1 / 21

Information Integrity Where Security and Availability Meet!

Information Integrity Where Security and Availability Meet!. The NEW Symantec. VERITAS merger completed July 2, 2005 Safeguarding information from the desktop to the data center Serving a full spectrum of customers: Consumers Small Businesses Mid-size Businesses Enterprise and Government

coaxum
Télécharger la présentation

Information Integrity Where Security and Availability Meet!

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information IntegrityWhere Security and Availability Meet!

  2. The NEW Symantec • VERITAS merger completed July 2, 2005 • Safeguarding information from the desktop to the data center • Serving a full spectrum of customers: • Consumers • Small Businesses • Mid-size Businesses • Enterprise and Government • A full menu of security, storage, availability and performance products • Global network of partners • Global service and support Symantec Worldwide

  3. Information is the Currency of Business • The pace of business change is quickening • Your business depends on information to grow • To create value information must be made secure and available

  4. When Information is at Risk, Consequences are Real Security Availability

  5. COST COMPLEXITY • Flat IT Budgets • Increasing Storage Requirements • Business Applications and Processes Support • Infrastructure Consolidation • Multiple Vendor Dependencies • Heterogeneity • Increased Connectivity Demands COMPLIANCE AND RISK MANAGEMENT • Security Vulnerabilities • System and Application Failures • Site-wide Outage/Natural Disasters • E-commerce Laws in 40+ Countries • ISO 17799, Basil II, Sarbanes Oxley • FISMA, HIPAA, NERC The Challenges You Face are Clear

  6. The Requirement: A Flexible and Rigid Foundation That Protects Information From Risk Information Infrastructure Must: • Be agile based on changing business needs and threats • Deliver maximum value from your IT technology, people and processes • Enable ongoing demonstration of compliance • Ensure information is both secure and available 24 X 7 no matter where it resides

  7. Symantec: Trusted to Deliver Information Integrity • Proactively protect all layers of the infrastructure against security threats • Early warning of emerging threats • Monitor systems for compliance Information Security Information Integrity • Provision, optimize, monitor and remediate systems and storage to ensure uptime and maintain performance levels • Recover systems and data in the event of an outage Information Availability • Information is secure and available • Greater Efficiency • Less Complexity • Greater Compliance • Reduced Risk The result is greater resilience in your infrastructure

  8. A Progressive Approach: Attaining Information Integrity • External and internal insight that drives faster, better decision-making • End-to-end integrated solutions that proactively protect and recover information and IT assets • An integrated approach that maximizes data and application availability, increases operating efficiency, and preserves business continuity • Unmatched Capabilities: • Unsurpassed product breadth and depth • Category and market leadership • OS and hardware vendor independence • Integrated services

  9. Over 4,300 Managed Security Devices + 120 Million Symantec Systems Worldwide Dublin, Ireland Springfield, OR Waltham, MA San Francisco, CA Alexandria, VA Newport News, VA Global Intelligence Network Provides Early Warning 5 Symantec SOCs 61 Symantec Monitored Countries 20,000 Registered Sensors in 180 Countries 29 Worldwide Symantec Support Centers 6 Symantec Security Response Labs + + + + Tokyo, Japan Reading, England Boston, MA Roseville, MN Calgary, Canada Seoul, Korea Milan, Italy Or-Yehuda, Israel London, England Beijing, China Redwood City, CA Munich, Germany Madrid, Spain Taipei, Taiwan Mountain View, CA Paris, France Pune, India Singapore Santa Monica, CA Heathrow, FL Orem, UT/American Fork, UT Austin, TX Buenos Aires, Argentina Sydney, Australia

  10. 1 2 3 Integrated Information Integrity Solutions Email Security and Availability Business Continuity Regulatory Compliance 5

  11. Email Security and Availability • Challenges • Email is the mission critical application for conducting business, a growing vulnerability for security and availability, and the document of record for business • Symantec Email Security and Availability Solution • Protect from email born threats • Manage the increasing cost of storage for email • Meet compliance and risk management requirements • Benefits • Reduce infrastructure costs • Improve service levels • Address critical policy needs Email has become the primary medium for how we communicate. The consequence is that email has become a de facto record repository. CIO Magazine, Jan 2005

