SlideShare une entreprise Scribd logo
1  sur  29
Cyber Security in the
Market Place:
HP CTO Day
David Thompson & James Hanlon
HP Alliance Manager & Security Strategist
2
Agenda
• Symantec
• The Threat
• The Market
• The Solutions
• The Partnership.
3
SYMANTEC SECURITY INFORMATION MANAGEMENT
$4.2 billion Revenue1 $2.5 billion
$38 billion by 2018 Market Opportunity $16 billion by 2018
• 1 billion+ systems
• 135M+ Norton users
• 100M+ SEP clients
• Norton, Enterprise Security, Cybersecurity
Services, Trust Services, Mobility, IoT
Key Stats & Portfolio
• Global leader in backup
• NetBackup appliance: 36% share
• 75% of the Fortune 500
• Backup, Archiving, eDiscovery, Storage,
Availability
$6.7Billion Revenues1
1 FY2014 GAAP metrics
IM
38%
Security
62%
Company Position | SYMANTEC & VERITAS
Symantec Enterprise Security Differentiation | OUR UNIQUE VISIBILITY
4
57M attack sensors in
157 countries
175M
endpoints
182M web attacks
blocked last year
3.7T
rows of telemetry
100 Billion
more/month
9
threat response centers
500+
rapid security response team
30% of world’s enterprise
email traffic scanned/day
1.8 Billion
web requests
Copyright © 2015 Symantec Corporation
5
Cyber
Intelligent
Cyber
Vigilant
Advisors Collaboration
Research &
Tools
Education
Threat Intelligence is the foundation for our Solution Portfolio
Symantec Today| OUR CONTRIBUTION
6
The Threat
What we see, what we know?
7
Attackers Moving Faster
Digital extortion
on the rise
Malware gets
smarter
Zero-Day Threats Many Sectors Under Attack
5 of 6 large
companies
attacked
317M new
malware
created
1M new
threats
daily
60% of
attacks
targeted SMEs
113%
increase in
ransomware
45X more
devices
held
hostage
28% of malware
was Virtual
Machine Aware
24
all-time
high
Top 5
unpatched for
295 days
24
Healthcare
+ 37%
Retail
+11%
Education
+10%
Government
+8%
Financial
+6%
Source: Symantec Internet Security Threat Report 2015
8
The Market
Key Trends Reshaping the Enterprise Security Markets
RESURGENCE OF ENDPOINT Rapid shift to mobile and IoT
DISAPPEARING PERIMETER Decreasingly relevant with “fuzzy” perimeter
RAPID CLOUD ADOPTION Enterprise data and applications moving to cloud
CYBERSECURITY SERVICES Security as a Service; threat life cycle management
EVOLVING REGULATION Governments and regulators playing ever larger role
9
Copyright © 2015 Symantec Corporation
BOARD LEVEL CONCERNS
Loss of competitive
advantage
Brand damage & IP loss
Breach costs
Impact of data protection
& privacy regulation
CYBERSECURITYAWARNESS
BOARD LEVEL ISSUES
Do not understand
implications of losing
critical data & assets
Lack of clarity on
ownership of Cyber
Security
Do not receive intelligence
on cyber security threats
Do not review risk
management plans &
policies
SECURITY INVESTMENT
Monitoring
Advanced Threat
Protection
Intelligence & Incident
Response
Data Protection
The Board| Cyber Security Concerns, Issues & Investment Priorities
11
The Symantec
Solutions
Symantec Enterprise Security | SYMANTEC SOLUTION STRATEGY
12
Threat Protection
ENDPOINTS DATA CENTER GATEWAYS
• Advanced Threat Protection Across All Control Points
• Built-In Forensics and Remediation Within Each Control Point
• Integrated Protection of Server Workloads: On-Premise, Virtual, and Cloud
• Cloud-based Management for Endpoints, Datacenter, and Gateways
Unified Security Analytics Platform
Log and
Telemetry
Collection
Unified Incident
Management and
Customer Hub
Inline Integrations
for Closed-loop
Actionable Intelligence
Regional and
Industry
Benchmarking
Integrated Threat
and Behavioral
Analysis
Information Protection
DATA IDENTITIES
• Integrated Data and Identity Protection
• Cloud Security Broker for Cloud and Mobile Apps
• User and Behavioral Analytics
• Cloud-based Encryption and Key Management
Users
Data
Apps
Cloud
Endpoints
Gateways
Data
Center
Cyber Security Services
Monitoring, Incident Response, Simulation, Adversary Threat Intelligence
Copyright © 2015 Symantec Corporation
Copyright © 2015 Symantec Corporation
13
Cyber Security Services
Unified Security Analytics Platform
Information Protection
DATA IDENTITIES
Threat Protection
DATA CENTER GATEWAYSENDPOINTS
INFORMATION
PROTECTION
Information Protection Requirements | CLOUD AND MOBILE FOCUS
14
With the advent of mobile and BYOD
devices, more users are accessing
and consuming information when
outside the firewalls
USERSAREMOVING
DATA AND APPS ARE MOVING
With more data in cloud and more
mobile users, information protection
across cloud and mobile, combined
with behavioral analytics, is a critical
imperative
Historically data was created and
consumed on premise; most users
would create and consume this data
from inside firewalls
With more applications and
workloads migrating to public
clouds, more and more data is
created and consumed on cloud
Copyright © 2015 Symantec Corporation
Symantec Information Protection | STRATEGY
• Extend Data and Identity protection regardless
of where data resides: On Premise, On Mobile,
In the Cloud
• Common SSO and Access Management
regardless of where applications reside: On
Premise, On Mobile, In the Cloud
