ST B02 Profiting from the Cloud
New revenue streams with Security and Information Protection services
Arnaud Taddei EMEA Cloud Solution Architect – Service Providers and Telcos Your Route to SUCCESS
1 What Matters for Telcos and Service Providers
2 Symantec Unique Value Proposition
3 Mature Services co-Launched on Market
4 Nascent Services being launched on Market
5 Securing the Cloud = Brand Protection + More $$
SYMANTEC VISION 2012 What Matters for Telcos and Service Providers?
SYMANTEC VISION 2012
Key Challenges for Service Providers today … From Risk and Cost
#2 Reduce Churn (Improve Stickiness!) Brand Protection #3
#4 Impact of Regulation For the SP & Their Customer Reducing Total #5 Cost of Ownership
SYMANTEC VISION 2012
Key Challenges for Service Providers today … Into Opportunity for Growth!
Business Generation #1 to Improve Revenues #2 Reduce Churn (Improve Stickiness!) Brand Protection #3
#4 Impact of Regulation For the SP & Their Customer Reducing Total #5 Cost of Ownership
SYMANTEC VISION 2012
Key Challenges for Communication Service Providers
Symantec & Norton Solutions
Improve Service Levels Generate new Business #1 and Customer Satisfaction Improve ARPU Reduce Complexity,#2 Reduce DriveChurn Standardization,Increase BSS Integration Customer Lifetime Value Protect Brand #3 Differentiate Protect Information and Devices (Endpoints, Servers, Carrier Network) #4 Demonstrate Compliance Fulfill EU Directives and Reduce TCO #5 Voluntary Frameworks Fast Time to Market Monetize Information Protection & Mgmt. for Consumers and Enterprises
SYMANTEC VISION 2012 Summary of the requirements Service Provider / Telco ASK
• 5 years of Experience at Symantec shows • Tactical Approach – Might want to discuss one solution to put on their market
OR
• Strategic Partnership Approach – Multiple services to launch (up to 13 per Telco so far!) – Revenue Generation • Which pauses the question of Sales Enablement, Channel, GTM – AND Brand Protection (Driver 1 and Driver 3) • Which pauses the question of the SOC
SYMANTEC VISION 2012 How to Work with Symantec on which Revenue Streams Portfolio
SYMANTEC VISION 2012 The ingredients for Strategic Partnership
CSPs / Outsourcers Customers Consume Symantec Build Products Extend Symantec Services
New CSP Consumers Cloud / Mobile SMBs Enterprises Cube Architecture Framework Services
xSP Licensing Programs
Symantec CSP Solution Architects Service Co-Marketing
SYMANTEC VISION 2012 Consume Extend Build Use Case Examples
Category Use Cases Examples
• Leverage security as a service from the SYMC Cloud • VIP Consume • Cloud management service with onprem agents • Email Security.cloud • Hybrid app, onprem mgmt with a cloud module • BE.Cloud
• Extend onprem security management with SaaS agents • CCS with SFDC agent Extend • Deploy security protection in IaaS • SEP agent in AWS • Backup to local as well as cloud storage targets • NBU to Nirvanix
• SYMC technology embedded in 3rd party cloud app • SSL in SFDC Build • Software in public cloud to protect infrastructure • SMF / EV in Email aaS • Deploy software in private cloud to protect customer • CSP hardens *aaS servers
SYMANTEC VISION 2012 The Joint Service Stack for CSPs – A Partner Play
Cloud Brokerage Services O3 Corp. & Cons. Control Serv. NGNP Enterprise / Parental Controls
IT Compliance Services Control Compliance Suite, DLP, Vulnerability Mgmt.
