ST B02 Profiting from the Cloud

New revenue streams with Security and Information Protection services

Arnaud Taddei EMEA Cloud Solution Architect – Service Providers and Telcos Your Route to SUCCESS

1 What Matters for Telcos and Service Providers

2 Symantec Unique Value Proposition

3 Mature Services co-Launched on Market

4 Nascent Services being launched on Market

5 Securing the Cloud = Brand Protection + More $$

SYMANTEC VISION 2012 What Matters for Telcos and Service Providers?

SYMANTEC VISION 2012

Key Challenges for Service Providers today … From Risk and Cost

#2 Reduce Churn (Improve Stickiness!) Brand Protection #3

#4 Impact of Regulation For the SP & Their Customer Reducing Total #5 Cost of Ownership

SYMANTEC VISION 2012

Key Challenges for Service Providers today … Into Opportunity for Growth!

Business Generation #1 to Improve Revenues #2 Reduce Churn (Improve Stickiness!) Brand Protection #3

#4 Impact of Regulation For the SP & Their Customer Reducing Total #5 Cost of Ownership

SYMANTEC VISION 2012

Key Challenges for Communication Service Providers

Symantec & Solutions

Improve Service Levels Generate new Business #1 and Customer Satisfaction Improve ARPU Reduce Complexity,#2 Reduce DriveChurn Standardization,Increase BSS Integration Customer Lifetime Value Protect Brand #3 Differentiate Protect Information and Devices (Endpoints, Servers, Carrier Network) #4 Demonstrate Compliance Fulfill EU Directives and Reduce TCO #5 Voluntary Frameworks Fast Time to Market Monetize Information Protection & Mgmt. for Consumers and Enterprises

SYMANTEC VISION 2012 Summary of the requirements Service Provider / Telco ASK

• 5 years of Experience at Symantec shows • Tactical Approach – Might want to discuss one solution to put on their market

OR

• Strategic Partnership Approach – Multiple services to launch (up to 13 per Telco so far!) – Revenue Generation • Which pauses the question of Sales Enablement, Channel, GTM – AND Brand Protection (Driver 1 and Driver 3) • Which pauses the question of the SOC

SYMANTEC VISION 2012 How to Work with Symantec on which Revenue Streams Portfolio

SYMANTEC VISION 2012 The ingredients for Strategic Partnership

CSPs / Outsourcers Customers Consume Symantec Build Products Extend Symantec Services

New CSP Consumers Cloud / Mobile SMBs Enterprises Cube Architecture Framework Services

xSP Licensing Programs

Symantec CSP Solution Architects Service Co-Marketing

SYMANTEC VISION 2012 Consume Extend Build Use Case Examples

Category Use Cases Examples

• Leverage security as a service from the SYMC Cloud • VIP Consume • Cloud management service with onprem agents • Email Security.cloud • Hybrid app, onprem mgmt with a cloud module • BE.Cloud

• Extend onprem security management with SaaS agents • CCS with SFDC agent Extend • Deploy security protection in IaaS • SEP agent in AWS • Backup to local as well as cloud storage targets • NBU to Nirvanix

• SYMC technology embedded in 3rd party cloud app • SSL in SFDC Build • Software in public cloud to protect infrastructure • SMF / EV in Email aaS • Deploy software in private cloud to protect customer • CSP hardens *aaS servers

SYMANTEC VISION 2012 The Joint Service Stack for CSPs – A Partner Play

Cloud Brokerage Services O3 Corp. & Cons. Control Serv. NGNP Enterprise / Parental Controls

IT Compliance Services Control Compliance Suite, DLP, Vulnerability Mgmt.

