+ All Categories
Home > Documents > The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec...

The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec...

Date post: 15-Jan-2016
Category:
View: 215 times
Download: 0 times
Share this document with a friend
Popular Tags:
13
The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore
Transcript
Page 1: The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.

The Changing Face of Endpoint Security

K VaradarajanRegional Manager, Enterprise Sales, Symantec

Security Conference 2010_Bangalore

Page 2: The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.

IT Security Landscape TodayMarket Economy for Data

Attack Sophistication

Shift from Hacking to Theft

Threat Volume

• More unique / targeted attacks

• Sites per virus dramatic decline

• Enter / spread through multiple vectors

• Endpoint, email, web, misleading applications

• Morphing faster than ever

• E.g. command and control

• More unique / targeted attacks

• Sites per virus dramatic decline

• Enter / spread through multiple vectors

• Endpoint, email, web, misleading applications

• Morphing faster than ever

• E.g. command and control

In 2000

5signatures a day

In 2010

25,000signatures a day

Computers People

2Security Conference 2010_Bangalore

Page 3: The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.

Endpoints Are Constantly Under Attack

3Security Conference 2010_Bangalore

Page 4: The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.

Non-traditional Endpoints

Even As They Continue to Evolve

4

Traditional Endpoints

IT Infrastructure

V

Security Conference 2010_Bangalore

Page 5: The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.

Non-traditional Endpoints

Even As They Continue to Evolve

5

Traditional Endpoints

IT Infrastructure

V

Security Conference 2010_Bangalore

Page 6: The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.

Non-traditional Endpoints

Even As They Continue to Evolve

6

Traditional Endpoints

IT Infrastructure

V

Security Conference 2010_Bangalore

Page 7: The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.

Consumerization of IT

• Indian enterprises are encouraging employees to access, modify and disseminate information

• Information often stored on the cloud or in the employees own devices

• 59 percent of Indian enterprises believe that employee-owned endpoints compromise security

77

73

54

51

Windows-…

Smartphones

PDAs

Mac-based …Growth of mobile devices

Source: Symantec Enterprise Security Survey 2009. All figures are in %77Security Conference 2010_Bangalore

Page 8: The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.

Secure & Manage All Your Endpoints

8

ControlInformation

RISKS

ReduceInformation

COSTS

Security Conference 2010_Bangalore

Page 9: The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.

11Keep The Bad

Things OutLet the Good

Guys On

22Keep The Good

Things In

33

Cell PhoneCell Phone LaptopLaptop DesktopDesktop File ServerFile Server Application ServerApplication Server Messaging ServerMessaging Server Database ServerDatabase Server

Symantec Confidential

Unified Agent

Unified Management

Endpoint Security Strategy

9

Page 10: The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.

Enterprise Infrastructure

Centralized Control Actionable Information Operational EfficiencyPolicy Management End-to-end Visibility Process Automation

GatewayServersEndpoints

Network Access Control

Messaging Data Loss Prevention

Robust Mail Security

Multi-platform Support

Audit Compliance

Advanced Server Security

Inventory & Patch Management

Data Loss Prevention

Complete Endpoint Protection

10

Elements of Protection

Security Conference 2010_Bangalore

Page 11: The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.

Elements of Endpoint Compliance

Antivirus

Antispyware

Firewall

IntrusionPrevention

Device and Application Control

Network AccessControl

11Security Conference 2010_Bangalore

Page 12: The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.

12

Low Hanging Fruit Approach…

Security Conference 2010_Bangalore 12

Page 13: The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.

Thank you!

Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

[email protected]

13Security Conference 2010_Bangalore


Recommended