SlideShare a Scribd company logo
1 of 9
Download to read offline
Symantec Next Generation Network
     Protection



Symantec Next Generation Network Protection   1
Global Mobile Market                                                                                            iPad /
                                                                                                                           iPhone
                                                                                                                 2B iPhone    4
             1000                                                                                     iPhone 3G
                                                                                                                   Apps
                                                                                                                Downloaded
                                     Total Operator                                                     / Apple
                                                                                               iPhone App Store
              900                                                                                2G
                                     Revenue
              800
                                     Operator Data                                               Google Convinces FCC
              700                                                                                   to Open Access
                                     Revenue                                                      Network for 700MHz
              600                                                                                                       Android
$Billions




                                                                                                              First       2.1
                                                                                                Android     Android
              500                                                                             Open Source    Phone
                                                                                               OS Started
              400                            Blackberry                                             Blackberry Blackberry
                                                Email                                                Bold and    App World
              300                                                                                     Storm
                                  Japan 3G                  US 3G        Japan >                           US 4G
                                  Launched                Launched       50% 3G                          Launched
              200                                                                                                           HP
                       Windows                                                                                            Acquires
                        Mobile                                                                                             Palm
              100      Launched
                                                      Symbian
                                                                                                     Symbian Becomes
                                                     Launched
                                                                                                       Open Source
                 0
                        2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
                                        Revenue Data Source: Chetan Sharma Consulting, 2010
            Symantec Next Generation Network Protection                                                                              2
THREATS               NEEDS
 Mobile Ecosystem                                                      DEVICE THEFT

                                                                        DATA LOSS
                                                                                       Pswd Control & Wipe
                                                                                       Encryption
                                                                      MOBILE
                                                                      DEVICE            (Device/Email)
             MOBILE                                                    APP THREATS
                                                                                       Device/App Control
             DEVICES                                                   COMPLIANCE
                                                                                       Policy Delivery
                                                  Corporate Devices
                                                                                       Identity
                                   Personal Devices

                                                     3G-4G
                                                     Access


  THREATS                NEEDS
   MALWARE
                    Mobile Management
   DATA LOSS                                                                                               MOBILE
                    Email/Web Protection INTERNET
 ENTERPRISE                                                                                               CARRIER
DATA CENTER  Email Encrypt / DLP
  COMPLIANCE

                    Authentication

                                                                               THREATS               NEEDS
                                                                                 MISUSE        Quality of
                                                                                                Experience
                                                                             CARRIER /
                                                                               CAPACITY
                                                                             SERVICE           Hosted Mobile
                                                                               OUTAGES
                                                                                                Device/Service Mgt
                                                                             PROVIDER
                                                                                 BRAND         Fraud prevention
                                            DATA
                                           CENTER

 Symantec Next Generation Network Protection                                                                       3
Symantec’s Broad Mobile Strategy & Solutions
                                                   ENTERPRISE /              CARRIER /
       MOBILE DEVICE
                                                   DATA CENTER            SERVICE PROVIDER




                                                       v
         Cross Platform




 Mobile MGMT / Security                       Email Anti-Malware/SPAM       Mobile Security

     Mobile Encryption                         Data Loss Prevention     Email Anti-Malware/SPAM

  Two-Factor Auth (VIP)                          Email Encryption             Hosted PKI

     Device Certificates                      Endpoint Virtualization    Two-Factor Auth (VIP)

                                                 Key Management             Fraud Detection



Symantec Next Generation Network Protection                                                       4
How Symantec Can Help Now
A Complete Approach to Mobility Security and Management

               Consumers                           Enterprise             Communication
                                                                         Service Providers
       • Secure your mobile                   • Gain visibility and      • Improve your customer
         phone and keep your                    control of all mobile      user experience
         personal data safe                     platforms
                                                                         • Increase average
       • Remotely lock or wipe                • Embrace                    revenue per user
         your mobile device in                  consumerization            (ARPU)
         case of loss or theft                            s
         and keep your device                 • Protect and extend       • Provide stronger
         clean through                          your existing security     network security
         Symantec’s anti-                       investments
         malware functionality
                                                                         • Reduce network
                                                                           operation costs by
                                                                           eliminating malware
                                                                           and mobile spam