Archiving Services EV. Cloud, Enterprise Vault, NGNP (Mobile Messaging) Sec. Personal Cloud Services Norton Zone Customers & Backup Services BE.cloud, NBU, Norton Online Backup, Target Market

Storage Services Storage Foundation, VOM Enterprise Secure M2M Services MPKI for Device Authentication (Smart Meter, ...) SME Authentication Services VIP, VIP Mobile, MPKI SoHo Encryption Services PGP, O3, Norton Anti-Theft, Norton Hotspot Privacy Consumer Application Mgmt. Services Apps Center Residential Personal Care Services Norton Live Services

CSP SERVICES ENABLEMENT CSP SERVICES M2M Endpoint Mgmt. Services Client Management Suite, Symantec Mobile Management Endpoint Security Services SEP, Norton Internet/Mobile Security, SCSP Safe Web Services Norton DNS, Norton Identity Safe

Security Intelligence Services Deepsight, SymDroid, Reputation Services, MSS SYMANTEC SYMANTEC Clean Pipe Services Symantec.cloud, NGNP, SBTS, SBMF, Norton Power Eraser ExSP & SSP Service Provider Buying Programs “Pay as you grow” Shared & Managed Services

SYMANTEC VISION 2012 What is trend vs nascent? (includes Residential, SOHO, SMB, Enterprise segments)

• Current areas of Services being launched – Clean Pipe (including Core Network, Mail Traffic, Web Traffic, etc.) – Data Protection (including Backup, Cloud Backup, Archiving, etc.) – Endpoint Security (Fixed, Mobile Devices, etc.) – Cloud Brokerage (includes O3, .cloud in Market Places, etc.) • Nascent Situations – Public SOC powered by MSS to secure the cloud + to provide Public SOC – Many new demands to extend clouds with Encryption, VIP, CSP, DLP, etc. – From Securing the Cloud as a major concern … – … To turn the problem into a new revenue stream with CCS, DLP, CSP, etc.

SYMANTEC VISION 2012 Some Clean Pipe Use Cases

SYMANTEC VISION 2012 Clean Pipe is a fundamental topic

• 2 Marketing Good News – Tap Water as we know is ‘clean’ … What’s coming out of Data Pipes is ‘dirty’ – How to market water … it is the same for everyone. Yet, Nestlé, etc. gave it a brand!

• Limited to Messaging Security 5 years ago • Impacted by the Outbound Spam issues 4 years ago • Moved to Web Security 3 years ago • Entered Core Network Security 2 years ago • Now under re-definition – Parental Control, Anti-Botnet, – SMS Anti-Spam, SMS Anti-Fraud, – Country level Data Rentention projects – Strong Link to the Device (see Device and Endpoint based Services)

SYMANTEC VISION 2012 TELENOR– Secure Messaging services to Enterprises Partnering for success – Building solution competition cannot • Customer Requirements: – Clean Pipe Solution… – …with per customer quarantine – …and Customer Self-Care – Not exactly the best fit for Symantec Messaging Gateway ! • Architect’s job – Collect the bricks to build a solution from the requirements – Find a messaging technology partner: Message Systems – Build the architecture with Symantec products: Traffic Shaper and Message Filter – Articulate the requirements to cover the missing features – Adapt the Solution to moving requirements !

SYMANTEC VISION 2012 TELENOR– Secure Messaging services to Enterprises Final Architecture

Web UI Sun T6320

Web Server Zone Customer Customer Admin Admin modifies domain and user preferences Postgres DB zone Quarantine Storage Delivery to Quarantine based on domain or user preferences Quarantine Zone Mail routing decision based on Customer preferences Symantec Brightmail Momentum Cluster Node Traffic Shaper in active- N+1 Failover active Sun T6320

VIP1

Internet VRRP Failover Database Synchronisation Queue Storage

VIP2

Momentum Cluster Manager Sun T6320

DB and Logs

SYMANTEC VISION 2012 TELENOR– Secure Messaging services to Enterprises Immediate benefit to Telenor’s customer

200% Clean mail volume increase

90% Spam volume decrease

SYMANTEC VISION 2012 NGNP: Network-based security management

Radio Access Mobile Core Network Service Layer Internet Network (RAN)

Virus Subscriber Notification and Malware Recovery Option … MMSC SMSC Consumers INTERNET SGSN GGSN Mail WAP

