SlideShare una empresa de Scribd logo
1 de 28
Descargar para leer sin conexión
Symantec Envisions Future Clouds as
Safe Clouds

Cloud Expo: November 5, 2012
What’s News?

 Symantec Envisions         Many clouds, many architectures
  Future Clouds as          Safe clouds that are secure, available & compliant
    Safe Clouds             Cloud computing become the new norm
                            Future Clouds are Safe Clouds with Symantec

                          Consume Clouds: SEP Small Biz Edition 2013
Symantec Solutions for    Build Clouds: Protection for Cloud Service Providers
    Safe Clouds           Extend into Clouds: Symantec O3; Symantec
                           Fileshare Encryption


                          Cloud Security Essentials Training
Symantec Programs to      CloudSmart for Service Providers
 Realize Safe Clouds      ‘Safe Cloud Now’ Event Series


                                                                             2
                                                                                  2
Symantec’s Vision

From the device to the data
center to the cloud, from
identities to interactions…



                              Symantec protects
                                 people and
                                information.




                                                  3
Symantec’s Role

From the device to the data
center to the cloud, from
identities to interactions…   Secure               Available

                                   Symantec protects
                                       people and
                Recoverable
                                     information in
                                         clouds.

                               Agile               Affordable

                                                           4
Symantec’s Role

From the device to the data
center to the cloud, from
identities to interactions…   Secure               Available

                                   Symantec protects
                                       people and
                                       Safe Clouds
                Recoverable
                                     information in
                                         clouds.

                               Agile               Affordable

                                                           5
Future of the Cloud



                      6
In the future, clouds will be ubiquitous




  Connected and
                                   Safe
    collected




              The digital native          Cloud-first becomes
                  grows up                     a reality

                                                            7
Future cloud characteristics

      Category      2.0         Cloud 2.0             3.0         Cloud 3.0
Era                            2007 - 2012                       2013 - 2018
Focus                        Experimentation;           Productivity and collaboration
                           Software as a service
Security &            Security and availability are   Security and availability expected,
Availability          afterthoughts and inhibitors        built into the foundation
Scope                           One cloud                        Many clouds
IT Role                          Reactive                      Proactive driver
Visibility                    Limited, closed                   Granular, open
App functionality            Separate, isolate        Seamless, integrated; across clouds
                                                          & across on-prem to cloud
Endpoints                   Desktops, laptops           Phones, tablets, cloud of things
SLA                         Uneven, inflexible                 Granular, flexible
How Built                 Traditional architecture               Cloud native
                              hosted off site

                                                                                            8
How IT Gets There



                    9
Not one cloud – but many, many clouds


  Community                       Virtual Private
    Clouds                            Clouds
                         Public
                         Clouds
    Clouds that                               Clouds that are
                                                       Hybrid
   you consume,
           Private                             built on many
                                                       Clouds
           Clouds
   build, extend                               architectures
                     The Cloud                  PaaS
                     of Things
            IaaS     A proliferation of
                     clouds: thousands
                              Personal
                         of clouds
                               Clouds                  New Types
     SaaS                                              of Clouds


                                                                   10
Consistent protection across all future clouds




                                                 11
Safe clouds start with policy



                                           PROTECT
                                           POLICY

                                • Understand the value of
                                  information
                                • Incorporate legal and regulatory
                                  constraints
                                • Establish GRC for clouds




                                                                     12
Not one cloud – but many, many clouds




                                   • Mechanisms to act or enforce
                                     the policies
                                   • Encrypt, backup & archive
                                     information
                                   • Identify and prevent data loss
                                     activities


                                              PROTECT
                                              INFORMATION




                                                                      13
Safe clouds must protect people




 • Mechanisms to ensure that
   the users or consumers of cloud
   services are safe
 • Authenticate, protect
   transactions and identities



           PROTECT
            PEOPLE




                                     14
Safe clouds must protect infrastructure



       PROTECT
INFRASTRUCTURE


 • Mechanisms to ensure the
   underlying hardware and
   software is safe and available




                                          15
Safe cloud success drivers



       PROTECT               PROTECT
INFRASTRUCTURE               POLICY




      PROTECT                PROTECT
       PEOPLE                INFORMATION




                                           16
What’s News?

 Symantec Envisions         Many clouds, many architectures
   Future Clouds,           Safe clouds that are secure, available & compliant
    Safe Clouds             Cloud computing become the new norm
                            Future Clouds are Safe Clouds with Symantec

                          Consume Clouds: SEP Small Biz Edition 2013
Symantec Solutions for    Build Clouds: Protection for Cloud Service Providers
    Safe Clouds           Extend into Clouds: Symantec O3; Symantec
                           Fileshare Encryption


                          Cloud Security Essentials Training
Symantec Programs to      CloudSmart for Service Providers
 Realize Safe Clouds      ‘Safe Cloud Now’ Event Series


