SlideShare a Scribd company logo
1 of 9
Symantec Deepens Encryption Offerings
Provides Greater Flexibility and Support for Mobile Devices

July 19, 2011
Sophisticated                    Complex                Information   Increased
Attacks                          Heterogeneous          Explosion     Cost of
                                 Infrastructure                       Incidents



Key IT Security Trends
Symantec Deepens Encryption Offerings - July 19, 2011
Key Market Trends
Protect Your Data in More Places

                                               • BlackBerry isn’t the only enterprise mobile platform
              Mobility                           anymore
                                               • iOS is the most preferred second platform




                                               • Point product deployments are bubbling up to complexity
             Flexibility                         problems
                                               • Rationalizing data from multiple sources



                                               • Customers want better visibility and control for IT
                                                 management
         Manageability                         • Administer hybrid hardware and software disk encryption
                                                 environments from a single location



Symantec Deepens Encryption Offerings - July 19, 2011
What’s New in Symantec’s Encryption Product Line
       Symantec PGP Viewer for iOS
       • Mobile workers can view encrypted email via an Apple iPad, iPhone, iTouch
       • New workflow integration helps manage people risks

       PGP Universal Server integrated with Symantec Protection Center
       • Centralized security management console
       • Total visibility into endpoint security posture

       Management of Opal-Compliant Self-Encrypting Hard Drives
       • Oversee hybrid environments involving hardware and software-based
         encryption solutions deployed in tandem

       Other Updates
       • DLP + Encryption
       • X.509 Certificate Delivery (Gateway email delivery to client)
       • NetShare Group Keys

Symantec Deepens Encryption Offerings - July 19, 2011
Symantec PGP Viewer for iOS
New product for Apple iPad, iPhone, iTouch
• Provides access to encrypted mail
  and attachments on mobile
  devices
• Extends the Symantec encryption
  platform coverage
    – Apple iOS
    – RIM BlackBerry
    – Windows Mobile
• Addresses enterprise deployment
  concerns, PGP Universal Server
  from Symantec required
• Complements Symantec Mobile
  Security & Management solutions

Symantec Deepens Encryption Offerings - July 19, 2011
Symantec Protection Center Integration
PGP Universal Server
• Reduces administrative
  complexity for multiple security
  products
• Correlate information
    – Identify systems that do not have
      encryption
    – Compare information between
      different Symantec security
      solutions
• Helps organizations prepare for
  future security requirements
• Provides a go-to location for
  system reporting
Symantec Deepens Encryption Offerings - July 19, 2011
Symantec Approach:
Security Management with Encryption Management

                   Symantec Protection Center                                        IT Operations



        SEP Manager                                     PGP Universal Server         Management


                                                                                      Security
                         NAC




                                                                             Email
                                                        Disk
        AV




                                                                   File
                                                                                      Function

               SEP                                             PGP Desktop             Client

   Endpoint Security                                           Encryption
Symantec Deepens Encryption Offerings - July 19, 2011
Self Encrypting Hard Drives / Hybrid Environments
Symantec Endpoint Encryption Full Disk Edition
• Opal standard now appearing as a hard drive option in laptop
  refreshes
• Opal only addresses the encryption. Still requires management
  and emergency recovery capabilities for enterprise deployment
• Symantec Endpoint Encryption client provides management for
  mixed environments




Symantec Deepens Encryption Offerings - July 19, 2011
Thank you!




    Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
    the U.S. and other countries. Other names may be trademarks of their respective owners.

    This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
    are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


Symantec Deepens Encryption Offerings - July 19, 2011

More Related Content

What's hot

Data Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsData Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise Insights
Courtland Smith
 

What's hot (7)

Empower Your Workforce to Work Anywhere.
Empower Your Workforce to Work Anywhere.Empower Your Workforce to Work Anywhere.
Empower Your Workforce to Work Anywhere.
 
Fastest antivirus software
Fastest antivirus softwareFastest antivirus software
Fastest antivirus software
 
Enterprise File Synchronization and Sharing - Biscom Verosync
Enterprise File Synchronization and Sharing - Biscom VerosyncEnterprise File Synchronization and Sharing - Biscom Verosync
Enterprise File Synchronization and Sharing - Biscom Verosync
 
Data Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsData Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise Insights
 
Designing a Base Building Network – The Integrator's Role
Designing a Base Building Network – The Integrator's RoleDesigning a Base Building Network – The Integrator's Role
Designing a Base Building Network – The Integrator's Role
 
Embarcadero's Connected Development
Embarcadero's Connected DevelopmentEmbarcadero's Connected Development
Embarcadero's Connected Development
 
Nokia E7 Smartphone: Nokia and IBM Co-operation
Nokia E7 Smartphone: Nokia and IBM Co-operationNokia E7 Smartphone: Nokia and IBM Co-operation
Nokia E7 Smartphone: Nokia and IBM Co-operation
 

Similar to Symantec Deepens Encryption Offerings

Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
Andrew Wong
 
Simplify IT With Symantec’s Cloud-Based Solutions
Simplify IT With Symantec’s Cloud-Based SolutionsSimplify IT With Symantec’s Cloud-Based Solutions
Simplify IT With Symantec’s Cloud-Based Solutions
Symantec
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010
Andris Soroka
 
J75912 nec cloud brochure storage
J75912 nec cloud brochure storageJ75912 nec cloud brochure storage
J75912 nec cloud brochure storage
NECIndia
 