Archiving Services EV. Cloud, Enterprise Vault, NGNP (Mobile Messaging) Sec. Personal Cloud Services Norton Zone Customers & Backup Services BE.cloud, NBU, Norton Online Backup, Norton 360 Target Market
Storage Services Storage Foundation, VOM Enterprise Secure M2M Services MPKI for Device Authentication (Smart Meter, ...) SME Authentication Services VIP, VIP Mobile, MPKI SoHo Encryption Services PGP, O3, Norton Anti-Theft, Norton Hotspot Privacy Consumer Application Mgmt. Services Apps Center Residential Personal Care Services Norton Live Services
CSP SERVICES ENABLEMENT CSP SERVICES M2M Endpoint Mgmt. Services Client Management Suite, Symantec Mobile Management Endpoint Security Services SEP, Norton Internet/Mobile Security, SCSP Safe Web Services Norton DNS, Norton Identity Safe
Security Intelligence Services Deepsight, SymDroid, Reputation Services, MSS SYMANTEC SYMANTEC Clean Pipe Services Symantec.cloud, NGNP, SBTS, SBMF, Norton Power Eraser ExSP & SSP Service Provider Buying Programs “Pay as you grow” Shared & Managed Services
SYMANTEC VISION 2012 What is trend vs nascent? (includes Residential, SOHO, SMB, Enterprise segments)
• Current areas of Services being launched – Clean Pipe (including Core Network, Mail Traffic, Web Traffic, etc.) – Data Protection (including Backup, Cloud Backup, Archiving, etc.) – Endpoint Security (Fixed, Mobile Devices, etc.) – Cloud Brokerage (includes O3, .cloud in Market Places, etc.) • Nascent Situations – Public SOC powered by MSS to secure the cloud + to provide Public SOC – Many new demands to extend clouds with Encryption, VIP, CSP, DLP, etc. – From Securing the Cloud as a major concern … – … To turn the problem into a new revenue stream with CCS, DLP, CSP, etc.
SYMANTEC VISION 2012 Some Clean Pipe Use Cases
SYMANTEC VISION 2012 Clean Pipe is a fundamental topic
• 2 Marketing Good News – Tap Water as we know is ‘clean’ … What’s coming out of Data Pipes is ‘dirty’ – How to market water … it is the same for everyone. Yet, Nestlé, etc. gave it a brand!
• Limited to Messaging Security 5 years ago • Impacted by the Outbound Spam issues 4 years ago • Moved to Web Security 3 years ago • Entered Core Network Security 2 years ago • Now under re-definition – Parental Control, Anti-Botnet, – SMS Anti-Spam, SMS Anti-Fraud, – Country level Data Rentention projects – Strong Link to the Device (see Device and Endpoint based Services)
SYMANTEC VISION 2012 TELENOR– Secure Messaging services to Enterprises Partnering for success – Building solution competition cannot • Customer Requirements: – Clean Pipe Solution… – …with per customer quarantine – …and Customer Self-Care – Not exactly the best fit for Symantec Messaging Gateway ! • Architect’s job – Collect the bricks to build a solution from the requirements – Find a messaging technology partner: Message Systems – Build the architecture with Symantec products: Traffic Shaper and Message Filter – Articulate the requirements to cover the missing features – Adapt the Solution to moving requirements !
SYMANTEC VISION 2012 TELENOR– Secure Messaging services to Enterprises Final Architecture
Web UI Sun T6320
Web Server Zone Customer Customer Admin Admin modifies domain and user preferences Postgres DB zone Quarantine Storage Delivery to Quarantine based on domain or user preferences Quarantine Zone Mail routing decision based on Customer preferences Symantec Brightmail Momentum Cluster Node Traffic Shaper in active- N+1 Failover active Sun T6320
VIP1
Internet VRRP Failover Database Synchronisation Queue Storage
VIP2
Momentum Cluster Manager Sun T6320
DB and Logs
SYMANTEC VISION 2012 TELENOR– Secure Messaging services to Enterprises Immediate benefit to Telenor’s customer
200% Clean mail volume increase
90% Spam volume decrease
SYMANTEC VISION 2012 NGNP: Network-based security management
Radio Access Mobile Core Network Service Layer Internet Network (RAN)
Virus Subscriber Notification and Malware Recovery Option … MMSC SMSC Consumers INTERNET SGSN GGSN Mail WAP
Malware Traffic Analysis Recovery Option Module Next Generation Network Protection
Enterprises NGNP addresses both customer segments, consumer and enterprise
SYMANTEC VISION 2012 NGNP: Cross-selling the Norton portfolio
• Norton Internet Security Radio Access Mobile Core Network •Service Norton Layer Mobile Security Internet Network (RAN) • Norton Tablet Security • Norton 360 Virus • Norton Power Eraser, ... Subscriber Notification and Malware Recovery Option … MMSC SMSC Consumers INTERNET SGSN GGSN Mail WAP
Malware Traffic Analysis Recovery Option Module Next Generation Network Protection
Enterprises NGNP addresses both customer segments, consumer and enterprise
SYMANTEC VISION 2012 Total solution from “Beeline” «Parental Control» is implemented according to clean pipe principle - negative Internet content is not delivered to home, connected to the service.