• Integrated user and behavioral analytics to
detect and prevent insider and outsider (APT)
threats
15
Data Access
Identities
Cloud
Security
Broker
Copyright © 2015 Symantec Corporation
Pillar 2:
DLP
Visibility and Control
16
DLP Console
On Premises
DLP: Cloud Email
• Monitor & Protect data from Cloud
Email
• Single Policy Enforcement
• Internal & remote users
• For existing DLP customers
– Manage from DLP Console on Premises
• For new customers
– Manage from Cloud Console
Information Protection
Cloud Email Monitor
Cloud
Console
Real time
protection
Visibility and Control
17
DLP Console
On Premises
DLP: Cloud Storage and SaaS Applications
Real time
protection
Scan
• Scan Cloud storage from the Cloud
using native APIs
• Real-time protection for uploads and
downloads from Cloud Storage and
Cloud Applications
• For existing DLP customers
– Manage from DLP Console on Premises
• For new customers
– Manage from Cloud Console
Information
Protection
Cloud
Scanners
Cloud
Console
Foundation: Symantec Identity: Access Manager
Control, Convenience, and Compliance
18
WHO ARE YOU?
Identity-based
Access Control
Single Sign-on &
Strong Authentication User
Directory
WHERE ARE YOU?
Tech Support
Tom
Sales Rep
Stephanie
Stephanie’s public and private cloud applications
Tom’s public and private cloud applications
The Foundation: Password-less 2FA to all Your Cloud Apps
Easy and Secure
Copyright © 2015 Symantec Corporation
19
FINGERPRINTUSERNAME
Copyright © 2015 Symantec Corporation
20
Cyber Security Services
Unified Security Analytics Platform
Information Protection
DATA IDENTITIES
Threat Protection
DATA CENTER GATEWAYSENDPOINTS
THREAT
PROTECTION
Threat Protection Requirements | FULL THREAT LIFE-CYCLE
21
Source: Gartner
PREDICT Proactive risk
analysis
Predict attacks
Baseline systems Prevent issues
Divert
attackers
Harden and isolate
systems
Contain
issues
Confirm and
prioritize risk
Detect issuesRemediate/
Make change
Design/
Model change
RESPOND
PREVENT
DETECTInvestigate/
Forensics
Advanced
Threat
Protection
Symantec Threat Protection | STRATEGY
• Advanced Threat Protection Across
Control Points
• Built-in Forensics and Remediation Within
Each Control Point
• Integrated Protection of Server Workloads
across On-Premise, Virtual, and Cloud
• Cloud-based Management for Endpoints,
Datacenter, and Gateways
22
Advanced
Threat
Protection
Network/
Gateways
Data
Center
Endpoints
Copyright © 2015 Symantec Corporation
Copyright © 2015 Symantec Corporation
23
Cyber Security Services
Unified Security Analytics Platform
Information Protection
DATA IDENTITIES
Threat Protection
DATA CENTER GATEWAYSENDPOINTS
UNIFIED SECURITY
ANALYTICS
Security Platforms Market | FOCUS SHIFTING TO ANALYTICS
24
ATTACKS
ARE INCREASINGLY
SOPHISTICATED
• Micro-targeted
• New techniques and zero
day attacks
• Stealthy to remain
undetected
EXISTING
TECHNOLOGY
CAN’T KEEP UP
• Reactive methods
• Insufficient data to find
subtle trends and patterns
• Isolated approaches
without broader context
ANALYST
FATIGUE IS
RAMPANT
• Too many alerts and
false positives
• Slow and manual
detection, forensics,
and remediation
RISE OF SECURITY
BIG DATA ANALYTICS
Big data, analytics, and machine
learning techniques needed to
address these challenges
Copyright © 2015 Symantec Corporation
Symantec Unified Security in a Nutshell
25
WHAT
IT DOES:
WHAT
IT IS:
Brings in data
and events from all sources
Provides a platform
to manage, store, and
analyze the aggregated data
Enables a new breed of
applications that leverages the
aggregated intelligence
Creates a virtuous cycle
3 part
ecosystem
A comprehensive Big Data
Analytics platform for collecting
vast security telemetry,
analyzing it for local and global
threats and converting the
insights into secure outcomes
Unified Security
Analytics Platform
Standard set of interfaces and
APIs, supplied by Symantec and
3rd party security products, for
contributing rich telemetry to
the platform
Telemetry & APIs
Data and analytic applications
built on the platform by
Symantec and 3rd party
ecosystem for a variety of
security use cases
Unified Security
Applications1 2 3
Copyright © 2015 Symantec Corporation
Sample Unified Security Analytics Applications
26
Risk Insight
• Risk Advisor and
Benchmarking App
• Measures and
benchmarks security
health, including risks
arising from
compromised
end-users
Targeted Attack
Detection
• Crawls through global
telemetry to find
targeted attack IOCs
and detect brand-new
targeted attacks
• Ex: find all emails sent
from a given address,
all files attached to
those emails, all events
associated with those
files, etc.
Incident
Investigation
• Drill into incidents to
get all associated
events across security
control points,
building out the full
attack chain
• Ex: Discover when and
how a threat first
entered the
environment
Moneyball
• Correlate security
outcomes across
customers with
differing security
controls, policies, and
settings
• Quantify ROI for
potential new security
investments
Copyright © 2015 Symantec Corporation
27
The Partnership
HP Service Offerings Built on Symantec Technology
2
8
29
?? QUESTIONS ??