SplunkLive! Toronto - Ceryx
SplunkLive! Toronto - CeryxSplunkLive! Toronto - Ceryx
SplunkLive! Toronto - Ceryx
Splunk
 
Cisco Presentation 1
Cisco Presentation 1Cisco Presentation 1
Cisco Presentation 1
changcai
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloud
Trend Micro
 

Similar to Symantec Deepens Encryption Offerings (20)

Using Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginUsing Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLogin
 
Monetizing the Enterprise: Borderless Networks
Monetizing the Enterprise: Borderless NetworksMonetizing the Enterprise: Borderless Networks
Monetizing the Enterprise: Borderless Networks
 
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsDSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
 
Symantec Cloud Storage Offering: FileStore
Symantec Cloud Storage Offering: FileStoreSymantec Cloud Storage Offering: FileStore
Symantec Cloud Storage Offering: FileStore
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLM
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
Simplify IT With Symantec’s Cloud-Based Solutions
Simplify IT With Symantec’s Cloud-Based SolutionsSimplify IT With Symantec’s Cloud-Based Solutions
Simplify IT With Symantec’s Cloud-Based Solutions
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
 
IBM Cloud Data Encryption Services
IBM Cloud Data Encryption ServicesIBM Cloud Data Encryption Services
IBM Cloud Data Encryption Services
 
Symantec Endpoint Virtualization Suite
Symantec Endpoint Virtualization SuiteSymantec Endpoint Virtualization Suite
Symantec Endpoint Virtualization Suite
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010
 
Ceedo Sales training
Ceedo Sales trainingCeedo Sales training
Ceedo Sales training
 
J75912 nec cloud brochure storage
J75912 nec cloud brochure storageJ75912 nec cloud brochure storage
J75912 nec cloud brochure storage
 
SplunkLive! Toronto - Ceryx
SplunkLive! Toronto - CeryxSplunkLive! Toronto - Ceryx
SplunkLive! Toronto - Ceryx
 
Nokia E7 Smartphone: Nokia and Microsoft Partnership
Nokia E7 Smartphone: Nokia and Microsoft PartnershipNokia E7 Smartphone: Nokia and Microsoft Partnership
Nokia E7 Smartphone: Nokia and Microsoft Partnership
 
Cisco Presentation 1
Cisco Presentation 1Cisco Presentation 1
Cisco Presentation 1
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloud
 

More from Symantec

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreel
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 

Symantec Deepens Encryption Offerings

  • 1. Symantec Deepens Encryption Offerings Provides Greater Flexibility and Support for Mobile Devices July 19, 2011
  • 2. Sophisticated Complex Information Increased Attacks Heterogeneous Explosion Cost of Infrastructure Incidents Key IT Security Trends Symantec Deepens Encryption Offerings - July 19, 2011
  • 3. Key Market Trends Protect Your Data in More Places • BlackBerry isn’t the only enterprise mobile platform Mobility anymore • iOS is the most preferred second platform • Point product deployments are bubbling up to complexity Flexibility problems • Rationalizing data from multiple sources • Customers want better visibility and control for IT management Manageability • Administer hybrid hardware and software disk encryption environments from a single location Symantec Deepens Encryption Offerings - July 19, 2011
  • 4. What’s New in Symantec’s Encryption Product Line Symantec PGP Viewer for iOS • Mobile workers can view encrypted email via an Apple iPad, iPhone, iTouch • New workflow integration helps manage people risks PGP Universal Server integrated with Symantec Protection Center • Centralized security management console • Total visibility into endpoint security posture Management of Opal-Compliant Self-Encrypting Hard Drives • Oversee hybrid environments involving hardware and software-based encryption solutions deployed in tandem Other Updates • DLP + Encryption • X.509 Certificate Delivery (Gateway email delivery to client) • NetShare Group Keys Symantec Deepens Encryption Offerings - July 19, 2011
  • 5. Symantec PGP Viewer for iOS New product for Apple iPad, iPhone, iTouch • Provides access to encrypted mail and attachments on mobile devices • Extends the Symantec encryption platform coverage – Apple iOS – RIM BlackBerry – Windows Mobile • Addresses enterprise deployment concerns, PGP Universal Server from Symantec required • Complements Symantec Mobile Security & Management solutions Symantec Deepens Encryption Offerings - July 19, 2011
  • 6. Symantec Protection Center Integration PGP Universal Server • Reduces administrative complexity for multiple security products • Correlate information – Identify systems that do not have encryption – Compare information between different Symantec security solutions • Helps organizations prepare for future security requirements • Provides a go-to location for system reporting Symantec Deepens Encryption Offerings - July 19, 2011
  • 7. Symantec Approach: Security Management with Encryption Management Symantec Protection Center IT Operations SEP Manager PGP Universal Server Management Security NAC Email Disk AV File Function SEP PGP Desktop Client Endpoint Security Encryption Symantec Deepens Encryption Offerings - July 19, 2011
  • 8. Self Encrypting Hard Drives / Hybrid Environments Symantec Endpoint Encryption Full Disk Edition • Opal standard now appearing as a hard drive option in laptop refreshes • Opal only addresses the encryption. Still requires management and emergency recovery capabilities for enterprise deployment • Symantec Endpoint Encryption client provides management for mixed environments Symantec Deepens Encryption Offerings - July 19, 2011
  • 9. Thank you! Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Symantec Deepens Encryption Offerings - July 19, 2011