1 / 19

Targeted Attacks on Intellectual Property: Building a Strong Defense

Learn how to protect your organization from targeted attacks on intellectual property and build a strong defense with Symantec's comprehensive security suites. Explore the anatomy of a breach and discover strategies to develop and enforce IT policies, protect sensitive information, and manage systems effectively. Join us for this informative program to stay ahead of potential threats to your intellectual property.

kkuhn
Télécharger la présentation

Targeted Attacks on Intellectual Property: Building a Strong Defense

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Q1: Joint ISO/Marketing Program: Security Penney Farris April 29, 2010

  2. Program Agenda April 29 – Targeted Attacks on Intellectual Property May 4 – Altiris 7.0 May 25 – Data Loss Prevention 10.5* June 1 – Control Compliance Suite 10.0* June 8 – Symantec Protection Suite* June 9 – Call Blitz focusing on above messaging and products * Tentative schedule

  3. Targeted Attacks on Intellectual Property David Dorosin Director of Product Marketing, DLP and Compliance April 29, 2010 Targeted Attacks on Intellectual Property

  4. Agenda Symantec’s Unique Vantage Point 1 Targeted Attacks on Intellectual Property 2 New Security Suites from Symantec 3 Targeted Attacks on Intellectual Property

  5. Building a “Community of Defense” with Businesses Targeted Attacks on Intellectual Property

  6. Anatomy of a Breach Targeted Attacks on Intellectual Property

  7. Dissecting Hydraq Hi, I met you at the Malware Conference last month. Wanted to let you know I got this great shot of you doing your presentation. I posted it here: Incursion Attacker breaks into the network by delivering targeted malware to vulnerable systems and employees Organized Criminal Organized Criminal Targeted Attacks on Intellectual Property

  8. Dissecting Hydraq Discovery Hacker maps organization’s defenses from the inside and creates battle plan Organized Criminal Organized Criminal Targeted Attacks on Intellectual Property

  9. Dissecting Hydraq Capture Attacker accesses data on unprotected systems and installs malware to secretly acquire crucial data Organized Criminal Organized Criminal Targeted Attacks on Intellectual Property

  10. Dissecting Hydraq Hydraq Attacker Exfiltration Confidential data sent back to enemy’s “home base” for exploitation and fraud Victim Organized Criminal Organized Criminal 72.3.224.71:443 Targeted Attacks on Intellectual Property

  11. Mass Attack vs. Targeted Attack Incursion Discovery Capture Exfiltration Targeted Attacks on Intellectual Property

  12. The Challenges Develop and Enforce IT Policies Protect The Information Manage Systems Protect The Infrastructure Targeted Attacks on Intellectual Property

  13. Comprehensive Security Strategy is Required Risk Based and Policy Driven IT Governance, Risk and Compliance Information - Centric Information Risk Management Operationalized Infrastructure Management Well Managed Infrastructure Infrastructure Protection Targeted Attacks on Intellectual Property

  14. New Security Suites Meet These Challenges Develop and Enforce IT Policies Protect the Information Manage Systems Protect the Infrastructure Targeted Attacks on Intellectual Property

  15. Develop and Enforce IT Policies Key Benefits New in Version 10.0 • Define risk and develop IT policies • Assess infrastructure and processes • Report, monitor and demonstrate due care • Remediate problems • Centralized evidence collection and management • Dynamic web-based dashboards • Integration with Symantec Data Loss Prevention • New CCS Vulnerability Manager Targeted Attacks on Intellectual Property

  16. Protect the Information • Discover where sensitive information resides • Monitor how data is being used • Protect sensitive information from loss Key Benefits New in Version 10.5 • Better visibility and control of unstructured data • Enhanced protection for social media sites • Twitter, LinkedIn, YouTube, … • New protection for private clouds (Citrix) • New endpoint option for less complex environments Targeted Attacks on Intellectual Property

  17. Manage Systems Key Benefits New in Version 7.0 • Implement secure operating environments • Distribute and enforce patch levels • Automate processes to streamline efficiency • Monitor and report on system status • New comprehensive suite that brings together all Altiris components • Automated end to end Windows 7 migration process • Intelligent software management providing complete visibility • Process automation of complex, time-consuming IT tasks Targeted Attacks on Intellectual Property

  18. Protect the Infrastructure • Improved Visibility into Security & Operations • Stronger Protection • Accelerated Remediation • Containment of Security Expenses Key Benefits What’s New • Symantec Protection Center: • Next generation security management solution • Simplifies management & improves security posture • Symantec Protection Suites: • Three new suites designed to meet the needs of enterprise IT personnel in endpoint, gateway and server functions Targeted Attacks on Intellectual Property

  19. Targeted Attacks on Intellectual Property

More Related