reach your network • Defense in depth with multiple scanning engines • Multi-protocol protection across email, Web, and IM • Enforce Acceptable Use Policies and limit data loss • Industry-leading Service Level Agreement (SLA) • 24 / 7 support delivered by dedicated specialists • Highly scalable, reliable, and energy efficient

  26. Leonard Sim Client Services Manager – South Asia lsim@messagelabs.com

More Related