Features of “Parental Control” 1. Content Filtration Offers different categories to block the content, including the pre-defined ones for the different age of child.
«up to 7 years», «from 7 to 12 years» «older 13 years» + 6 additional options
2. Time control Allows to limit the internet connectivity for the child, by managing daily and weekly calendar.
3. Report about visited Internet resources Allows to get the detailed report about internet sites visited by children by getting it to the e-mail on weekly or monthly basis. Additional option Network antivirus Provides high level protection for downloading traffic, no software installation to the client PC is required SYMANTEC VISION 2012
Some Data Protection Examples
SYMANTEC VISION 2012 Data Protection is entering new patterns
• From Hosted Backup and Archive 5 years ago (Cybernest) • To Remote Backup Services 3 years ago (HP) • Now to new patterns – Cloud Backup (a la Nirvanix) • A push model that helps cloud transformation – That is pushing the need for APPLIANCES (everyone forgets RESTORE!) – Cloud based Backup • NOBU for File Restore and BE.Cloud – And Cloud Archiving • EV.Cloud – To Collaboration Services • Norton Zone
SYMANTEC VISION 2012 Who is Cybernest? • Telkom SA is the incumbent Fixed Line Telco in South Africa • Telkom SA has two strategic new business development initiatives in South Africa – Mobile Services – ICT Services • Cybernest was formed to target the hosted IT services landscape in South Africa – Portion of the internal IT operations wrapped into a separate branded business unit – Existing 20 years of supporting Telkom turned into an entity with external focus and revenue generation objectives.
SYMANTEC VISION 2012
The Target Solution Implemented
• Consolidate the different back up environments to Netbackup – One Simple Licence Model – Leverage the scale across different areas for cost improvement – Deploy Netbackup Reporter across all environments for improved management visibility • Drive a Disk Based Backup Solution – Leverage Symantec Pure Disk features for Data Deduplication and remote site replication • Reduce Tape Libraries to two instances – Tape capability in place if recovery of old backups needed – Some Companies' policies still require Tape and have not yet matured to support Disk only
SYMANTEC VISION 2012 Benefits Derived Summary
• Improved Efficiency – Increased Backup Success – Reduced Restore failures • Cost Benefits – Significant Operational Cost reduction • Competitive Service Offering – Enabled Tiering and Remote Site Backups – Competitively Priced Offering With Margin for 10 server,With Margin average still 5Gb/ 60%+svr backupCheaper image than- Local16%+ CheaperCompetitor than Large on $/Gb/Month offering CloudSYMANTEC Backup VISION 2012 Provider Simplified backup to the cloud
SYMANTEC VISION 2012 Secure Storage Offer
Storage Node • Geo redundancy thanks to two Bern storage nodes in the Swisscom Data Centre • 99.99% availability
Swisscom Geo redundancy Netz • Access via the Swisscom network • Data security guaranteed via several protection mechanisms
Storage Node • Exceptionally scalable from von Zürich GB to PB SYMANTEC VISION 2012 • Web-based Management Secure Storage Concept SSL transport with Encryption
Secure Storage Swisscom Customer network Extranet Internet Zürich
X Storage Pool Application Secure Storage NAS
MO SAP IP Plus Virtual Disk
X X Storage Pool Storage Pool Bern Customer Server
Service Access Point: Secure Storage on IP-Plus Backbone Storage Pool: logical storage area SYMANTEC VISION 2012 MO Managed Object (MO) Symantec is Archiving The Enterprise Vault suite represents a large ecosystem of technologies providing customers with different levels of information management capabilities, regardless of […] their internal information governance processes.
