the new frontiers in information security
DESCRIPTION
With New Dimensions getting Introduced @ Work every year this Presentation to Top CIO's in India showcases changing trends in Information Security Trend 1 – Keeping the Bad Guys Out Trend 2 – Letting the Good Guys In Trend 3 – Keeping Good things InTRANSCRIPT
![Page 1: The New frontiers in Information Security](https://reader034.vdocuments.mx/reader034/viewer/2022052623/559a0b351a28ab0b6b8b45df/html5/thumbnails/1.jpg)
Wipro Leading Edge - 2010 •1
Vineet SoodDirector Channels & Alliances
New Frontiers in Security
![Page 2: The New frontiers in Information Security](https://reader034.vdocuments.mx/reader034/viewer/2022052623/559a0b351a28ab0b6b8b45df/html5/thumbnails/2.jpg)
2
More information in more
places, accessed from more
points, than ever before
Symantec Enterprise Vision and Strategy
![Page 3: The New frontiers in Information Security](https://reader034.vdocuments.mx/reader034/viewer/2022052623/559a0b351a28ab0b6b8b45df/html5/thumbnails/3.jpg)
Protecting the Infrastructure
Trend 1 – Keeping the Bad Guys Out
![Page 4: The New frontiers in Information Security](https://reader034.vdocuments.mx/reader034/viewer/2022052623/559a0b351a28ab0b6b8b45df/html5/thumbnails/4.jpg)
Trend 1 – Keeping the Bad Guys Out
• Bermuda Triangle - FW + IDS + AV
• Protection = Prevention + Detection
– End of Road for IDS
– Emergence of IPS
• Insider Threat Emerged
– Host Protection
– Assesment tools/Sniffers
![Page 5: The New frontiers in Information Security](https://reader034.vdocuments.mx/reader034/viewer/2022052623/559a0b351a28ab0b6b8b45df/html5/thumbnails/5.jpg)
Trend 1 – Keeping the Bad Guys Out
![Page 6: The New frontiers in Information Security](https://reader034.vdocuments.mx/reader034/viewer/2022052623/559a0b351a28ab0b6b8b45df/html5/thumbnails/6.jpg)
Trend 2 – Letting the Good Guys In
Business is Changing; Security Must
Enabling Secure Business Access
![Page 7: The New frontiers in Information Security](https://reader034.vdocuments.mx/reader034/viewer/2022052623/559a0b351a28ab0b6b8b45df/html5/thumbnails/7.jpg)
Trend 2 – Letting the Good Guys In
• Boundaryless Org - Thinning of PERIMETER
– Each End pt becomes a Gateway
– Work from Anywhere/Anytime (2 of the 3 Any’s)
• Integration of Technology
– Evolution of UTM’s & End Point Suites
– Genesis of NAC & Secure Access
• Security/Incident Monitoring
– Protection = Prevention + Detection + Response
– Closed Loop? Still a Dream
![Page 8: The New frontiers in Information Security](https://reader034.vdocuments.mx/reader034/viewer/2022052623/559a0b351a28ab0b6b8b45df/html5/thumbnails/8.jpg)
Trend 3 – Keeping Good things In
Protecting Information
![Page 9: The New frontiers in Information Security](https://reader034.vdocuments.mx/reader034/viewer/2022052623/559a0b351a28ab0b6b8b45df/html5/thumbnails/9.jpg)
Trend 3 – Keeping Good things In
• Data Loss Prevention
– Network, Storage & End Point
• Regulatory Compliance
– Technical Controls
• Ability to recover things
– Back up & HA
• Identity Mgmt Back in Vogue
![Page 10: The New frontiers in Information Security](https://reader034.vdocuments.mx/reader034/viewer/2022052623/559a0b351a28ab0b6b8b45df/html5/thumbnails/10.jpg)
Trend 4 – Security Industry Grows up
Mergers & Acquisitions Hot-Up
![Page 11: The New frontiers in Information Security](https://reader034.vdocuments.mx/reader034/viewer/2022052623/559a0b351a28ab0b6b8b45df/html5/thumbnails/11.jpg)