Contenu connexe

Tendances

Security Transformation Services
Security Transformation ServicesSecurity Transformation Services
Security Transformation Servicesxband
 
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationSymantec
 
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...North Texas Chapter of the ISSA
 
Vendor Landscape: Security Information and Event Management
Vendor Landscape: Security Information and Event ManagementVendor Landscape: Security Information and Event Management
Vendor Landscape: Security Information and Event ManagementInfo-Tech Research Group
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
IBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapIBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapDATA SECURITY SOLUTIONS
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementProlifics
 
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...Andris Soroka
 
Building an application security program
Building an application security programBuilding an application security program
Building an application security programOutpost24
 
IBM Security Intelligence
IBM Security IntelligenceIBM Security Intelligence
IBM Security IntelligenceAnna Landolfi
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalArrow ECS UK
 
Top 5 Cloud Security Predictions for 2016
Top 5 Cloud Security Predictions for 2016 Top 5 Cloud Security Predictions for 2016
Top 5 Cloud Security Predictions for 2016 Alert Logic
 
2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESM2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESMPinewood
 
Security Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM GapSecurity Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM GapEric Johansen, CISSP
 
Assessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS SolutionsAssessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS SolutionsDigital Bond
 
Outpost24 webinar: Risk-based approach to security assessments
Outpost24 webinar: Risk-based approach to security assessmentsOutpost24 webinar: Risk-based approach to security assessments
Outpost24 webinar: Risk-based approach to security assessmentsOutpost24
 