EV EV On premise Private Cloud
EV EV.cloud Hybrid Cloud 100% SaaS
SYMANTEC VISION 2012 Enterprise Vault.cloud - Retain Control & Offload The Burden
Purely Hosted
• No hardware, software, or plug-ins to install and maintain • Low upfront investment & total cost of ownership • Flat fee per mailbox per month includes service upgrades Enterprise Vault.cloud Unlimited Storage & Rapid Search Email Storage Management • Unlimited email storage and retention Email E-Discovery • Rapid search results from scalable grid architecture Email Compliance¹ • No mailbox size limits for end users Mailbox Continuity option Enterprise-class Infrastructure & Security
• Redundant, scalable, Tier 4 data centers • Data encrypted in transit & at rest • 24/7/365 support included in cost of service
¹ AdvisorMail in Symantec.cloud
SYMANTEC VISION 2012 Eskom (Electricity Supply Commission)
Company: Eskom generates approximately 95% of the electricity used in South Africa and approximately 45% of the electricity used in Africa. Eskom generates, transmits and distributes electricity to industrial, mining, commercial, agricultural and residential customers and redistributors.
Transaction: $1,944,000: 30000 users of EV.cloud (growing to 36000 next year)
Sponsor: Sean Maritz – Infrastructure Special Projects Director
Sales Cycle: 8 months Eskom is migrating from Groupwise to Exchange 2010. This will triple storage requirements, Purchase Driver: preferred a managed outcome (unlimited storage SLA). Exchange is now centralised so the need for email continuity is a priority. Compliance and eDiscovery mandate to be implemented.
What’s different Eskom is a parastatal organization. The legal, compliance and security requirements for a cloud about this one?: based solution that Eskom have agreed with Symantec.cloud sets a precedent for public sector to follow. Eskom has become a “lead agency” for cloud adoption. Favorite Aspect of the Deal: Mimecast had been working on this opportunity for 2 years, would have been their largest customer globally. The cloud team in South Africa – based on positioning EV.cloud as a managed outcome – were given the opportunity to suggest mandatory criteria for solution selection.
SYMANTEC VISION 2012 Some Cloud Brokerage Use Cases with O3 and with .Cloud
SYMANTEC VISION 2012 Cloud Brokerage
• End Customers are using 20+ different Clouds TODAY in EMEA • Telcos have no time to BUILD, they want to act as BROKER • Different ways to offer value – Leverage Symantec .cloud services via a Market Place – Offer a managed O3 as a Cloud Firewall to the brokerage – Securise the Cloud Management Platform • openstack-based, VMWare, Parallels, Jamcracker, AppDirect, etc.
SYMANTEC VISION 2012 Email Security.cloud Web Security.cloud IM Security.cloud
Anti-Spyware Anti-Spam URL filter Image Control Anti-Virus
IM Anti-virus IM Content Control
Anti-Virus Content Control Roaming User
Email Management.cloud Endpoint Protection.cloud Email Encryption.cloud
Endpoint Archiving Continuity Policy Based Encryption Protection Boundary Encryption
SYMANTEC VISION 2012 34 Step 1:- Customers are directed to CDW online store to trial
Customer clicks on free trial link
SYMANTEC VISION 2012 The Security Problem
Controls, Audits and Compliance?