Trend 4 – Security Industry Grows up
• Acquisitions Galore in Past 2 to 3 yrs
– Macfee, RSA, Archsight, Cogent, IronPort, Big Fix, Tricipher, Fortify, Arcot
– Verisign, PGP + GE, Msg Labs, Vontu, BrightMail, Mi5
• All Major Players in Security Bandwagon
– Symantec, IBM, HP, Cisco, MS, Intel, Google
• Soc + NoC Consolidation
– Back up & HA
![Page 12: The New frontiers in Information Security](https://reader034.vdocuments.mx/reader034/viewer/2022052623/559a0b351a28ab0b6b8b45df/html5/thumbnails/12.jpg)
It’s a ON-DEMAND World
I want to work the way I want
to work
Staff work can be done by 3rd party
I want to share INFO who are you
to say I can’t
New Dimensions @ Work
![Page 13: The New frontiers in Information Security](https://reader034.vdocuments.mx/reader034/viewer/2022052623/559a0b351a28ab0b6b8b45df/html5/thumbnails/13.jpg)
Key IT Trends of Future
Consumerisation of IT
IT-ization of the Consumer
Mobile
Social
Virtual & Cloud
![Page 14: The New frontiers in Information Security](https://reader034.vdocuments.mx/reader034/viewer/2022052623/559a0b351a28ab0b6b8b45df/html5/thumbnails/14.jpg)
Mobility
![Page 15: The New frontiers in Information Security](https://reader034.vdocuments.mx/reader034/viewer/2022052623/559a0b351a28ab0b6b8b45df/html5/thumbnails/15.jpg)
By 2011 1 billion mobile devices will access internet
![Page 16: The New frontiers in Information Security](https://reader034.vdocuments.mx/reader034/viewer/2022052623/559a0b351a28ab0b6b8b45df/html5/thumbnails/16.jpg)
Sophisticated Attackers
On July 13 2010 a unique form of malware was discovered that was
attempting to take control of industrial infrastructure around the world
![Page 17: The New frontiers in Information Security](https://reader034.vdocuments.mx/reader034/viewer/2022052623/559a0b351a28ab0b6b8b45df/html5/thumbnails/17.jpg)
We Protected PCs & Macs for years now
SMART Devices are now connecting to the Internet to offer new features
They will require same security, ability to update, remote support.
![Page 18: The New frontiers in Information Security](https://reader034.vdocuments.mx/reader034/viewer/2022052623/559a0b351a28ab0b6b8b45df/html5/thumbnails/18.jpg)
Inferences for the Future
Everything Revolves Around People and Information
Business and Personal Digital Personae Have Merged
Simple and Secure Access To Information Is Expected
The Enterprise Is More Scalable and Cost Effective
![Page 19: The New frontiers in Information Security](https://reader034.vdocuments.mx/reader034/viewer/2022052623/559a0b351a28ab0b6b8b45df/html5/thumbnails/19.jpg)
New Frontiers of Security in Future
![Page 20: The New frontiers in Information Security](https://reader034.vdocuments.mx/reader034/viewer/2022052623/559a0b351a28ab0b6b8b45df/html5/thumbnails/20.jpg)
Everything Revolves Around People and Information
Confidential - Internal Only
CONFIDENCE
People Information
Identity Protection Context
![Page 21: The New frontiers in Information Security](https://reader034.vdocuments.mx/reader034/viewer/2022052623/559a0b351a28ab0b6b8b45df/html5/thumbnails/21.jpg)
Building the Human Firewall
![Page 22: The New frontiers in Information Security](https://reader034.vdocuments.mx/reader034/viewer/2022052623/559a0b351a28ab0b6b8b45df/html5/thumbnails/22.jpg)
Thank you!
Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
•22
Thursday, December 2, 2010
| Renaissance Mumbaiwww.symantec.com/in/vision2010