Malware Traffic Analysis Recovery Option Module Next Generation Network Protection

Enterprises NGNP addresses both customer segments, consumer and enterprise

SYMANTEC VISION 2012 NGNP: Cross-selling the Norton portfolio

Radio Access Mobile Core Network •Service Norton Layer Mobile Security Internet Network (RAN) • Norton Tablet Security • Norton 360 Virus • Norton Power Eraser, ... Subscriber Notification and Malware Recovery Option … MMSC SMSC Consumers INTERNET SGSN GGSN Mail WAP

Malware Traffic Analysis Recovery Option Module Next Generation Network Protection

Enterprises NGNP addresses both customer segments, consumer and enterprise

SYMANTEC VISION 2012 Total solution from “Beeline” «Parental Control» is implemented according to clean pipe principle - negative Internet content is not delivered to home, connected to the service.

Features of “Parental Control” 1. Content Filtration Offers different categories to block the content, including the pre-defined ones for the different age of child.

«up to 7 years», «from 7 to 12 years» «older 13 years» + 6 additional options

2. Time control Allows to limit the internet connectivity for the child, by managing daily and weekly calendar.

3. Report about visited Internet resources Allows to get the detailed report about internet sites visited by children by getting it to the e-mail on weekly or monthly basis. Additional option Network antivirus Provides high level protection for downloading traffic, no software installation to the client PC is required SYMANTEC VISION 2012

Some Data Protection Examples

SYMANTEC VISION 2012 Data Protection is entering new patterns

• From Hosted Backup and Archive 5 years ago (Cybernest) • To Remote Backup Services 3 years ago (HP) • Now to new patterns – Cloud Backup (a la Nirvanix) • A push model that helps cloud transformation – That is pushing the need for APPLIANCES (everyone forgets RESTORE!) – Cloud based Backup • NOBU for File Restore and BE.Cloud – And Cloud Archiving • EV.Cloud – To Collaboration Services • Norton Zone

SYMANTEC VISION 2012 Who is Cybernest? • Telkom SA is the incumbent Fixed Line Telco in South Africa • Telkom SA has two strategic new business development initiatives in South Africa – Mobile Services – ICT Services • Cybernest was formed to target the hosted IT services landscape in South Africa – Portion of the internal IT operations wrapped into a separate branded business unit – Existing 20 years of supporting Telkom turned into an entity with external focus and revenue generation objectives.

SYMANTEC VISION 2012

The Target Solution Implemented

• Consolidate the different back up environments to Netbackup – One Simple Licence Model – Leverage the scale across different areas for cost improvement – Deploy Netbackup Reporter across all environments for improved management visibility • Drive a Disk Based Backup Solution – Leverage Symantec Pure Disk features for Data Deduplication and remote site replication • Reduce Tape Libraries to two instances – Tape capability in place if recovery of old backups needed – Some Companies' policies still require Tape and have not yet matured to support Disk only

SYMANTEC VISION 2012 Benefits Derived Summary

• Improved Efficiency – Increased Backup Success – Reduced Restore failures • Cost Benefits – Significant Operational Cost reduction • Competitive Service Offering – Enabled Tiering and Remote Site Backups – Competitively Priced Offering With Margin for 10 server,With Margin average still 5Gb/ 60%+svr backupCheaper image than- Local16%+ CheaperCompetitor than Large on $/Gb/Month offering CloudSYMANTEC Backup VISION 2012 Provider Simplified backup to the cloud

SYMANTEC VISION 2012 Secure Storage Offer

Storage Node • Geo redundancy thanks to two Bern storage nodes in the Swisscom Data Centre • 99.99% availability

Swisscom Geo redundancy Netz • Access via the Swisscom network • Data security guaranteed via several protection mechanisms

Storage Node • Exceptionally scalable from von Zürich GB to PB SYMANTEC VISION 2012 • Web-based Management Secure Storage Concept SSL transport with Encryption

Secure Storage Swisscom Customer network Extranet Internet Zürich

X Storage Pool Application Secure Storage NAS

MO SAP IP Plus Virtual Disk

X X Storage Pool Storage Pool Bern Customer Server

Service Access Point: Secure Storage on IP-Plus Backbone Storage Pool: logical storage area SYMANTEC VISION 2012 MO Managed Object (MO) Symantec is Archiving The Enterprise Vault suite represents a large ecosystem of technologies providing customers with different levels of information management capabilities, regardless of […] their internal information governance processes.