Symantec Next Generation Network Protection                                                        5
Symantec Next Generation Network Protection




  Set rules and policies         Analyse and inspect               Enforce policy          Subscriber interaction
                                  traffic and content
 • Users / Groups of users      • Network Monitoring               • Time of day          • Warnings / Notifications
    • Network Usage              • Behaviour Profiles             • Acceptable use            • Remediation
• Regulatory requirements         • Malware / Spam                 • Regulations          • Personal policy controls
 • Parental and Corproate      • Content Categorisation            • Preferences               • Quarantine
           controls                                             • Security Permissions




                                                 Network Elements




                                                 Services / Bearers
  Voice               SMS             Web                 P2P              IM            MMS             Email


Symantec Next Generation Network Protection                                                                            6
Next Generation Network Protection Summary
                 Personal Black & White Lists                      Voice                      Web/SMS/IVR self care
                    Web Filtering Controls                         SMS
                                                                                                 Policy Templates




                                                                                  SELF-CARE
                  Time of Day / Day of Week                        Web




                                                  COVERAGE
                                                                                              Parental Notifications
                        Safe Browsing                              Email
                                                                                                 Usage reporting
                     Offensive Text Filters                        MMS
                                                                                                    PIN Codes
                   Message usage controls                         Services

                       STOP commands
                                                             Device independent
 KEY FEATURES




                  Premium Content Controls

                      Personal Redirects

                    Anti-Spam / Anti-Virus

                Application control (eg gaming)

                       Image Screening

                        Image Analysis

                  Social Networking Controls

                        Anti-Grooming

                       Personal Archive



Symantec Next Generation Network Protection                                                                            7
Why?

• Communication service providers are looking to:
     • Drive a higher quality experience for their customers
     • While simultaneously reducing operating costs
     • And increasing average revenue per user (ARPU)
• Only Symantec can seamlessly secure information from the
  individual to the device to the enterprise to the network and
  back again.
• Symantec Next Generation Network Protection gives
  communication service providers and their customers
  confidence by securing their telecommunications experience in
  today’s digitally converging world.


Symantec Next Generation Network Protection                       8
Thank you!




    Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
    the U.S. and other countries. Other names may be trademarks of their respective owners.

    This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
    are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


Symantec Next Generation Network Protection

More Related Content

What's hot

App stores optimization 110318
App stores optimization 110318App stores optimization 110318
App stores optimization 110318
Paul Cowman
 
Mr Lorenz Nokia Siemens The Impact of Smart Devices on The Liquid Network
Mr Lorenz Nokia Siemens The Impact of Smart Devices on The Liquid NetworkMr Lorenz Nokia Siemens The Impact of Smart Devices on The Liquid Network
Mr Lorenz Nokia Siemens The Impact of Smart Devices on The Liquid Network
IDATE DigiWorld
 
Wba Overview (2011q2)V01. 21
Wba Overview (2011q2)V01. 21Wba Overview (2011q2)V01. 21
Wba Overview (2011q2)V01. 21
shenwai
 
Mobile Marketing Slide Deck
Mobile Marketing Slide DeckMobile Marketing Slide Deck
Mobile Marketing Slide Deck
Kevin McGee, MBA
 
JavaME Overview - JMDF 2007
JavaME Overview - JMDF 2007JavaME Overview - JMDF 2007
JavaME Overview - JMDF 2007
Edoardo Schepis
 
4G LTE Network – an update from Huawei
4G LTE Network – an update from Huawei4G LTE Network – an update from Huawei
4G LTE Network – an update from Huawei
Gen-i
 
Web 3 Tom Gruber
Web 3 Tom GruberWeb 3 Tom Gruber
Web 3 Tom Gruber
Mediabistro
 
Vietnam mobile day 2012 developer opportunity - nokia
Vietnam mobile day 2012   developer opportunity - nokiaVietnam mobile day 2012   developer opportunity - nokia
Vietnam mobile day 2012 developer opportunity - nokia
Quang Anh Le
 

