22
Presentation Identifier Goes Here 1 Using Cloud-Based Services to Secure and Manage your Information John Abrena Director, Cloud Services - En Pointe Technologies

Cloud computing security john abrena - chicago tour

Embed Size (px)

DESCRIPTION

Small Business Technology Tour 2011 - http://techtour2011chicago.eventbrite.com/

Citation preview

Page 1: Cloud computing security    john abrena - chicago tour

Presentation Identifier Goes Here 1

Using Cloud-Based Services to Secure and Manage your Information

John AbrenaDirector, Cloud Services - En Pointe Technologies

Page 2: Cloud computing security    john abrena - chicago tour

Risk = Uncertainty that Matters

Page 3: Cloud computing security    john abrena - chicago tour

My Security Syllogism

Information has value

We protect things of value

Therefore:We must protect information

Page 4: Cloud computing security    john abrena - chicago tour

NAME

Social Security NumberDrivers License Number

Credit Card Number

Here is Proof

Page 5: Cloud computing security    john abrena - chicago tour

Security vs. Privacy

PRIVACYWHAT (WHY) information needs to be

protected

SECURITYHOW to protect information

Page 6: Cloud computing security    john abrena - chicago tour

Bill Boni

CISO, Motorola

“Understand the business,

understand what makes it

successful, identify the

factors that can put that

success at risk, and then

find ways of managing that

risk through technical,

operational or procedural

safeguards”

Page 7: Cloud computing security    john abrena - chicago tour

The Changing Threat Landscape

Data Breaches

Page 8: Cloud computing security    john abrena - chicago tour

Global Intelligence NetworkIdentifies more threats, takes action faster & minimizes impact

Information ProtectionPreemptive Security Alerts Threat Triggered Actions

Global Scope and ScaleWorldwide Coverage 24x7 Event Logging

Rapid Detection

Attack Activity• 240,000

sensors• 200+ countries

Malware Intelligence• 130M client, server,

gateways monitored• Global coverage

Vulnerabilities• 32,000+ vulnerabilities

• 11,000 vendors• 72,000 technologies

Spam/Phishing• 2.5M decoy accounts

• 8B+ email messages/day• 1B+ web requests/day

Calgary, Alberta

Culver City, CAMountain View, CA Austin, TX

Alexandria, VA

Reading, EnglandDublin, Ireland

Chengdu, ChinaTokyo, Japan

Sydney, AU

Chennai, India

Pune, India

Taipei, Taiwan

San Francisco, CA

Page 9: Cloud computing security    john abrena - chicago tour

• Attackers are increasingly targeting end users by compromising high-traffic, trusted websites.

• Attackers are moving their operations to regions with emerging Internet infrastructures and, in some

instances, developing and maintaining their own service provisioning.

• Cross-functional industry cooperation in the security community is becoming imperative.

Internet Security Threat Report XIVOverarching Themes

Page 10: Cloud computing security    john abrena - chicago tour

Data Breaches Identities Exposed

Internet Security Threat Report XIVData Breach Trends

Page 11: Cloud computing security    john abrena - chicago tour

Threat Agents

Malicious Insiders

Hackers and Cyber-Criminals

Well-meaning Insiders

Page 12: Cloud computing security    john abrena - chicago tour

Presentation Identifier Goes Here 12

How we can help…….

Page 13: Cloud computing security    john abrena - chicago tour

Simplify IT with Symantec’s Cloud-Based Solutions

Symantec & The Cloud

Consume Build Extend

Page 14: Cloud computing security    john abrena - chicago tour

Simplify IT with Symantec’s Cloud-Based Solutions 14

Consuming Public Clouds

Services availableto the general public

Virtual private and community cloud services

Services provided by a single entity for that entity

Greater financial and technical leverage:scale, but also risk

Greater ownership and control:both financial and technical

Private

Hybrid

Community

Public

Leverage

Cont

rol

Low HighLow

High

Page 15: Cloud computing security    john abrena - chicago tour

Simplify IT with Symantec’s Cloud-Based Solutions

Cloud Computing – Public Clouds

15

Outcome/Value

Process

Software

Platform

Infrastructure

SaaS

Page 16: Cloud computing security    john abrena - chicago tour

Simplify IT with Symantec’s Cloud-Based Solutions 16

Easy to scale

Easy to deploy

Pay as you go$

Easy to use

No hardware or software

Automatic updates

Benefits for Consuming Cloud Services

Page 17: Cloud computing security    john abrena - chicago tour

Symantec Solutions

17

Protocol Security • Email Security.cloud• Web Security.cloud• IM Security.cloud

Endpoint Security • Endpoint Security.cloud

Information Availability

• Enterprise Vault.cloud• Email Continuity• Backup Exec.cloud

Authentication• VeriSign Identity

Protection

Security Incident & Event Management

• Managed Security Service

ConsumeCloud Service

Simplify IT with Symantec’s Cloud-Based Solutions

Page 18: Cloud computing security    john abrena - chicago tour

Simplify IT with Symantec’s Cloud-Based Solutions

Easy to scale

Easy to deploy

Pay as you go$

Pre-integrated apps

No hardware or software

Automatic updates

18

100% protection against both known & unknown viruses

24/7 customer support

Industry leading SLAs

Easy to use

Page 19: Cloud computing security    john abrena - chicago tour

19

11.0

million

security services users

55

thousandsecurity services clients

11years

Providing services in the cloud

100countries

+

Simplify IT with Symantec’s Cloud-Based Solutions

Page 20: Cloud computing security    john abrena - chicago tour

Final Thoughts on the Importance of Security• “Security” is essential to facilitate and preserve “privacy”

• There are numerous ethical issues that must be addressed as we continue to evolve our information society. Some that transcend technology and some that are manifest as a result of technology

Presentation Identifier Goes Here 20

Page 21: Cloud computing security    john abrena - chicago tour

Simplify IT with Symantec’s Cloud-Based Solutions 21

Closing Thoughts

Cloud services can reduce the growing complexity of IT

SaaS is an easy way to start taking advantage of the cloud

Symantec’s portfolio of services can assist your SaaS strategy

SaaS is simple, and easy to test

Page 22: Cloud computing security    john abrena - chicago tour

Thank you!

Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

22

John AbrenaDirector, Cloud ServicesEn Pointe Technologies (www.enpointe.com)[email protected]