Date post: | 15-Jan-2016 |
Category: |
Documents |
View: | 215 times |
Download: | 0 times |
The Changing Face of Endpoint Security
K VaradarajanRegional Manager, Enterprise Sales, Symantec
Security Conference 2010_Bangalore
IT Security Landscape TodayMarket Economy for Data
Attack Sophistication
Shift from Hacking to Theft
Threat Volume
• More unique / targeted attacks
• Sites per virus dramatic decline
• Enter / spread through multiple vectors
• Endpoint, email, web, misleading applications
• Morphing faster than ever
• E.g. command and control
• More unique / targeted attacks
• Sites per virus dramatic decline
• Enter / spread through multiple vectors
• Endpoint, email, web, misleading applications
• Morphing faster than ever
• E.g. command and control
In 2000
5signatures a day
In 2010
25,000signatures a day
Computers People
2Security Conference 2010_Bangalore
Endpoints Are Constantly Under Attack
3Security Conference 2010_Bangalore
Non-traditional Endpoints
Even As They Continue to Evolve
4
Traditional Endpoints
IT Infrastructure
V
Security Conference 2010_Bangalore
Non-traditional Endpoints
Even As They Continue to Evolve
5
Traditional Endpoints
IT Infrastructure
V
Security Conference 2010_Bangalore
Non-traditional Endpoints
Even As They Continue to Evolve
6
Traditional Endpoints
IT Infrastructure
V
Security Conference 2010_Bangalore
Consumerization of IT
• Indian enterprises are encouraging employees to access, modify and disseminate information
• Information often stored on the cloud or in the employees own devices
• 59 percent of Indian enterprises believe that employee-owned endpoints compromise security
77
73
54
51
Windows-…
Smartphones
PDAs
Mac-based …Growth of mobile devices
Source: Symantec Enterprise Security Survey 2009. All figures are in %77Security Conference 2010_Bangalore
Secure & Manage All Your Endpoints
8
ControlInformation
RISKS
ReduceInformation
COSTS
Security Conference 2010_Bangalore
11Keep The Bad
Things OutLet the Good
Guys On
22Keep The Good
Things In
33
Cell PhoneCell Phone LaptopLaptop DesktopDesktop File ServerFile Server Application ServerApplication Server Messaging ServerMessaging Server Database ServerDatabase Server
Symantec Confidential
Unified Agent
Unified Management
Endpoint Security Strategy
9
Enterprise Infrastructure
Centralized Control Actionable Information Operational EfficiencyPolicy Management End-to-end Visibility Process Automation
GatewayServersEndpoints
Network Access Control
Messaging Data Loss Prevention
Robust Mail Security
Multi-platform Support
Audit Compliance
Advanced Server Security
Inventory & Patch Management
Data Loss Prevention
Complete Endpoint Protection
10
Elements of Protection
Security Conference 2010_Bangalore
Elements of Endpoint Compliance
Antivirus
Antispyware
Firewall
IntrusionPrevention
Device and Application Control
Network AccessControl
11Security Conference 2010_Bangalore
12
Low Hanging Fruit Approach…
Security Conference 2010_Bangalore 12
Thank you!
Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
13Security Conference 2010_Bangalore