Extend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsExtend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsIBM Security
 

Tendances (20)

Security Transformation Services
Security Transformation ServicesSecurity Transformation Services
Security Transformation Services
 
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
 
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
 
Vendor Landscape: Security Information and Event Management
Vendor Landscape: Security Information and Event ManagementVendor Landscape: Security Information and Event Management
Vendor Landscape: Security Information and Event Management
 
IBM Qradar-Advisor
IBM Qradar-AdvisorIBM Qradar-Advisor
IBM Qradar-Advisor
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
IBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapIBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmap
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access Management
 
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
 
Building an application security program
Building an application security programBuilding an application security program
Building an application security program
 
IBM Security Intelligence
IBM Security IntelligenceIBM Security Intelligence
IBM Security Intelligence
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_final
 
Top 5 Cloud Security Predictions for 2016
Top 5 Cloud Security Predictions for 2016 Top 5 Cloud Security Predictions for 2016
Top 5 Cloud Security Predictions for 2016
 
2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESM2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESM
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
Security Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM GapSecurity Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM Gap
 
Assessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS SolutionsAssessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS Solutions
 
Outpost24 webinar: Risk-based approach to security assessments
Outpost24 webinar: Risk-based approach to security assessmentsOutpost24 webinar: Risk-based approach to security assessments
Outpost24 webinar: Risk-based approach to security assessments
 
Extend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsExtend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPs
 
Security Information Event Management - nullhyd
Security Information Event Management - nullhydSecurity Information Event Management - nullhyd
Security Information Event Management - nullhyd
 

En vedette

Cyber Security in Transportation
Cyber Security in TransportationCyber Security in Transportation
Cyber Security in TransportationOren Elimelech
 
Business Values for IoT Solutions
Business Values for IoT SolutionsBusiness Values for IoT Solutions
Business Values for IoT SolutionsIBM Analytics
 
Your Business on Facebook
Your Business on FacebookYour Business on Facebook
Your Business on FacebookThomas Peroutka
 
The Economics of Cyber Security
The Economics of Cyber SecurityThe Economics of Cyber Security
The Economics of Cyber SecurityJohn Gilligan
 
Facebook Marketing - Presentation for Jay Berkowitz
Facebook Marketing - Presentation for Jay BerkowitzFacebook Marketing - Presentation for Jay Berkowitz
Facebook Marketing - Presentation for Jay BerkowitzMari Smith
 
NATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsNATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsBenjamin Rohé
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017isc2-hellenic
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
Facebook marketing strategy
Facebook marketing strategyFacebook marketing strategy
Facebook marketing strategySwaransoft OÜ
 
Cyber security in_next_gen_air_transportation_system_wo_video
Cyber security in_next_gen_air_transportation_system_wo_videoCyber security in_next_gen_air_transportation_system_wo_video
Cyber security in_next_gen_air_transportation_system_wo_videoOWASP Delhi
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017Ramiro Cid
 
Facebook Marketing Overview & Proposal
Facebook Marketing Overview & ProposalFacebook Marketing Overview & Proposal
Facebook Marketing Overview & ProposalChakra Systems
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity PredictionsPaloAltoNetworks
 
CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!Dr David Probert
 
Facebook marketing slideshare
Facebook marketing slideshareFacebook marketing slideshare
Facebook marketing slideshareAisle7
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 

En vedette (19)

Cyber Security in Transportation
Cyber Security in TransportationCyber Security in Transportation
Cyber Security in Transportation
 
Cyber Security in Civil Aviation
Cyber Security in Civil AviationCyber Security in Civil Aviation
Cyber Security in Civil Aviation
 
Proposal for facebook page promotion
Proposal for facebook page promotionProposal for facebook page promotion
Proposal for facebook page promotion
 
Business Values for IoT Solutions
Business Values for IoT SolutionsBusiness Values for IoT Solutions
Business Values for IoT Solutions
 
Your Business on Facebook
Your Business on FacebookYour Business on Facebook
Your Business on Facebook
 
The Economics of Cyber Security
The Economics of Cyber SecurityThe Economics of Cyber Security
The Economics of Cyber Security
 