EV EV On premise Private Cloud

EV EV.cloud Hybrid Cloud 100% SaaS

SYMANTEC VISION 2012 Enterprise Vault.cloud - Retain Control & Offload The Burden

Purely Hosted

• No hardware, software, or plug-ins to install and maintain • Low upfront investment & total cost of ownership • Flat fee per mailbox per month includes service upgrades Enterprise Vault.cloud Unlimited Storage & Rapid Search  Email Storage Management • Unlimited email storage and retention  Email E-Discovery • Rapid search results from scalable grid architecture  Email Compliance¹ • No mailbox size limits for end users  Mailbox Continuity option Enterprise-class Infrastructure & Security

• Redundant, scalable, Tier 4 data centers • Data encrypted in transit & at rest • 24/7/365 support included in cost of service

¹ AdvisorMail in Symantec.cloud

SYMANTEC VISION 2012 Eskom (Electricity Supply Commission)

Company: Eskom generates approximately 95% of the electricity used in South Africa and approximately 45% of the electricity used in Africa. Eskom generates, transmits and distributes electricity to industrial, mining, commercial, agricultural and residential customers and redistributors.

Transaction: $1,944,000: 30000 users of EV.cloud (growing to 36000 next year)

Sponsor: Sean Maritz – Infrastructure Special Projects Director

Sales Cycle: 8 months Eskom is migrating from Groupwise to Exchange 2010. This will triple storage requirements, Purchase Driver: preferred a managed outcome (unlimited storage SLA). Exchange is now centralised so the need for email continuity is a priority. Compliance and eDiscovery mandate to be implemented.

What’s different Eskom is a parastatal organization. The legal, compliance and security requirements for a cloud about this one?: based solution that Eskom have agreed with Symantec.cloud sets a precedent for public sector to follow. Eskom has become a “lead agency” for cloud adoption. Favorite Aspect of the Deal: Mimecast had been working on this opportunity for 2 years, would have been their largest customer globally. The cloud team in South Africa – based on positioning EV.cloud as a managed outcome – were given the opportunity to suggest mandatory criteria for solution selection.

SYMANTEC VISION 2012 Some Cloud Brokerage Use Cases with O3 and with .Cloud

SYMANTEC VISION 2012 Cloud Brokerage

• End Customers are using 20+ different Clouds TODAY in EMEA • Telcos have no time to BUILD, they want to act as BROKER • Different ways to offer value – Leverage Symantec .cloud services via a Market Place – Offer a managed O3 as a Cloud Firewall to the brokerage – Securise the Cloud Management Platform • openstack-based, VMWare, Parallels, Jamcracker, AppDirect, etc.

SYMANTEC VISION 2012 Email Security.cloud Web Security.cloud IM Security.cloud

Anti-Spyware Anti-Spam URL filter Image Control Anti-Virus

IM Anti-virus IM Content Control

Anti-Virus Content Control Roaming User

Email Management.cloud Endpoint Protection.cloud Email Encryption.cloud

Endpoint Archiving Continuity Policy Based Encryption Protection Boundary Encryption

SYMANTEC VISION 2012 34 Step 1:- Customers are directed to CDW online store to trial

Customer clicks on free trial link

SYMANTEC VISION 2012 The Security Problem

Controls, Audits and Compliance?