What's hot (20)

Ishiriya Wireless Technologies-Mobile Application Development
Ishiriya Wireless Technologies-Mobile Application DevelopmentIshiriya Wireless Technologies-Mobile Application Development
Ishiriya Wireless Technologies-Mobile Application Development
 
Hk enterprise mobility computerworld mar 2012
Hk enterprise mobility computerworld mar 2012Hk enterprise mobility computerworld mar 2012
Hk enterprise mobility computerworld mar 2012
 
Situational Web
Situational WebSituational Web
Situational Web
 
App stores optimization 110318
App stores optimization 110318App stores optimization 110318
App stores optimization 110318
 
Mr Lorenz Nokia Siemens The Impact of Smart Devices on The Liquid Network
Mr Lorenz Nokia Siemens The Impact of Smart Devices on The Liquid NetworkMr Lorenz Nokia Siemens The Impact of Smart Devices on The Liquid Network
Mr Lorenz Nokia Siemens The Impact of Smart Devices on The Liquid Network
 
Van wyk hothouse mobile 2012 sydney
Van wyk hothouse mobile 2012 sydneyVan wyk hothouse mobile 2012 sydney
Van wyk hothouse mobile 2012 sydney
 
Wba Overview (2011q2)V01. 21
Wba Overview (2011q2)V01. 21Wba Overview (2011q2)V01. 21
Wba Overview (2011q2)V01. 21
 
Mobile Marketing Slide Deck
Mobile Marketing Slide DeckMobile Marketing Slide Deck
Mobile Marketing Slide Deck
 
LTE: Building New Killer Apps
LTE: Building New Killer AppsLTE: Building New Killer Apps
LTE: Building New Killer Apps
 
IBM Smarter Business 2012 - Cybercoms resa mot financial planning intelligence
IBM Smarter Business 2012 - Cybercoms resa mot financial planning intelligenceIBM Smarter Business 2012 - Cybercoms resa mot financial planning intelligence
IBM Smarter Business 2012 - Cybercoms resa mot financial planning intelligence
 
IP power stone 4000v.5
IP power stone 4000v.5IP power stone 4000v.5
IP power stone 4000v.5
 
JavaME Overview - JMDF 2007
JavaME Overview - JMDF 2007JavaME Overview - JMDF 2007
JavaME Overview - JMDF 2007
 
Internet Trends 2010
Internet Trends 2010Internet Trends 2010
Internet Trends 2010
 
4G LTE Network – an update from Huawei
4G LTE Network – an update from Huawei4G LTE Network – an update from Huawei
4G LTE Network – an update from Huawei
 
Web 3 Tom Gruber
Web 3 Tom GruberWeb 3 Tom Gruber
Web 3 Tom Gruber
 
Vietnam mobile day 2012 developer opportunity - nokia
Vietnam mobile day 2012   developer opportunity - nokiaVietnam mobile day 2012   developer opportunity - nokia
Vietnam mobile day 2012 developer opportunity - nokia
 
PRIVATE, HYBRID AND PUBLIC CLOUDS (EMCWorld 2011)
PRIVATE, HYBRID AND PUBLIC CLOUDS (EMCWorld 2011)PRIVATE, HYBRID AND PUBLIC CLOUDS (EMCWorld 2011)
PRIVATE, HYBRID AND PUBLIC CLOUDS (EMCWorld 2011)
 
The Why, What and How of Mobile
The Why, What and How of MobileThe Why, What and How of Mobile
The Why, What and How of Mobile
 
Infinity Wire Frame
Infinity Wire FrameInfinity Wire Frame
Infinity Wire Frame
 
"Миллиарды игроков - насколько может вырасти рынок мобильных игр?" - Саймон П...
"Миллиарды игроков - насколько может вырасти рынок мобильных игр?" - Саймон П..."Миллиарды игроков - насколько может вырасти рынок мобильных игр?" - Саймон П...
"Миллиарды игроков - насколько может вырасти рынок мобильных игр?" - Саймон П...
 

