the changing face of endpoint security k varadarajan regional manager, enterprise sales, symantec...

13
The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore

Post on 15-Jan-2016

220 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore

The Changing Face of Endpoint Security

K VaradarajanRegional Manager, Enterprise Sales, Symantec

Security Conference 2010_Bangalore

Page 2: The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore

IT Security Landscape TodayMarket Economy for Data

Attack Sophistication

Shift from Hacking to Theft

Threat Volume

• More unique / targeted attacks

• Sites per virus dramatic decline

• Enter / spread through multiple vectors

• Endpoint, email, web, misleading applications

• Morphing faster than ever

• E.g. command and control

• More unique / targeted attacks

• Sites per virus dramatic decline

• Enter / spread through multiple vectors

• Endpoint, email, web, misleading applications

• Morphing faster than ever

• E.g. command and control

In 2000

5signatures a day

In 2010

25,000signatures a day

Computers People

2Security Conference 2010_Bangalore

Page 3: The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore

Endpoints Are Constantly Under Attack

3Security Conference 2010_Bangalore

Page 4: The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore

Non-traditional Endpoints

Even As They Continue to Evolve

4

Traditional Endpoints

IT Infrastructure

V

Security Conference 2010_Bangalore

Page 5: The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore

Non-traditional Endpoints

Even As They Continue to Evolve

5

Traditional Endpoints

IT Infrastructure

V

Security Conference 2010_Bangalore

Page 6: The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore

Non-traditional Endpoints

Even As They Continue to Evolve

6

Traditional Endpoints

IT Infrastructure

V

Security Conference 2010_Bangalore

Page 7: The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore

Consumerization of IT

• Indian enterprises are encouraging employees to access, modify and disseminate information

• Information often stored on the cloud or in the employees own devices

• 59 percent of Indian enterprises believe that employee-owned endpoints compromise security

77

73

54

51

Windows-…

Smartphones

PDAs

Mac-based …Growth of mobile devices

Source: Symantec Enterprise Security Survey 2009. All figures are in %77Security Conference 2010_Bangalore

Page 8: The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore

Secure & Manage All Your Endpoints

8

ControlInformation

RISKS

ReduceInformation

COSTS

Security Conference 2010_Bangalore

Page 9: The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore

11Keep The Bad

Things OutLet the Good

Guys On

22Keep The Good

Things In

33

Cell PhoneCell Phone LaptopLaptop DesktopDesktop File ServerFile Server Application ServerApplication Server Messaging ServerMessaging Server Database ServerDatabase Server

Symantec Confidential

Unified Agent

Unified Management

Endpoint Security Strategy

9

Page 10: The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore

Enterprise Infrastructure

Centralized Control Actionable Information Operational EfficiencyPolicy Management End-to-end Visibility Process Automation

GatewayServersEndpoints

Network Access Control

Messaging Data Loss Prevention

Robust Mail Security

Multi-platform Support

Audit Compliance

Advanced Server Security

Inventory & Patch Management

Data Loss Prevention

Complete Endpoint Protection

10

Elements of Protection

Security Conference 2010_Bangalore

Page 11: The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore

Elements of Endpoint Compliance

Antivirus

Antispyware

Firewall

IntrusionPrevention

Device and Application Control

Network AccessControl

11Security Conference 2010_Bangalore

Page 12: The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore

12

Low Hanging Fruit Approach…

Security Conference 2010_Bangalore 12

Page 13: The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore

Thank you!

Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

[email protected]

13Security Conference 2010_Bangalore