Logs

Data Leakage? Smith Identity control Can you do Security Security Information Management Information Can control Management? Data Loss Prevention Identity? Control Compliance Suite

Events CCS Joe CISO Perimeter Locked to ‘Physical’ IT

SYMANTEC VISION 2012 • SYMC hosted Web console • Multi-tenant O3 Intelligence • Service & ID centric policy definition center • Gateway configuration • Policy synchronization Admin with optional • Gateway Status Monitoring strong auth redential

M Any user on any device

P O3 Gateway

• Runtime engine • Policy enforcement point • Single tenant Any SAAS or Web Application • Access broker or proxy Internal or External • Information security gateway (proxy) • 2 Network Interfaces - Portal and Monitoring Any user store • Hosted or managed (ADS, LDAP, RDBMS)

SYMANTEC VISION 2012 CISO Landscape with O3 SIM + Data Loss MSS in Logs Controls andProtection H2 2012 Compliance

SymForce Smith (Universal Identity control Collector for CCS) CISO Sets Identity, SSO Security Information Management and Federation Policies are Controled Data Loss Prevention Coming Control Compliance Suite Coming Events Normalised Joe CISO Perimeter extended to CCS the Cloud Cloud is not toxic anymore but a business opportunity

SYMANTEC VISION 2012 O3 for Telcos

• Demonstrated by Orange Business Services at – Les Assises de la Sécurité: French Speaking biggest Security Event (at Monaco in October) • What matters for a Telco: – O3 at the breaking point between the MPLS vs the International network – A telco can offer a differenciated bundle with the pipes – Augments Clean Pipe!

SYMANTEC VISION 2012 Endpoint and Devices

SYMANTEC VISION 2012 Endpoint Services Revolutionized with Mobility

• Firstly are you offering Endpoint Security Services? – Aware of the major success stories on Norton for Consumers? – With a SEPaaS approach like A1? – Leveraging SEP.Cloud? • Are you offering Endpoint Management Services? – With EMMaaS approach? • Mobility – Want to base your service on a multitenant MDM Solution? – Or more interested by an AppCenter approach (Nukona)? – (See presentation from Lionel Gonzalez ST B03)

SYMANTEC VISION 2012 The Customer

• A1 (Telekom Austria) – National Incumbent Telco in Austria • Fixed & Mobile Operator servicing Residential and Business Customers • Revenues of over €4Bn ($4.5Bn) – Market Share • Fixed (Broadband): 51% (1.2M subscribers) • Mobile (All): 41% market share (5.1M subscribers) – A1 Build and also Consume Cloud Services • Interested in hosting services for smaller ISPs – 3 Datacenters in Austria • Operators and DCs in 5 other countries across Central & Eastern Europe

SYMANTEC VISION 2012 Project Overview

• Cloud Categorization (Cube Model) – SaaS, Public Cloud for SMB & Enterprise • Project Goals – Bring a hosted security offering to market for B2B customer consumption • One platform for all customers • Ability to integrate with / support existing portal – No exposure of the management portal • Packaged Self Care for SMB • Self Management for Enterprise • Key challenges – Portal integration – Flexible Multi-tenant management/reporting • Competition – McAfee – F-Secure

SYMANTEC VISION 2012 Symantec Fit

• Leadership – Security Leader – Market Knowledge – Industry Awards – SMEs • Differentiators – Integration to existing portal • Provisioning, Management, Reporting • API – Performance (Manager and Client) – Scalable, Resilient architecture

SYMANTEC VISION 2012 Solution Architecture

Service Provider’s Data Center

Self Care SMB customers get access to Portal pre-package Endpoint Security offerings SMB SEPPortal installation provisions package new is createdcustomer on demandand users and made A predefined available through the portal deployment packaged is made available for Symantec SQL Server Endpoint download DB EnterpriseSEP automatically customers will get a Protection retrieves security dedicated portal to offer more Manager Above 5000 users, the use of policies and updates flexibility in the service definition an external database is Deployment and MigrationsDisaster made recovery requires a second Enterprise recommended easy with Symantec EndpointSEP Manager deployment with Protection Integrationsynchronization Component Clients can be configured Service Provider’s Data Center 2 to failover between sites