Facebook Marketing - Presentation for Jay Berkowitz
Facebook Marketing - Presentation for Jay BerkowitzFacebook Marketing - Presentation for Jay Berkowitz
Facebook Marketing - Presentation for Jay Berkowitz
 
NATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsNATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-Ups
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Facebook marketing strategy
Facebook marketing strategyFacebook marketing strategy
Facebook marketing strategy
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
Cyber security in_next_gen_air_transportation_system_wo_video
Cyber security in_next_gen_air_transportation_system_wo_videoCyber security in_next_gen_air_transportation_system_wo_video
Cyber security in_next_gen_air_transportation_system_wo_video
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
Facebook Marketing Overview & Proposal
Facebook Marketing Overview & ProposalFacebook Marketing Overview & Proposal
Facebook Marketing Overview & Proposal
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!
 
Facebook marketing slideshare
Facebook marketing slideshareFacebook marketing slideshare
Facebook marketing slideshare
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 

Similaire à Cyber Security in the market place: HP CTO Day

Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Decisions
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud worldZscaler
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMwareVMUG IT
 
Cybersecurity Series SEIM Log Analysis
Cybersecurity Series  SEIM Log AnalysisCybersecurity Series  SEIM Log Analysis
Cybersecurity Series SEIM Log AnalysisJim Kaplan CIA CFE
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Symantec Brasil
 
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITMarketingArrowECS_CZ
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2SafeNet
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Modern vs. Traditional SIEM
Modern vs. Traditional SIEM Modern vs. Traditional SIEM
Modern vs. Traditional SIEM Alert Logic
 
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...Outpost24
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareCloudera, Inc.
 
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Decisions
 

Similaire à Cyber Security in the market place: HP CTO Day (20)

MID_SIEM_Boubker_EN
MID_SIEM_Boubker_ENMID_SIEM_Boubker_EN
MID_SIEM_Boubker_EN
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
 
CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud world
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
 
Cybersecurity Series SEIM Log Analysis
Cybersecurity Series  SEIM Log AnalysisCybersecurity Series  SEIM Log Analysis
Cybersecurity Series SEIM Log Analysis
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
 
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Modern vs. Traditional SIEM
Modern vs. Traditional SIEM Modern vs. Traditional SIEM
Modern vs. Traditional SIEM
 
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?
 
IBM Security Strategy
IBM Security StrategyIBM Security Strategy
IBM Security Strategy
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
 

Plus de Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

Plus de Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Dernier

The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 

Dernier (20)