Logs
Data Leakage? Smith Identity control Can you do Security Security Information Management Information Can control Management? Data Loss Prevention Identity? Control Compliance Suite
Events CCS Joe CISO Perimeter Locked to ‘Physical’ IT
SYMANTEC VISION 2012 • SYMC hosted Web console • Multi-tenant O3 Intelligence • Service & ID centric policy definition center • Gateway configuration • Policy synchronization Admin with optional • Gateway Status Monitoring strong auth redential
M Any user on any device
P O3 Gateway
• Runtime engine • Policy enforcement point • Single tenant Any SAAS or Web Application • Access broker or proxy Internal or External • Information security gateway (proxy) • 2 Network Interfaces - Portal and Monitoring Any user store • Hosted or managed (ADS, LDAP, RDBMS)
SYMANTEC VISION 2012 CISO Landscape with O3 SIM + Data Loss MSS in Logs Controls andProtection H2 2012 Compliance
SymForce Smith (Universal Identity control Collector for CCS) CISO Sets Identity, SSO Security Information Management and Federation Policies are Controled Data Loss Prevention Coming Control Compliance Suite Coming Events Normalised Joe CISO Perimeter extended to CCS the Cloud Cloud is not toxic anymore but a business opportunity
SYMANTEC VISION 2012 O3 for Telcos
• Demonstrated by Orange Business Services at – Les Assises de la Sécurité: French Speaking biggest Security Event (at Monaco in October) • What matters for a Telco: – O3 at the breaking point between the MPLS vs the International network – A telco can offer a differenciated bundle with the pipes – Augments Clean Pipe!
SYMANTEC VISION 2012 Endpoint and Devices
SYMANTEC VISION 2012 Endpoint Services Revolutionized with Mobility
• Firstly are you offering Endpoint Security Services? – Aware of the major success stories on Norton for Consumers? – With a SEPaaS approach like A1? – Leveraging SEP.Cloud? • Are you offering Endpoint Management Services? – With EMMaaS approach? • Mobility – Want to base your service on a multitenant MDM Solution? – Or more interested by an AppCenter approach (Nukona)? – (See presentation from Lionel Gonzalez ST B03)
SYMANTEC VISION 2012 The Customer
• A1 (Telekom Austria) – National Incumbent Telco in Austria • Fixed & Mobile Operator servicing Residential and Business Customers • Revenues of over €4Bn ($4.5Bn) – Market Share • Fixed (Broadband): 51% (1.2M subscribers) • Mobile (All): 41% market share (5.1M subscribers) – A1 Build and also Consume Cloud Services • Interested in hosting services for smaller ISPs – 3 Datacenters in Austria • Operators and DCs in 5 other countries across Central & Eastern Europe
SYMANTEC VISION 2012 Project Overview
• Cloud Categorization (Cube Model) – SaaS, Public Cloud for SMB & Enterprise • Project Goals – Bring a hosted security offering to market for B2B customer consumption • One platform for all customers • Ability to integrate with / support existing portal – No exposure of the management portal • Packaged Self Care for SMB • Self Management for Enterprise • Key challenges – Portal integration – Flexible Multi-tenant management/reporting • Competition – McAfee – F-Secure
SYMANTEC VISION 2012 Symantec Fit
• Leadership – Security Leader – Market Knowledge – Industry Awards – SMEs • Differentiators – Integration to existing portal • Provisioning, Management, Reporting • API – Performance (Manager and Client) – Scalable, Resilient architecture
SYMANTEC VISION 2012 Solution Architecture
Service Provider’s Data Center
Self Care SMB customers get access to Portal pre-package Endpoint Security offerings SMB SEPPortal installation provisions package new is createdcustomer on demandand users and made A predefined available through the portal deployment packaged is Microsoft made available for Symantec SQL Server Endpoint download DB EnterpriseSEP automatically customers will get a Protection retrieves security dedicated portal to offer more Manager Above 5000 users, the use of policies and updates flexibility in the service definition an external database is Deployment and MigrationsDisaster made recovery requires a second Enterprise recommended easy with Symantec EndpointSEP Manager deployment with Protection Integrationsynchronization Component Clients can be configured Service Provider’s Data Center 2 to failover between sites