  12. Internet Symantec Provides a Holistic Solution Leading Email Security Leading Email Archiving Symantec Mail Security Software/Appliances/Hosted Enterprise Vault SMTP Traffic MTA Microsoft Exchange IBM Lotus Domino Leading Backup/Recovery Leading Storage Management Manage Email Lifecycle Email Management Keep Email Protected Keep Email Running Net Backup Backup Exec Storage Foundation HA

  13. SMTP Traffic MTA Microsoft Exchange IBM Lotus Domino Internet Manage Email Lifecycle Email Management Keep Email Protected Keep Email Running Keep Email Information Secure and Available Risk and Data Reduction Records Discovery and Retrieval RecordsRetention Internal Email Protection Data Reduction Automatically capture, manage and retain email and other records based on business policies Monitor, search and retrieve archived content for compliance, legal discovery and other needs Stop viruses, spam, phishing attacks before reaching email stores, end-users Reduce volume of spam before it hits network and email infrastructure Scan internal and outbound traffic for viruses and unauthorized content Resilient Foundation Recover quickly through efficient backupReduce downtime via clusteringReplicate and geo-cluster for disaster recoveryManage storage for automated provisioning Spam Quarantine

  14. Business Continuity Threats To IT Infrastructure • Human Error • Hacking, Phishing, Pharming • Application Failure • Database Corruption • Denial of Service Attacks • Fire, Flood, Hurricane • Equipment Failure • Disruption of Power or Communication • Malicious Software • Viruses, Worms, Trojan Horses • Strikes, Social Unrest • Sabotage, Terrorism • Challenges • Rediscovering the growing list of events creating business disruption, 59% of CIOs surveyed have budgeted increased spending for and focus for 2005/2006 on Business Continuity Initiatives* • Symantec Business Continuity Solution • Vulnerability Management • High Availability • Disaster Recovery • Benefits • Unparalleled security • Designed for heterogeneous environments • Built on industry leading technologies * Source: CIO Insight, 30 strategies for the year ahead, CIO Magazine March 2005 ZD publishing

  15. Internet Get Ahead of the Problem: Integrated Security and Availability Planning Vulnerability Proactively Blocked, Application Failed Over Availability of Application, Systems, and Data Assured Vulnerability Identified and/or Infrastructure Instrumentation & Early Warnings Sent Mitigation Reports on attacks and outages; updates to policies and SLAs; archiving for audit Restoration Remediation Patches & Updates Implemented Across Infrastructure; Applications Recovered; Data Restored Identification of Systems to Patch, Points of Attack, Application Failures, Data Loss

  16. Regulatory Compliance • Challenges • Associated time and cost of compliance initiatives • Lack of standardization • Complexity • Symantec Regulatory Compliance Solution • Implements IT controls for an automated and repeatable process • Enables retention and timely retrieval of regulated documents • Benefits • Automates testing • Standardizes on common methods • Addresses multiple compliance initiatives • Multi-division company’s audit and related fees increased 77% in 2004 due to de-centralized internal controls testing process (USA Today) • 75% of intellectual property is contained in e-mail (Gartner Research)

  17. Implement IT Controls: Achieve Sustained Compliance Continuous Improvement Implement Changes Manage Plan Oversee • Implement and document new policies and processes • Tools and Services for ongoing management • Report • Audit • Assessments • Design Project Management Support

  18. In the Future……… … an external threat alert will trigger an internal assessment…… … you will be able to proactively address performance issues (e.g. system failures, human errors, disasters, system vulnerabilities) … you will be able to consolidate and monitor performance slowdowns along with security alerts … and you will be able to automatically recover compromised systems

  19. Symantec Leading the Way Technology Knowledge Trusted Advice Global Presence Rapid Incident Response Integrated Solutions Partnership

  20. Thank You!

More Related