                                                                             17
                                                                                  17
Adoption Models for Safe Clouds

       CONSUME                          BUILD                           EXTEND
      Cloud Services               Cloud Services                  IT into the Cloud




    Simplify IT with              Deliver Secure,                  Leverage Other
    Hosted Services                Resilient and                  Clouds Safely and
                                 Compliant Clouds                     Efficiently
                               A DVA N TAG ES
   Avoid complexity            Complete control & visibility    Cross - platform support
   Pay as you go               Use existing infrastructure       physical + virtual + cloud
   Scale and grow on demand    Realize cloud benefits of        Integration with existing IT
                                 agility




                                                                                                  18
Extend Safely into the Cloud

                 Symantec O3 – the New Cloud Control Point
                 Symantec File Share Encryption NEW        POWERED BY PGP
                                                             TECHNOLOGY




         Empower Enterprises to:
          Gain data visibility and control
          Secure Shadow IT
          Ensure consistent cloud compliance
          Back up and archive to external storage clouds




                                                                        19
Symantec O3 – The New Cloud Security Control Point




    One Login with
  Strong Credentials
                       Identity-based
                       Access Control
                                                  O3       Application
                                                       Visibility and Audit
                                                                              Information
                                                                               Protection



                                        Private
                                         Cloud




                                                                                            20
Symantec Encryption Across Clouds & Mobile

                        Symantec File Share Encryption,
                         Powered by PGP Technology
Protects confidential data
   and sets user access                         Access encrypted data on
  policies on file sharing                       iPhone and iPad while
    services, Dropbox                            keeping info protected




  Mobile email encryption
   for iOS and Android
       (viewer only)          Symantec O3

                                                                           21
Encrypt Information for Advanced Protection

                Secure Information in the Clouds
                   Rampant use of Cloud data storage
Protect,           Encrypt data before syncing to Cloud apps and storage
Control, and       Access encrypted Cloud data with iOS devices
Access          Protect and Control Mobile Data
Confidential     Highly mobile workforce accessing hosted email services
                 Send & receive secure emails on iOS devices
Information      Viewer for Android devices
in Safe
Clouds          Strong Compliance: DLP & Encryption
                 Information explosion creates new data challenges
                 Automated remediation
                 One stop compliance reporting




                                                                            22
BUILD Efficient and Available Protected Clouds

                                Cloud Protection for Service Providers                 NEW
                                    Comprehensive protection (formerly Scan Engine)

                                Resilient Clouds with Veritas Cluster Server,
                                Veritas Operations Manager, Virtual Business
                                Services

                                Deliver Secure, Resilient and Compliant Clouds
                                   Maximize private and public clouds
                                   Information protection and control
                                   Secure and compliant virtual environments
                                   Leverage existing infrastructure/investments
                                   Build on-demand private storage clouds
                                   Business agility, scalability and cost efficiencies

Symantec Cloud - PR Solutions                                                                23
Consume Cloud Services

               Symantec.Cloud Services
                   14 SaaS solutions
                   Email, Web and IM security, archiving and continuity

               Symantec Endpoint Protection                                NEW
               Small Business Edition 2013
                   Cloud-managed protection service with
                    on-premise management


               Cloud-Powered Protection and Backup
                  Outsource infrastructure, no IT build-outs
                  Simple, easy management
                  Improved cost efficiencies
                  Scale for growth
                  Market agility

                                                                                 24
What’s News?

 Symantec Envisions         Many clouds, many architectures
   Future Clouds,           Safe clouds that are secure, available & compliant
    Safe Clouds             Cloud computing become the new norm
                            Future Clouds are Safe Clouds with Symantec

                          Consume Clouds: SEP Small Biz Edition 2013
Symantec Solutions for    Build Clouds: Protection for Cloud Service Providers
    Safe Clouds           Extend into Clouds: Symantec O3; Symantec
                           Fileshare Encryption


                          Cloud Security Essentials Training
Symantec Programs to      CloudSmart for Service Providers
 Realize Safe Clouds      ‘Safe Cloud Now’ Event Series


                                                                             25
                                                                                  25
Symantec Delivers Programs to Realize Safe Clouds

                Symantec Cloud Security Essentials
                 3-Day interactive and comprehensive training
                 Based on CSA guidelines for accreditation

                Symantec CloudSmart for Service Providers
                 Interactive cloud sales and services training
                 Sell, Manage, Host business models

                ‘Safe Cloud Now’ Series
                 Educational events, seminars, and webinars
                 Kicks off with Cloud Expo, CSA Congress, Vision Barcelona

                State of Cloud Survey
                 Coming January 2013




                                                                              26
What’s News?

 Symantec Envisions         Many clouds, many architectures
   Future Clouds,           Safe clouds that are secure, available & compliant
    Safe Clouds             Cloud computing become the new norm
                            Future Clouds are Safe Clouds with Symantec