Microsoft Symantec SQL Server Endpoint DB SEP Manager will then Protection scale horizontally Manager
SYMANTEC VISION 2012 Technical Sales Process & Lessons Learned
• Standard Service Provider Sell – Cube methodology, Expertise, References, PoC, RFP – Gain thought leadership - Write the RFP => Win! – Take the risk out of saying “Yes” • Perception is reality – Make sure the POC has close fit with production environment – Make sure all costs (esp MS Stack) are understood • Set expectations to include Professional Services & Education – Customer built there own integration for API – They did not know SEP – They did not know the architecture or best practice for deployment – They did not know how to operate the platform efficiently and effectively • Objections – Difficult to deploy – Difficult to differentiate to customer and sell value – Intrusive & resource heavy client will impact user experience – Price
SYMANTEC VISION 2012 SOC and Public SOC
SYMANTEC VISION 2012 SOC and Public SOC
• SOC = Security Operations Center – BIG problem for Telcos and Service Providers: NO SOC – NO SOC = NO PROOF that the Cloud Services are Safe – All good but examples of Services hacked in the first hour – Brand Reputation at Risk • Recipe for Success 1) Leverage Symantec Managed Security Services MSS 2) Turn the problem into an advantage and offer MSS Services to your customers Move to a Public SOC
SYMANTEC VISION 2012 Symantec’s Threat Monitoring & Reporting Solutions
MANAGED SECURITY SERVICES
• Hosted Log Retention Service • Managed Firewall Protection – Per device or Enterprise wide option – Essential (limited changes/assistance) • Security Monitoring & Analysis Services – Advanced (unlimited) – Essential or Advanced Service • Managed IDP Protection – Per device or Enterprise wide option – Advanced (fully-managed only) • Vulnerability Management Service • Managed Endpoint Protection • VeriSign® Internet Defense Network – Essential (co-managed) – Advanced (fully-managed)
• INTELLIGENCE SERVICES ON-PREMISE SOLUTIONS
• Symantec DeepSight™ Intelligence Services • Symantec IDP Solution with Sourcefire™ – DeepSight Starter Pack / Advanced Pack – DeepSight 8.0 Silver, Gold, and Platinum Early • Symantec Security Information Manager Warning Services – DeepSight DataFeeds 4.0
SYMANTEC VISION 2012 Causes of a Security Incident
System System User Activity PreventionVulnerabilities Misconfiguration
Context and Global Edge to Endpoint RelevanceDetection Intelligence Visibility
SYMANTEC VISION 2012 Protecting the Enterprise – A Solution Framework
Threat Intelligence Target Attacks Threat Trends Vulnerabilities Malicious Code Fraud Activity
Analysis & Retain Analyze Advise Prioritization
Visibility & Collect Remediate Control
24 x 7 Global Budget Staff Sustainable Operations
SYMANTEC VISION 2012 Protecting the Enterprise – Symantec’s Unique Solution
Threat Intelligence Unparalleled Intelligence Target Attacks Threat Trends Vulnerabilities Malicious Code Fraud Activity
Analysis & Context and Relevance Retain Analyze Advise Prioritization Actionable Guidance
Visibility & Collect Remediate Control Edge-to-Endpoint Monitoring
24 x 7 Global Budget Staff Sustainable Security Expertise Operations 24x7, Global Leadership
SYMANTEC VISION 2012 Symantec MSS Capabilities
Threat Symantec™ Global Intelligence Network Intelligence
Attack Activity Vulnerabilities • 240,000 sensors • 40,000+ vulnerabilities • 200+ countries • 14,000 vendors • 105,000 technologies
Malware Intelligence Spam/Phishing • 133M client, server, • 5M decoy accounts gateways monitored • 8B+ email messages/day • Global coverage • 1B+ web requests/day
Identifies more threats, takes action faster & prevents impact
SYMANTEC VISION 2012 Solution Spectra vs Customer Subsegment Mapping