Viewers also liked

Gestalt Terapia - Psicologia
Gestalt Terapia - PsicologiaGestalt Terapia - Psicologia
Gestalt Terapia - Psicologia
Adriane Fernandes
 
A historia da gestalt
A historia da gestaltA historia da gestalt
A historia da gestalt
Diego Avila
 
Aula 02 - Princípios da Gestalt
Aula 02 - Princípios da GestaltAula 02 - Princípios da Gestalt
Aula 02 - Princípios da Gestalt
Danilo Aroeira
 

Viewers also liked (19)

Gestalt na publicidade
Gestalt na publicidadeGestalt na publicidade
Gestalt na publicidade
 
【Interop tokyo 2014】 ネットワークは”NGN”から”EPN”へ
【Interop tokyo 2014】 ネットワークは”NGN”から”EPN”へ【Interop tokyo 2014】 ネットワークは”NGN”から”EPN”へ
【Interop tokyo 2014】 ネットワークは”NGN”から”EPN”へ
 
Securing Office 365
Securing Office 365Securing Office 365
Securing Office 365
 
Leis da Gestalt
Leis da GestaltLeis da Gestalt
Leis da Gestalt
 
Teoria da Gestalt
Teoria da GestaltTeoria da Gestalt
Teoria da Gestalt
 
Symantec Mobility Suite -Workforce apps
 Symantec Mobility Suite -Workforce apps Symantec Mobility Suite -Workforce apps
Symantec Mobility Suite -Workforce apps
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
JANOG29 - ISP Hot Topics 2011
JANOG29 - ISP Hot Topics 2011JANOG29 - ISP Hot Topics 2011
JANOG29 - ISP Hot Topics 2011
 
Gestalt Terapia - Psicologia
Gestalt Terapia - PsicologiaGestalt Terapia - Psicologia
Gestalt Terapia - Psicologia
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise Mobility
 
Bring Your Own Device
Bring Your Own DeviceBring Your Own Device
Bring Your Own Device
 
Teoria da Gestalt
Teoria da GestaltTeoria da Gestalt
Teoria da Gestalt
 
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine LearningTackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
 
A historia da gestalt
A historia da gestaltA historia da gestalt
A historia da gestalt
 
Aula 02 - Princípios da Gestalt
Aula 02 - Princípios da GestaltAula 02 - Princípios da Gestalt
Aula 02 - Princípios da Gestalt
 
Gestalt
GestaltGestalt
Gestalt
 
Symantec investor presentation february 2017
Symantec investor presentation february 2017Symantec investor presentation february 2017
Symantec investor presentation february 2017
 
This is the Microsoft Cloud
This is the Microsoft CloudThis is the Microsoft Cloud
This is the Microsoft Cloud
 

Similar to Symantec Next Generation Network Protection

Roadshow asia nick lane content services & apps
Roadshow asia nick lane content services & appsRoadshow asia nick lane content services & apps
Roadshow asia nick lane content services & apps
mobilesquared Ltd
 
M2 roadshow europe nick lane mobile squared
M2 roadshow europe nick lane mobile squaredM2 roadshow europe nick lane mobile squared
M2 roadshow europe nick lane mobile squared
mobilesquared Ltd
 
Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012
Mahbubul Alam
 
Sip vo ip-ims-convergence-d2-10 at kishore
Sip vo ip-ims-convergence-d2-10 at kishoreSip vo ip-ims-convergence-d2-10 at kishore
Sip vo ip-ims-convergence-d2-10 at kishore
AT Kishore
 
Mobile Pres
Mobile PresMobile Pres
Mobile Pres
slbedard
 
Gemalto Le Mobile 2.0 Edition 2009
Gemalto Le Mobile 2.0 Edition 2009Gemalto Le Mobile 2.0 Edition 2009
Gemalto Le Mobile 2.0 Edition 2009
servicesmobiles.fr
 

Similar to Symantec Next Generation Network Protection (20)

Building the Mobile Internet
Building the Mobile InternetBuilding the Mobile Internet
Building the Mobile Internet
 