Microsoft Symantec SQL Server Endpoint DB SEP Manager will then Protection scale horizontally Manager

SYMANTEC VISION 2012 Technical Sales Process & Lessons Learned

• Standard Service Provider Sell – Cube methodology, Expertise, References, PoC, RFP – Gain thought leadership - Write the RFP => Win! – Take the risk out of saying “Yes” • Perception is reality – Make sure the POC has close fit with production environment – Make sure all costs (esp MS Stack) are understood • Set expectations to include Professional Services & Education – Customer built there own integration for API – They did not know SEP – They did not know the architecture or best practice for deployment – They did not know how to operate the platform efficiently and effectively • Objections – Difficult to deploy – Difficult to differentiate to customer and sell value – Intrusive & resource heavy client will impact user experience – Price

SYMANTEC VISION 2012 SOC and Public SOC

SYMANTEC VISION 2012 SOC and Public SOC

• SOC = Security Operations Center – BIG problem for Telcos and Service Providers: NO SOC – NO SOC = NO PROOF that the Cloud Services are Safe – All good but examples of Services hacked in the first hour –  Brand Reputation at Risk • Recipe for Success 1) Leverage Symantec Managed Security Services MSS 2) Turn the problem into an advantage and offer MSS Services to your customers  Move to a Public SOC

SYMANTEC VISION 2012 Symantec’s Threat Monitoring & Reporting Solutions

MANAGED SECURITY SERVICES

• Hosted Log Retention Service • Managed Firewall Protection – Per device or Enterprise wide option – Essential (limited changes/assistance) • Security Monitoring & Analysis Services – Advanced (unlimited) – Essential or Advanced Service • Managed IDP Protection – Per device or Enterprise wide option – Advanced (fully-managed only) • Vulnerability Management Service • Managed Endpoint Protection • VeriSign® Internet Defense Network – Essential (co-managed) – Advanced (fully-managed)

• INTELLIGENCE SERVICES ON-PREMISE SOLUTIONS

• Symantec DeepSight™ Intelligence Services • Symantec IDP Solution with Sourcefire™ – DeepSight Starter Pack / Advanced Pack – DeepSight 8.0 Silver, Gold, and Platinum Early • Symantec Security Information Manager Warning Services – DeepSight DataFeeds 4.0

SYMANTEC VISION 2012 Causes of a Security Incident

System System User Activity PreventionVulnerabilities Misconfiguration

Context and Global Edge to Endpoint RelevanceDetection Intelligence Visibility

SYMANTEC VISION 2012 Protecting the Enterprise – A Solution Framework

Threat Intelligence Target Attacks Threat Trends Vulnerabilities Malicious Code Fraud Activity

Analysis & Retain Analyze Advise Prioritization

Visibility & Collect Remediate Control

24 x 7 Global Budget Staff Sustainable Operations

SYMANTEC VISION 2012 Protecting the Enterprise – Symantec’s Unique Solution

Threat Intelligence Unparalleled Intelligence Target Attacks Threat Trends Vulnerabilities Malicious Code Fraud Activity

Analysis & Context and Relevance Retain Analyze Advise Prioritization Actionable Guidance

Visibility & Collect Remediate Control Edge-to-Endpoint Monitoring

24 x 7 Global Budget Staff Sustainable Security Expertise Operations 24x7, Global Leadership

SYMANTEC VISION 2012 Symantec MSS Capabilities

Threat Symantec™ Global Intelligence Network Intelligence

Attack Activity Vulnerabilities • 240,000 sensors • 40,000+ vulnerabilities • 200+ countries • 14,000 vendors • 105,000 technologies

Malware Intelligence Spam/Phishing • 133M client, server, • 5M decoy accounts gateways monitored • 8B+ email messages/day • Global coverage • 1B+ web requests/day