                          Consume Clouds: SEP Small Biz Edition 2013
Symantec Solutions for    Build Clouds: Protection for Cloud Service Providers
    Safe Clouds           Extend into Clouds: Symantec O3; Symantec
                           Fileshare Encryption


                          Cloud Security Essentials Training
Symantec Programs to      CloudSmart for Service Providers
 Realize Safe Clouds      ‘Safe Cloud Now’ Event Series


                                                                             27
                                                                                  27
Thank you!
Dave Elliott
dave_elliott@symantec.com
+1.858.775.6721


Copyright © 2012 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec
Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


                                                                                                                                                                                        28

Más contenido relacionado

Más de Symantec

Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantSymantec
 
Symantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec
 

Más de Symantec (20)

Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators Want
 
Symantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 Webinar
 

Último

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Último (20)

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

Symantec Envisions Future Clouds As Safe Clouds November 2012

  • 1. Symantec Envisions Future Clouds as Safe Clouds Cloud Expo: November 5, 2012
  • 2. What’s News? Symantec Envisions  Many clouds, many architectures Future Clouds as  Safe clouds that are secure, available & compliant Safe Clouds  Cloud computing become the new norm  Future Clouds are Safe Clouds with Symantec  Consume Clouds: SEP Small Biz Edition 2013 Symantec Solutions for  Build Clouds: Protection for Cloud Service Providers Safe Clouds  Extend into Clouds: Symantec O3; Symantec Fileshare Encryption  Cloud Security Essentials Training Symantec Programs to  CloudSmart for Service Providers Realize Safe Clouds  ‘Safe Cloud Now’ Event Series 2 2
  • 3. Symantec’s Vision From the device to the data center to the cloud, from identities to interactions… Symantec protects people and information. 3
  • 4. Symantec’s Role From the device to the data center to the cloud, from identities to interactions… Secure Available Symantec protects people and Recoverable information in clouds. Agile Affordable 4
  • 5. Symantec’s Role From the device to the data center to the cloud, from identities to interactions… Secure Available Symantec protects people and Safe Clouds Recoverable information in clouds. Agile Affordable 5
  • 6. Future of the Cloud 6
  • 7. In the future, clouds will be ubiquitous Connected and Safe collected The digital native Cloud-first becomes grows up a reality 7
  • 8. Future cloud characteristics Category 2.0 Cloud 2.0 3.0 Cloud 3.0 Era 2007 - 2012 2013 - 2018 Focus Experimentation; Productivity and collaboration Software as a service Security & Security and availability are Security and availability expected, Availability afterthoughts and inhibitors built into the foundation Scope One cloud Many clouds IT Role Reactive Proactive driver Visibility Limited, closed Granular, open App functionality Separate, isolate Seamless, integrated; across clouds & across on-prem to cloud Endpoints Desktops, laptops Phones, tablets, cloud of things SLA Uneven, inflexible Granular, flexible How Built Traditional architecture Cloud native hosted off site 8
  • 9. How IT Gets There 9
  • 10. Not one cloud – but many, many clouds Community Virtual Private Clouds Clouds Public Clouds Clouds that Clouds that are Hybrid you consume, Private built on many Clouds Clouds build, extend architectures The Cloud PaaS of Things IaaS A proliferation of clouds: thousands Personal of clouds Clouds New Types SaaS of Clouds 10
  • 11. Consistent protection across all future clouds 11
  • 12. Safe clouds start with policy PROTECT POLICY • Understand the value of information • Incorporate legal and regulatory constraints • Establish GRC for clouds 12
  • 13. Not one cloud – but many, many clouds • Mechanisms to act or enforce the policies • Encrypt, backup & archive information • Identify and prevent data loss activities PROTECT INFORMATION 13
  • 14. Safe clouds must protect people • Mechanisms to ensure that the users or consumers of cloud services are safe • Authenticate, protect transactions and identities PROTECT PEOPLE 14
  • 15. Safe clouds must protect infrastructure PROTECT INFRASTRUCTURE • Mechanisms to ensure the underlying hardware and software is safe and available 15
  • 16. Safe cloud success drivers PROTECT PROTECT INFRASTRUCTURE POLICY PROTECT PROTECT PEOPLE INFORMATION 16