Firefox OS
Firefox OSFirefox OS
Firefox OS
 
Mobile experiences
Mobile experiencesMobile experiences
Mobile experiences
 
Apperian overview mwc2012
Apperian overview mwc2012Apperian overview mwc2012
Apperian overview mwc2012
 
iEnterprise - Mit HTML-5 zum Unternehmens-Dashboard für Tablets
iEnterprise - Mit HTML-5 zum Unternehmens-Dashboard für TabletsiEnterprise - Mit HTML-5 zum Unternehmens-Dashboard für Tablets
iEnterprise - Mit HTML-5 zum Unternehmens-Dashboard für Tablets
 
Enterprise Mobile Security
Enterprise Mobile SecurityEnterprise Mobile Security
Enterprise Mobile Security
 
Roadshow asia nick lane content services & apps
Roadshow asia nick lane content services & appsRoadshow asia nick lane content services & apps
Roadshow asia nick lane content services & apps
 
iEnterprise - Mit HTML5 zum Unternehmens-Dashboard für Tablets
iEnterprise - Mit HTML5 zum Unternehmens-Dashboard für TabletsiEnterprise - Mit HTML5 zum Unternehmens-Dashboard für Tablets
iEnterprise - Mit HTML5 zum Unternehmens-Dashboard für Tablets
 
M2 roadshow europe nick lane mobile squared
M2 roadshow europe nick lane mobile squaredM2 roadshow europe nick lane mobile squared
M2 roadshow europe nick lane mobile squared
 
Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012
 
Sip vo ip-ims-convergence-d2-10 at kishore
Sip vo ip-ims-convergence-d2-10 at kishoreSip vo ip-ims-convergence-d2-10 at kishore
Sip vo ip-ims-convergence-d2-10 at kishore
 
Managing the Data Deluge: Cisco’s Nick Adamo on how SPs can support the mobil...
Managing the Data Deluge: Cisco’s Nick Adamo on how SPs can support the mobil...Managing the Data Deluge: Cisco’s Nick Adamo on how SPs can support the mobil...
Managing the Data Deluge: Cisco’s Nick Adamo on how SPs can support the mobil...
 
Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012
Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012
Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012
 
Mobile Pres
Mobile PresMobile Pres
Mobile Pres
 
Dumb Pipes
Dumb PipesDumb Pipes
Dumb Pipes
 
FCM Sustainable Communities, Panel February 9 2012
FCM Sustainable Communities, Panel February 9 2012FCM Sustainable Communities, Panel February 9 2012
FCM Sustainable Communities, Panel February 9 2012
 
Samsung's smartphone operating system: bada
Samsung's smartphone operating system: badaSamsung's smartphone operating system: bada
Samsung's smartphone operating system: bada
 
Gemalto Le Mobile 2.0 Edition 2009
Gemalto Le Mobile 2.0 Edition 2009Gemalto Le Mobile 2.0 Edition 2009
Gemalto Le Mobile 2.0 Edition 2009
 
Video Challenged the Network Star -(Mobile Trends 2011 & Beyond)
Video Challenged the Network Star -(Mobile Trends 2011 & Beyond)Video Challenged the Network Star -(Mobile Trends 2011 & Beyond)
Video Challenged the Network Star -(Mobile Trends 2011 & Beyond)
 
SFMobile: Founder Labs Mobile Edition 01/09/11
SFMobile: Founder Labs Mobile Edition 01/09/11SFMobile: Founder Labs Mobile Edition 01/09/11
SFMobile: Founder Labs Mobile Edition 01/09/11
 

More from Symantec

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Symantec Next Generation Network Protection