The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 

Cyber Security in the market place: HP CTO Day

  • 1. Cyber Security in the Market Place: HP CTO Day David Thompson & James Hanlon HP Alliance Manager & Security Strategist
  • 2. 2 Agenda • Symantec • The Threat • The Market • The Solutions • The Partnership.
  • 3. 3 SYMANTEC SECURITY INFORMATION MANAGEMENT $4.2 billion Revenue1 $2.5 billion $38 billion by 2018 Market Opportunity $16 billion by 2018 • 1 billion+ systems • 135M+ Norton users • 100M+ SEP clients • Norton, Enterprise Security, Cybersecurity Services, Trust Services, Mobility, IoT Key Stats & Portfolio • Global leader in backup • NetBackup appliance: 36% share • 75% of the Fortune 500 • Backup, Archiving, eDiscovery, Storage, Availability $6.7Billion Revenues1 1 FY2014 GAAP metrics IM 38% Security 62% Company Position | SYMANTEC & VERITAS
  • 4. Symantec Enterprise Security Differentiation | OUR UNIQUE VISIBILITY 4 57M attack sensors in 157 countries 175M endpoints 182M web attacks blocked last year 3.7T rows of telemetry 100 Billion more/month 9 threat response centers 500+ rapid security response team 30% of world’s enterprise email traffic scanned/day 1.8 Billion web requests Copyright © 2015 Symantec Corporation
  • 5. 5 Cyber Intelligent Cyber Vigilant Advisors Collaboration Research & Tools Education Threat Intelligence is the foundation for our Solution Portfolio Symantec Today| OUR CONTRIBUTION
  • 7. What we see, what we know? 7 Attackers Moving Faster Digital extortion on the rise Malware gets smarter Zero-Day Threats Many Sectors Under Attack 5 of 6 large companies attacked 317M new malware created 1M new threats daily 60% of attacks targeted SMEs 113% increase in ransomware 45X more devices held hostage 28% of malware was Virtual Machine Aware 24 all-time high Top 5 unpatched for 295 days 24 Healthcare + 37% Retail +11% Education +10% Government +8% Financial +6% Source: Symantec Internet Security Threat Report 2015
  • 9. Key Trends Reshaping the Enterprise Security Markets RESURGENCE OF ENDPOINT Rapid shift to mobile and IoT DISAPPEARING PERIMETER Decreasingly relevant with “fuzzy” perimeter RAPID CLOUD ADOPTION Enterprise data and applications moving to cloud CYBERSECURITY SERVICES Security as a Service; threat life cycle management EVOLVING REGULATION Governments and regulators playing ever larger role 9 Copyright © 2015 Symantec Corporation
  • 10. BOARD LEVEL CONCERNS Loss of competitive advantage Brand damage & IP loss Breach costs Impact of data protection & privacy regulation CYBERSECURITYAWARNESS BOARD LEVEL ISSUES Do not understand implications of losing critical data & assets Lack of clarity on ownership of Cyber Security Do not receive intelligence on cyber security threats Do not review risk management plans & policies SECURITY INVESTMENT Monitoring Advanced Threat Protection Intelligence & Incident Response Data Protection The Board| Cyber Security Concerns, Issues & Investment Priorities
  • 12. Symantec Enterprise Security | SYMANTEC SOLUTION STRATEGY 12 Threat Protection ENDPOINTS DATA CENTER GATEWAYS • Advanced Threat Protection Across All Control Points • Built-In Forensics and Remediation Within Each Control Point • Integrated Protection of Server Workloads: On-Premise, Virtual, and Cloud • Cloud-based Management for Endpoints, Datacenter, and Gateways Unified Security Analytics Platform Log and Telemetry Collection Unified Incident Management and Customer Hub Inline Integrations for Closed-loop Actionable Intelligence Regional and Industry Benchmarking Integrated Threat and Behavioral Analysis Information Protection DATA IDENTITIES • Integrated Data and Identity Protection • Cloud Security Broker for Cloud and Mobile Apps • User and Behavioral Analytics • Cloud-based Encryption and Key Management Users Data Apps Cloud Endpoints Gateways Data Center Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Copyright © 2015 Symantec Corporation
  • 13. Copyright © 2015 Symantec Corporation 13 Cyber Security Services Unified Security Analytics Platform Information Protection DATA IDENTITIES Threat Protection DATA CENTER GATEWAYSENDPOINTS INFORMATION PROTECTION
  • 14. Information Protection Requirements | CLOUD AND MOBILE FOCUS 14 With the advent of mobile and BYOD devices, more users are accessing and consuming information when outside the firewalls USERSAREMOVING DATA AND APPS ARE MOVING With more data in cloud and more mobile users, information protection across cloud and mobile, combined with behavioral analytics, is a critical imperative Historically data was created and consumed on premise; most users would create and consume this data from inside firewalls With more applications and workloads migrating to public clouds, more and more data is created and consumed on cloud Copyright © 2015 Symantec Corporation
  • 15. Symantec Information Protection | STRATEGY • Extend Data and Identity protection regardless of where data resides: On Premise, On Mobile, In the Cloud • Common SSO and Access Management regardless of where applications reside: On Premise, On Mobile, In the Cloud • Integrated user and behavioral analytics to detect and prevent insider and outsider (APT) threats 15 Data Access Identities Cloud Security Broker Copyright © 2015 Symantec Corporation Pillar 2: DLP
