+ All Categories
Home > Technology > Security and the Cloud- Symantec

Security and the Cloud- Symantec

Date post: 18-Nov-2014
Category:
Upload: itnewsafrica
View: 915 times
Download: 3 times
Share this document with a friend
Description:
 
20
Symantec.cloud Gordon Love Regional Director - Africa
Transcript
Page 1: Security and the Cloud- Symantec

Symantec.cloudGordon LoveRegional Director - Africa

Page 2: Security and the Cloud- Symantec

Cloud Adoption in South Africa

Source : Forrester

Page 3: Security and the Cloud- Symantec

Cloud Solutions currently adopted?

Source : Forrester

Page 4: Security and the Cloud- Symantec

Perception of Value

Source : Forrester

Page 5: Security and the Cloud- Symantec

Concerns and Barriers to Adoption

Source : Forrester

Page 6: Security and the Cloud- Symantec

Cloud Related Cost savings

Source : Forrester

Page 7: Security and the Cloud- Symantec

Future Adoption

Source : Forrester

Page 8: Security and the Cloud- Symantec

Future Demand

Source : Forrester

Page 9: Security and the Cloud- Symantec

and the cloud?Symantec

Page 10: Security and the Cloud- Symantec

90+ petabytes

Page 11: Security and the Cloud- Symantec

Global Intelligence NetworkIdentifies more threats, takes action faster & prevents impact

Information ProtectionPreemptive Security Alerts Threat Triggered Actions

Global Scope and ScaleWorldwide Coverage 24x7 Event Logging

Rapid Detection

Attack Activity• 240,000 sensors• 200+ countries

and territories

Malware Intelligence• 133M client, server,

gateways monitored• Global coverage

Vulnerabilities• 35,000+ vulnerabilities• 11,000 vendors• 80,000 technologies

Spam/Phishing• 5M decoy accounts• 8B+ email messages/day• 1B+ web requests/day

Austin, TXMountain View, CACulver City, CA

San Francisco, CA

Taipei, Taiwan

Tokyo, Japan

Dublin, IrelandCalgary, Alberta

Chengdu, China

Chennai, IndiaPune, India

11

Page 12: Security and the Cloud- Symantec

Threat landscape in context – January 2012

Page 13: Security and the Cloud- Symantec

Threat landscape in context – February 2012

Page 14: Security and the Cloud- Symantec

Threat landscape in context – January 2012

Page 15: Security and the Cloud- Symantec

Threat landscape in context – February 2012

Page 16: Security and the Cloud- Symantec

Botnets in South Africa

16

Page 17: Security and the Cloud- Symantec

Window of vulnerability: Imsolk.B “Here you have” worm

Threat Landscape

Page 18: Security and the Cloud- Symantec

Email Security Email Anti Spam Email Anti Virus Email Image Control Email Content ControlEmail Management Boundary Encryption Policy Based Encryption Email Archiving Email Continuity Web & IM Security Web Anti Virus & Anti Spyware Web URL Filtering Web Roaming UserSecure Enterprise IMIM Security Endpoint SecurityHosted Endpoint Protection

Pre-integratedapplications

Page 19: Security and the Cloud- Symantec

Source: IDC and Symantec analysis

Estimated Addressable SaaS Market ($B) - 30% CAGR

DLPEncryption

Remote Access /MonitoringEndpoint Management

Endpoint Protection

Backup

Archiving

Web Security

Email Security

2009 2010 2011 2012 2013 20140123456789

0.5 0.6 0.8 1.0 1.1 1.30.10.2

0.30.5

0.60.7

0.20.2

0.30.4

0.50.6

0.00.0

0.1

0.2

0.40.6

0.10.1

0.2

0.3

0.4

0.5

0.40.5

0.7

1.0

1.3

1.8

0.1

0.1

0.1

0.2

0.2

0.3

0.7

0.9

1.2

1.5

1.9

2.4

0.1

0.2

0.2

0.3

0.3

0.4

0.2

0.2

0.2

0.3

0.3

0.4

Continuity

The Cloud – By the Numbers

Page 20: Security and the Cloud- Symantec

Cloud Computing is inevitable

Thank you – Questions?

[email protected]


Recommended