Identifies more threats, takes action faster & prevents impact

SYMANTEC VISION 2012 Solution Spectra vs Customer Subsegment Mapping

Different Customers means Different Solutions

SYMANTEC VISION 2012 Services overview: Event and incident management

Service overview Key functions

• Near-real time logging, and monitoring • Log correlation with other technologies and Symantec’s Global Intelligence Network • Log analysis and incident identification • Incident escalation, tracking and closure • Automatic inclusion of logs from Log Retention Devices

Business value

• 24x7 log monitoring and incident management • Correlation against other systems • Correlation against Symantec Global Intelligence Network (GIN)

Key outputs

• Prioritised alerts • Remediation plans • On-call support for critical vulnerabilities • Management reports and dashboards

SYMANTEC VISION 2012 Securing the Cloud

SYMANTEC VISION 2012

The Cube The Symantec SP Framework to support Service Providers in building own customized data and security services for their target markets

SYMANTEC VISION 2012 MiniCubes Vizualized

CSP Cube SYMANTEC VISION 2012 58 MiniCubes participating Cube Principles In Action into an SMB and Enterprise Service

They are part of a Service

They are sourced, built and $ are making money

Their Interfaces are now in Play

SYMANTEC VISION 2012 Cube principles in action – Virtual Desktop Infrastructure

SYMANTEC VISION 2012 Cube principles in action – Virtual Desktop Infrastructure

SYMANTEC VISION 2012 CSA Security Guidelines : Domains

Cloud Architecture • Cloud Computing Architectural Framework

• Governance and Enterprise Risk Management Governing in the • Legal and Electronic Discovery • Compliance and Audit Cloud • Information Lifecycle Management • Portability and Interoperability

• Traditional Security, Business Continuity, and Disaster Recover • Data Center Operations Operating in the • Incident Response, Notification, and Remediation • Application Security Cloud • Encryption and Key Management • Identity and Access Management • Virtualization

SYMANTEC VISION 2012 Governing the Cloud

Cloud Security Governance and Legal and Compliance Information Portability Alliance Domains Enterprise Risk Electronic Audit Lifecycle and Management Discovery Management Interoperability

Service    

Platform    

Infrastructure     

SYMANTEC VISION 2012 Operating the Cloud

Traditional Security, DataCenter Incident Application Encryption Identity Cloud Security Business Continuity, Operations Response Security And and Access Virtualization Alliance Domains and Disaster Notification Key Management

Recovery Remediation Management

Service       

Platform       

Infrastructure      

SYMANTEC VISION 2012 Infrastructure Security Symantec ManagedSecurity Information Security Services Manager Event Correlation Infrastructure Layer IncidentIncident ManagementManagement Remediation Log Retention Security Monitoring DeepSight SAV for NAS Data Loss Prevention AntiMalware at Storage level Discover Data Insight Security Information Storage Virtualization (heterogeneous) Volume Management Data Loss Prevention Management Control Compliance Suite Network Prevent Policy Management Monitor Technical Controls Mirroring or Reporting and Remediation Replication Storage FileStore SFHA (Storage Foundation HA) Distribution Enterprise Vault Network eDiscovery Processing Data Retention NetBackup Cluster Backup Data Retention Network Endpoint Protection Business Continuity Critical System Protection Veritas Cluster Service Endpoint Protection Geographical Cluster IPS/IDS System Hardening Business Continuity Brightmail Trafic Shaper Exploit Prevention Antispam at Network Symantec.cloud Altiris Server Management Suite Brightmail Gateway Web Gateway Web Security Provisioning Automation Antispam BotNet Detection Messaging Security Monitoring Encryption Remediation

SYMANTEC VISION 2012 Conclusions

SYMANTEC VISION 2012 Symantec Envisions Future Clouds as Safe Clouds

• Great article http://www.symantec.com/about/news/release/article.jsp?prid=20121105 _01 • Forthcoming Blog

SYMANTEC VISION 2012 Thank you!

Arnaud Taddei [email protected] +41 79 506 1129

Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.