  • 16. Visibility and Control 16 DLP Console On Premises DLP: Cloud Email • Monitor & Protect data from Cloud Email • Single Policy Enforcement • Internal & remote users • For existing DLP customers – Manage from DLP Console on Premises • For new customers – Manage from Cloud Console Information Protection Cloud Email Monitor Cloud Console Real time protection
  • 17. Visibility and Control 17 DLP Console On Premises DLP: Cloud Storage and SaaS Applications Real time protection Scan • Scan Cloud storage from the Cloud using native APIs • Real-time protection for uploads and downloads from Cloud Storage and Cloud Applications • For existing DLP customers – Manage from DLP Console on Premises • For new customers – Manage from Cloud Console Information Protection Cloud Scanners Cloud Console
  • 18. Foundation: Symantec Identity: Access Manager Control, Convenience, and Compliance 18 WHO ARE YOU? Identity-based Access Control Single Sign-on & Strong Authentication User Directory WHERE ARE YOU? Tech Support Tom Sales Rep Stephanie Stephanie’s public and private cloud applications Tom’s public and private cloud applications
  • 19. The Foundation: Password-less 2FA to all Your Cloud Apps Easy and Secure Copyright © 2015 Symantec Corporation 19 FINGERPRINTUSERNAME
  • 20. Copyright © 2015 Symantec Corporation 20 Cyber Security Services Unified Security Analytics Platform Information Protection DATA IDENTITIES Threat Protection DATA CENTER GATEWAYSENDPOINTS THREAT PROTECTION
  • 21. Threat Protection Requirements | FULL THREAT LIFE-CYCLE 21 Source: Gartner PREDICT Proactive risk analysis Predict attacks Baseline systems Prevent issues Divert attackers Harden and isolate systems Contain issues Confirm and prioritize risk Detect issuesRemediate/ Make change Design/ Model change RESPOND PREVENT DETECTInvestigate/ Forensics Advanced Threat Protection
  • 22. Symantec Threat Protection | STRATEGY • Advanced Threat Protection Across Control Points • Built-in Forensics and Remediation Within Each Control Point • Integrated Protection of Server Workloads across On-Premise, Virtual, and Cloud • Cloud-based Management for Endpoints, Datacenter, and Gateways 22 Advanced Threat Protection Network/ Gateways Data Center Endpoints Copyright © 2015 Symantec Corporation
  • 23. Copyright © 2015 Symantec Corporation 23 Cyber Security Services Unified Security Analytics Platform Information Protection DATA IDENTITIES Threat Protection DATA CENTER GATEWAYSENDPOINTS UNIFIED SECURITY ANALYTICS
  • 24. Security Platforms Market | FOCUS SHIFTING TO ANALYTICS 24 ATTACKS ARE INCREASINGLY SOPHISTICATED • Micro-targeted • New techniques and zero day attacks • Stealthy to remain undetected EXISTING TECHNOLOGY CAN’T KEEP UP • Reactive methods • Insufficient data to find subtle trends and patterns • Isolated approaches without broader context ANALYST FATIGUE IS RAMPANT • Too many alerts and false positives • Slow and manual detection, forensics, and remediation RISE OF SECURITY BIG DATA ANALYTICS Big data, analytics, and machine learning techniques needed to address these challenges Copyright © 2015 Symantec Corporation
  • 25. Symantec Unified Security in a Nutshell 25 WHAT IT DOES: WHAT IT IS: Brings in data and events from all sources Provides a platform to manage, store, and analyze the aggregated data Enables a new breed of applications that leverages the aggregated intelligence Creates a virtuous cycle 3 part ecosystem A comprehensive Big Data Analytics platform for collecting vast security telemetry, analyzing it for local and global threats and converting the insights into secure outcomes Unified Security Analytics Platform Standard set of interfaces and APIs, supplied by Symantec and 3rd party security products, for contributing rich telemetry to the platform Telemetry & APIs Data and analytic applications built on the platform by Symantec and 3rd party ecosystem for a variety of security use cases Unified Security Applications1 2 3 Copyright © 2015 Symantec Corporation
  • 26. Sample Unified Security Analytics Applications 26 Risk Insight • Risk Advisor and Benchmarking App • Measures and benchmarks security health, including risks arising from compromised end-users Targeted Attack Detection • Crawls through global telemetry to find targeted attack IOCs and detect brand-new targeted attacks • Ex: find all emails sent from a given address, all files attached to those emails, all events associated with those files, etc. Incident Investigation • Drill into incidents to get all associated events across security control points, building out the full attack chain • Ex: Discover when and how a threat first entered the environment Moneyball • Correlate security outcomes across customers with differing security controls, policies, and settings • Quantify ROI for potential new security investments Copyright © 2015 Symantec Corporation
  • 28. HP Service Offerings Built on Symantec Technology 2 8