  • 17. What’s News? Symantec Envisions  Many clouds, many architectures Future Clouds,  Safe clouds that are secure, available & compliant Safe Clouds  Cloud computing become the new norm  Future Clouds are Safe Clouds with Symantec  Consume Clouds: SEP Small Biz Edition 2013 Symantec Solutions for  Build Clouds: Protection for Cloud Service Providers Safe Clouds  Extend into Clouds: Symantec O3; Symantec Fileshare Encryption  Cloud Security Essentials Training Symantec Programs to  CloudSmart for Service Providers Realize Safe Clouds  ‘Safe Cloud Now’ Event Series 17 17
  • 18. Adoption Models for Safe Clouds CONSUME BUILD EXTEND Cloud Services Cloud Services IT into the Cloud Simplify IT with Deliver Secure, Leverage Other Hosted Services Resilient and Clouds Safely and Compliant Clouds Efficiently A DVA N TAG ES  Avoid complexity  Complete control & visibility  Cross - platform support  Pay as you go  Use existing infrastructure physical + virtual + cloud  Scale and grow on demand  Realize cloud benefits of  Integration with existing IT agility 18
  • 19. Extend Safely into the Cloud  Symantec O3 – the New Cloud Control Point  Symantec File Share Encryption NEW POWERED BY PGP TECHNOLOGY Empower Enterprises to:  Gain data visibility and control  Secure Shadow IT  Ensure consistent cloud compliance  Back up and archive to external storage clouds 19
  • 20. Symantec O3 – The New Cloud Security Control Point One Login with Strong Credentials Identity-based Access Control O3 Application Visibility and Audit Information Protection Private Cloud 20
  • 21. Symantec Encryption Across Clouds & Mobile Symantec File Share Encryption, Powered by PGP Technology Protects confidential data and sets user access Access encrypted data on policies on file sharing iPhone and iPad while services, Dropbox keeping info protected Mobile email encryption for iOS and Android (viewer only) Symantec O3 21
  • 22. Encrypt Information for Advanced Protection Secure Information in the Clouds  Rampant use of Cloud data storage Protect,  Encrypt data before syncing to Cloud apps and storage Control, and  Access encrypted Cloud data with iOS devices Access Protect and Control Mobile Data Confidential  Highly mobile workforce accessing hosted email services  Send & receive secure emails on iOS devices Information  Viewer for Android devices in Safe Clouds Strong Compliance: DLP & Encryption  Information explosion creates new data challenges  Automated remediation  One stop compliance reporting 22
  • 23. BUILD Efficient and Available Protected Clouds Cloud Protection for Service Providers NEW  Comprehensive protection (formerly Scan Engine) Resilient Clouds with Veritas Cluster Server, Veritas Operations Manager, Virtual Business Services Deliver Secure, Resilient and Compliant Clouds  Maximize private and public clouds  Information protection and control  Secure and compliant virtual environments  Leverage existing infrastructure/investments  Build on-demand private storage clouds  Business agility, scalability and cost efficiencies Symantec Cloud - PR Solutions 23
  • 24. Consume Cloud Services Symantec.Cloud Services  14 SaaS solutions  Email, Web and IM security, archiving and continuity Symantec Endpoint Protection NEW Small Business Edition 2013  Cloud-managed protection service with on-premise management Cloud-Powered Protection and Backup  Outsource infrastructure, no IT build-outs  Simple, easy management  Improved cost efficiencies  Scale for growth  Market agility 24
  • 25. What’s News? Symantec Envisions  Many clouds, many architectures Future Clouds,  Safe clouds that are secure, available & compliant Safe Clouds  Cloud computing become the new norm  Future Clouds are Safe Clouds with Symantec  Consume Clouds: SEP Small Biz Edition 2013 Symantec Solutions for  Build Clouds: Protection for Cloud Service Providers Safe Clouds  Extend into Clouds: Symantec O3; Symantec Fileshare Encryption  Cloud Security Essentials Training Symantec Programs to  CloudSmart for Service Providers Realize Safe Clouds  ‘Safe Cloud Now’ Event Series 25 25
  • 26. Symantec Delivers Programs to Realize Safe Clouds Symantec Cloud Security Essentials  3-Day interactive and comprehensive training  Based on CSA guidelines for accreditation Symantec CloudSmart for Service Providers  Interactive cloud sales and services training  Sell, Manage, Host business models ‘Safe Cloud Now’ Series  Educational events, seminars, and webinars  Kicks off with Cloud Expo, CSA Congress, Vision Barcelona State of Cloud Survey  Coming January 2013 26
  • 27. What’s News? Symantec Envisions  Many clouds, many architectures Future Clouds,  Safe clouds that are secure, available & compliant Safe Clouds  Cloud computing become the new norm  Future Clouds are Safe Clouds with Symantec  Consume Clouds: SEP Small Biz Edition 2013 Symantec Solutions for  Build Clouds: Protection for Cloud Service Providers Safe Clouds  Extend into Clouds: Symantec O3; Symantec Fileshare Encryption  Cloud Security Essentials Training Symantec Programs to  CloudSmart for Service Providers Realize Safe Clouds  ‘Safe Cloud Now’ Event Series 27 27
  • 28. Thank you! Dave Elliott dave_elliott@symantec.com +1.858.775.6721 Copyright © 2012 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 28