Different Customers means Different Solutions
SYMANTEC VISION 2012 Services overview: Event and incident management
Service overview Key functions
• Near-real time logging, and monitoring • Log correlation with other technologies and Symantec’s Global Intelligence Network • Log analysis and incident identification • Incident escalation, tracking and closure • Automatic inclusion of logs from Log Retention Devices
Business value
• 24x7 log monitoring and incident management • Correlation against other systems • Correlation against Symantec Global Intelligence Network (GIN)
Key outputs
• Prioritised alerts • Remediation plans • On-call support for critical vulnerabilities • Management reports and dashboards
SYMANTEC VISION 2012 Securing the Cloud
SYMANTEC VISION 2012
The Cube The Symantec SP Framework to support Service Providers in building own customized data and security services for their target markets
SYMANTEC VISION 2012 MiniCubes Vizualized
CSP Cube SYMANTEC VISION 2012 58 MiniCubes participating Cube Principles In Action into an SMB and Enterprise Service
They are part of a Service
They are sourced, built and $ are making money
Their Interfaces are now in Play
SYMANTEC VISION 2012 Cube principles in action – Virtual Desktop Infrastructure
SYMANTEC VISION 2012 Cube principles in action – Virtual Desktop Infrastructure
SYMANTEC VISION 2012 CSA Security Guidelines : Domains
Cloud Architecture • Cloud Computing Architectural Framework
• Governance and Enterprise Risk Management Governing in the • Legal and Electronic Discovery • Compliance and Audit Cloud • Information Lifecycle Management • Portability and Interoperability
• Traditional Security, Business Continuity, and Disaster Recover • Data Center Operations Operating in the • Incident Response, Notification, and Remediation • Application Security Cloud • Encryption and Key Management • Identity and Access Management • Virtualization
SYMANTEC VISION 2012 Governing the Cloud
Cloud Security Governance and Legal and Compliance Information Portability Alliance Domains Enterprise Risk Electronic Audit Lifecycle and Management Discovery Management Interoperability
Service
Platform
Infrastructure
SYMANTEC VISION 2012 Operating the Cloud
Traditional Security, DataCenter Incident Application Encryption Identity Cloud Security Business Continuity, Operations Response Security And and Access Virtualization Alliance Domains and Disaster Notification Key Management
Recovery Remediation Management
Service
Platform
Infrastructure
SYMANTEC VISION 2012 Infrastructure Security Symantec ManagedSecurity Information Security Services Manager Event Correlation Infrastructure Layer IncidentIncident ManagementManagement Remediation Log Retention Security Monitoring DeepSight SAV for NAS Data Loss Prevention AntiMalware at Storage level Discover Data Insight Security Information Storage Virtualization (heterogeneous) Volume Management Data Loss Prevention Management Control Compliance Suite Network Prevent Policy Management Monitor Technical Controls Mirroring or Reporting and Remediation Replication Storage FileStore SFHA (Storage Foundation HA) Distribution Enterprise Vault Network eDiscovery Processing Data Retention NetBackup Cluster Backup Data Retention Network Endpoint Protection Business Continuity Critical System Protection Veritas Cluster Service Endpoint Protection Geographical Cluster IPS/IDS System Hardening Business Continuity Brightmail Trafic Shaper Exploit Prevention Antispam at Network Symantec.cloud Altiris Server Management Suite Brightmail Gateway Web Gateway Web Security Provisioning Automation Antispam BotNet Detection Messaging Security Monitoring Encryption Remediation
SYMANTEC VISION 2012 Conclusions
SYMANTEC VISION 2012 Symantec Envisions Future Clouds as Safe Clouds
• Great article http://www.symantec.com/about/news/release/article.jsp?prid=20121105 _01 • Forthcoming Blog
SYMANTEC VISION 2012 Thank you!
Arnaud Taddei [email protected] +41 79 506 1129
Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.