210 likes | 222 Views
Learn how Symantec ensures information integrity with security, storage, and availability products. Protect your data and adapt to business needs to reduce risk, complexity, and comply with regulations.
E N D
The NEW Symantec • VERITAS merger completed July 2, 2005 • Safeguarding information from the desktop to the data center • Serving a full spectrum of customers: • Consumers • Small Businesses • Mid-size Businesses • Enterprise and Government • A full menu of security, storage, availability and performance products • Global network of partners • Global service and support Symantec Worldwide
Information is the Currency of Business • The pace of business change is quickening • Your business depends on information to grow • To create value information must be made secure and available
When Information is at Risk, Consequences are Real Security Availability
COST COMPLEXITY • Flat IT Budgets • Increasing Storage Requirements • Business Applications and Processes Support • Infrastructure Consolidation • Multiple Vendor Dependencies • Heterogeneity • Increased Connectivity Demands COMPLIANCE AND RISK MANAGEMENT • Security Vulnerabilities • System and Application Failures • Site-wide Outage/Natural Disasters • E-commerce Laws in 40+ Countries • ISO 17799, Basil II, Sarbanes Oxley • FISMA, HIPAA, NERC The Challenges You Face are Clear
The Requirement: A Flexible and Rigid Foundation That Protects Information From Risk Information Infrastructure Must: • Be agile based on changing business needs and threats • Deliver maximum value from your IT technology, people and processes • Enable ongoing demonstration of compliance • Ensure information is both secure and available 24 X 7 no matter where it resides
Symantec: Trusted to Deliver Information Integrity • Proactively protect all layers of the infrastructure against security threats • Early warning of emerging threats • Monitor systems for compliance Information Security Information Integrity • Provision, optimize, monitor and remediate systems and storage to ensure uptime and maintain performance levels • Recover systems and data in the event of an outage Information Availability • Information is secure and available • Greater Efficiency • Less Complexity • Greater Compliance • Reduced Risk The result is greater resilience in your infrastructure
A Progressive Approach: Attaining Information Integrity • External and internal insight that drives faster, better decision-making • End-to-end integrated solutions that proactively protect and recover information and IT assets • An integrated approach that maximizes data and application availability, increases operating efficiency, and preserves business continuity • Unmatched Capabilities: • Unsurpassed product breadth and depth • Category and market leadership • OS and hardware vendor independence • Integrated services
Over 4,300 Managed Security Devices + 120 Million Symantec Systems Worldwide Dublin, Ireland Springfield, OR Waltham, MA San Francisco, CA Alexandria, VA Newport News, VA Global Intelligence Network Provides Early Warning 5 Symantec SOCs 61 Symantec Monitored Countries 20,000 Registered Sensors in 180 Countries 29 Worldwide Symantec Support Centers 6 Symantec Security Response Labs + + + + Tokyo, Japan Reading, England Boston, MA Roseville, MN Calgary, Canada Seoul, Korea Milan, Italy Or-Yehuda, Israel London, England Beijing, China Redwood City, CA Munich, Germany Madrid, Spain Taipei, Taiwan Mountain View, CA Paris, France Pune, India Singapore Santa Monica, CA Heathrow, FL Orem, UT/American Fork, UT Austin, TX Buenos Aires, Argentina Sydney, Australia
1 2 3 Integrated Information Integrity Solutions Email Security and Availability Business Continuity Regulatory Compliance 5
Email Security and Availability • Challenges • Email is the mission critical application for conducting business, a growing vulnerability for security and availability, and the document of record for business • Symantec Email Security and Availability Solution • Protect from email born threats • Manage the increasing cost of storage for email • Meet compliance and risk management requirements • Benefits • Reduce infrastructure costs • Improve service levels • Address critical policy needs Email has become the primary medium for how we communicate. The consequence is that email has become a de facto record repository. CIO Magazine, Jan 2005
Internet Symantec Provides a Holistic Solution Leading Email Security Leading Email Archiving Symantec Mail Security Software/Appliances/Hosted Enterprise Vault SMTP Traffic MTA Microsoft Exchange IBM Lotus Domino Leading Backup/Recovery Leading Storage Management Manage Email Lifecycle Email Management Keep Email Protected Keep Email Running Net Backup Backup Exec Storage Foundation HA
SMTP Traffic MTA Microsoft Exchange IBM Lotus Domino Internet Manage Email Lifecycle Email Management Keep Email Protected Keep Email Running Keep Email Information Secure and Available Risk and Data Reduction Records Discovery and Retrieval RecordsRetention Internal Email Protection Data Reduction Automatically capture, manage and retain email and other records based on business policies Monitor, search and retrieve archived content for compliance, legal discovery and other needs Stop viruses, spam, phishing attacks before reaching email stores, end-users Reduce volume of spam before it hits network and email infrastructure Scan internal and outbound traffic for viruses and unauthorized content Resilient Foundation Recover quickly through efficient backupReduce downtime via clusteringReplicate and geo-cluster for disaster recoveryManage storage for automated provisioning Spam Quarantine
Business Continuity Threats To IT Infrastructure • Human Error • Hacking, Phishing, Pharming • Application Failure • Database Corruption • Denial of Service Attacks • Fire, Flood, Hurricane • Equipment Failure • Disruption of Power or Communication • Malicious Software • Viruses, Worms, Trojan Horses • Strikes, Social Unrest • Sabotage, Terrorism • Challenges • Rediscovering the growing list of events creating business disruption, 59% of CIOs surveyed have budgeted increased spending for and focus for 2005/2006 on Business Continuity Initiatives* • Symantec Business Continuity Solution • Vulnerability Management • High Availability • Disaster Recovery • Benefits • Unparalleled security • Designed for heterogeneous environments • Built on industry leading technologies * Source: CIO Insight, 30 strategies for the year ahead, CIO Magazine March 2005 ZD publishing
Internet Get Ahead of the Problem: Integrated Security and Availability Planning Vulnerability Proactively Blocked, Application Failed Over Availability of Application, Systems, and Data Assured Vulnerability Identified and/or Infrastructure Instrumentation & Early Warnings Sent Mitigation Reports on attacks and outages; updates to policies and SLAs; archiving for audit Restoration Remediation Patches & Updates Implemented Across Infrastructure; Applications Recovered; Data Restored Identification of Systems to Patch, Points of Attack, Application Failures, Data Loss
Regulatory Compliance • Challenges • Associated time and cost of compliance initiatives • Lack of standardization • Complexity • Symantec Regulatory Compliance Solution • Implements IT controls for an automated and repeatable process • Enables retention and timely retrieval of regulated documents • Benefits • Automates testing • Standardizes on common methods • Addresses multiple compliance initiatives • Multi-division company’s audit and related fees increased 77% in 2004 due to de-centralized internal controls testing process (USA Today) • 75% of intellectual property is contained in e-mail (Gartner Research)
Implement IT Controls: Achieve Sustained Compliance Continuous Improvement Implement Changes Manage Plan Oversee • Implement and document new policies and processes • Tools and Services for ongoing management • Report • Audit • Assessments • Design Project Management Support
In the Future……… … an external threat alert will trigger an internal assessment…… … you will be able to proactively address performance issues (e.g. system failures, human errors, disasters, system vulnerabilities) … you will be able to consolidate and monitor performance slowdowns along with security alerts … and you will be able to automatically recover compromised systems
Symantec Leading the Way Technology Knowledge Trusted Advice Global Presence Rapid Incident Response Integrated Solutions Partnership