  • 1. Symantec Next Generation Network Protection Symantec Next Generation Network Protection 1
  • 2. Global Mobile Market iPad / iPhone 2B iPhone 4 1000 iPhone 3G Apps Downloaded Total Operator / Apple iPhone App Store 900 2G Revenue 800 Operator Data Google Convinces FCC 700 to Open Access Revenue Network for 700MHz 600 Android $Billions First 2.1 Android Android 500 Open Source Phone OS Started 400 Blackberry Blackberry Blackberry Email Bold and App World 300 Storm Japan 3G US 3G Japan > US 4G Launched Launched 50% 3G Launched 200 HP Windows Acquires Mobile Palm 100 Launched Symbian Symbian Becomes Launched Open Source 0 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 Revenue Data Source: Chetan Sharma Consulting, 2010 Symantec Next Generation Network Protection 2
  • 3. THREATS NEEDS Mobile Ecosystem DEVICE THEFT DATA LOSS  Pswd Control & Wipe  Encryption MOBILE DEVICE (Device/Email) MOBILE APP THREATS  Device/App Control DEVICES COMPLIANCE  Policy Delivery Corporate Devices  Identity Personal Devices 3G-4G Access THREATS NEEDS MALWARE  Mobile Management DATA LOSS MOBILE  Email/Web Protection INTERNET ENTERPRISE CARRIER DATA CENTER  Email Encrypt / DLP COMPLIANCE  Authentication THREATS NEEDS MISUSE  Quality of Experience CARRIER / CAPACITY SERVICE  Hosted Mobile OUTAGES Device/Service Mgt PROVIDER BRAND  Fraud prevention DATA CENTER Symantec Next Generation Network Protection 3
  • 4. Symantec’s Broad Mobile Strategy & Solutions ENTERPRISE / CARRIER / MOBILE DEVICE DATA CENTER SERVICE PROVIDER v Cross Platform Mobile MGMT / Security Email Anti-Malware/SPAM Mobile Security Mobile Encryption Data Loss Prevention Email Anti-Malware/SPAM Two-Factor Auth (VIP) Email Encryption Hosted PKI Device Certificates Endpoint Virtualization Two-Factor Auth (VIP) Key Management Fraud Detection Symantec Next Generation Network Protection 4
  • 5. How Symantec Can Help Now A Complete Approach to Mobility Security and Management Consumers Enterprise Communication Service Providers • Secure your mobile • Gain visibility and • Improve your customer phone and keep your control of all mobile user experience personal data safe platforms • Increase average • Remotely lock or wipe • Embrace revenue per user your mobile device in consumerization (ARPU) case of loss or theft s and keep your device • Protect and extend • Provide stronger clean through your existing security network security Symantec’s anti- investments malware functionality • Reduce network operation costs by eliminating malware and mobile spam Symantec Next Generation Network Protection 5
  • 6. Symantec Next Generation Network Protection Set rules and policies Analyse and inspect Enforce policy Subscriber interaction traffic and content • Users / Groups of users • Network Monitoring • Time of day • Warnings / Notifications • Network Usage • Behaviour Profiles • Acceptable use • Remediation • Regulatory requirements • Malware / Spam • Regulations • Personal policy controls • Parental and Corproate • Content Categorisation • Preferences • Quarantine controls • Security Permissions Network Elements Services / Bearers Voice SMS Web P2P IM MMS Email Symantec Next Generation Network Protection 6
  • 7. Next Generation Network Protection Summary Personal Black & White Lists Voice Web/SMS/IVR self care Web Filtering Controls SMS Policy Templates SELF-CARE Time of Day / Day of Week Web COVERAGE Parental Notifications Safe Browsing Email Usage reporting Offensive Text Filters MMS PIN Codes Message usage controls Services STOP commands Device independent KEY FEATURES Premium Content Controls Personal Redirects Anti-Spam / Anti-Virus Application control (eg gaming) Image Screening Image Analysis Social Networking Controls Anti-Grooming Personal Archive Symantec Next Generation Network Protection 7
  • 8. Why? • Communication service providers are looking to: • Drive a higher quality experience for their customers • While simultaneously reducing operating costs • And increasing average revenue per user (ARPU) • Only Symantec can seamlessly secure information from the individual to the device to the enterprise to the network and back again. • Symantec Next Generation Network Protection gives communication service providers and their customers confidence by securing their telecommunications experience in today’s digitally converging world. Symantec Next Generation Network Protection 8
  • 9. Thank you! Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Symantec Next Generation Network Protection