How to Remove Document Management Hurdles with X-Docs?
Â
Opening Keynote and Welcome
1. Symantec Government
Technology Summit
Symantec Government Technology Summit 2012 1
2. Welcome Craig P. Abod
President
Carahsoft Technology
Symantec Government Technology Summit 2012 2
3. About Todayâs Event
⢠Government focused
⢠Hands-on product training
⢠Technical experts
⢠Access to Symantecâs government sales team
⢠Access to partners who specialize in what government needs during sessions
and in the exhibit hall
⢠Detailed break-out sessions covering:
â Virtualization and how to manage it
â Open-ness of Data
â Evolution of Endpoint
â Transparency of Government
â Cyber Threat Landscape
⢠Keynotes from Symantecâs Jennifer Nowell and Author Joel Brenner
⢠Network with other government Symantec users throughout the day and at
our closing reception.
Symantec Government Technology Summit 2012 3
4. About Carahsoft
⢠Carahsoft serves as the master GSA
Schedule holder and distributor for many
of our vendors.
⢠We support the partner ecosystem with
access to contract vehicles, marketing,
sales and support.
⢠Our goal is to bring leading-edge
technologies to the government and make
them easy to procure.
Symantec Government Technology Summit 2012 4
5. Upcoming Events
Symantec Webcast - AFCEA Joint Warfighting 2012
NetBackup May 15-17, 2012
March 21, 2012 (tomorrow) Virginia Beach Convention Center
Time: 2pm Eastern
Symantec Webcast
DoDIIS
April 1-4, 2012 June 27, 2012
Denver, CO Time: 2pm Eastern
Symantec | Clearwell Webcast Symantec Government User Groups
April 25, 2012 Coming soon in 2012
Time: 2pm Eastern
DISA Symantec Backup For Your VMware
May 7-10, 2012 Environments
Tampa, FL www.VirtualBackupPlan.com
Symantec Army Webcast
May 10, 2012
Time: 2pm Eastern
Visit: www.carahsoft.com/symantec
Symantec Government Technology Summit 2012 5
6. Thanks to Our Sponsors
Symantec Government Technology Summit 2012 6
10. Americas Public Sector â Current State of Affairs
Jennifer Nowell
Director, Government Solutions Group, Americas Public Sector
10
11. Current State of Affairs - Americas Public Sector
1 Federal Budget continue to decline but there is hope
2 Continued mandates to safeguard the future
3 New Trends straining Traditional Models
4 Symantec Public Sector Direction and Promise for the Future
5 Q&A
11
12. Public Sector IT Market
$94.4 B $95 B $92.5 B $92 B $92 B
$81.2 B
$75.8 B $78.8 B
$72 B
$67 B
$20 B $21 B $19.7 B $19.7 B $19.8 B
Source: Center for Digital Government
Center for Digital Government, 2012
13. Navigating in a tight budget climate
⢠Agencies and/or programs are being forced to cut back
â Overall software maintenance contracts across vendors
â Efficiencies and focus on optimization
⢠Programs/initiatives that will be highlighted by White House in
Presidential elections
â Federal Data Center Consolidation Initiative Savings
â Cyber Security and progress on CNCI
â Cloud First policy and efficiency gained
⢠Eventhough FedRAMP is a work in progress
⢠Agencies considering new funding sources
â CapEx v. OpEx funding sources
13
14. Yet, they still have requirements to contend withâŚ
New/Reformed Legislation
⢠Information Sharing
⢠FISMA Reform with Continuous Monitoring
⢠Critical Infrastructure Protection
⢠Data Breach Notification
⢠Supply Chain Security
⢠Privacy
14
15. New Trends Straining Traditional Models
What Got Us Here Will Not Take Us Forward
⢠Mobilization
â˘Cloud-based security controls
⢠Consumerization
⢠Virtualization â˘Context awareness
⢠Cloudification â˘More sensors, big data and analytics
⢠Industrialization of Hackers
â˘Virtualization of security controls
⢠Nationalization of Hackers
â˘Anomaly detection of advanced
⢠Externalization and Collaboration
threats
â˘Cloud security gateways
â˘Intelligence/situational awareness
Gartner 2011 15
16. Interaction Age
Cloud & Mobility Driving Increase Pace and Value of Connectivity
3.0% Growth in Connectivity Interaction Era
(2007 â )
(1959 â Today)
2.5%
Value of Connectivity
2.0%
Internet Era
(1996 â 2007)
1.5%
1.0% Client-Server Era
(1981 â 1996)
Mainframe Era
0.5% (1959 â 1981)
Thousands Millions Billions
Number of Connections
16
17. What We Are Hearing From Our Customers
Current âŚis Forcing IT âŚand Creates
Landscape⌠to Evolve⌠New Challenges
⢠Growth of information ⢠Virtualize ⢠Virtualization compounds
⢠Sophistication of infrastructure storage growth
attacks ⢠Move to cloud ⢠Information distributed
⢠Consumerization of IT ⢠Embrace and protect across physical, virtual
⢠More compliance mobile devices and cloud
requirements such as ⢠Enhance infrastructure ⢠Security of virtual, cloud
Continuous Monitoring agility and mobile environments
17
18. IT Must Evolve to Meet New Demands
Information & Identity
System
⢠Driver: Next level of productivity
and agility with collaboration
⢠Driver: Business automation,
and knowledge sharing, mobile
e.g., ERP, functional apps workforce
⢠Data: Centralized, structured ⢠Data: Distributed, unstructured
⢠Infrastructure: Physical ⢠Infrastructure: virtual, cloud,
⢠IT focus: Systems tasks outsourced,
19. Fundamental Shift in the Threat Landscape
State Actors
Government
Sponsored
Attackers
Malicious Outsiders
Insiders
Malicious and
Non-Malicious
Hack-tivists
Hacking for a
Cause
Cyber Criminals
Hacking for Profit
20. CyberScope â Defined
Executive Order M-10-15
Issued: April 21, 2010
SUBJECT: FY 2010 Reporting Instructions FISMA
â Agencies need to be able to continuously monitor security-related
information from across the enterprise in a manageable and actionable way.
Chief Information Officers (CIOs), Chief Information Security Officers (CISOs),
and other agency management all need to have different levels of this
information presented to them in ways that enable timely decision making.
To do this, agencies need to automate security-related activities, to the
extent possible, and acquire tools that correlate and analyze security-
related information. â
âAgencies need to develop automated risk models and apply them to the
vulnerabilities and threats identified by security management tools.â
20
21. Agency Requirements & Challenges
Automated Administrative & Mission Reporting
Each agency must:
2.Respond to their administrative duty to produce validated
content to report into CyberScope
3.Meet their daily mission to adhere to the needs of their
customers by ensuring the health and security of their
organization while protecting the privacy of their information
and guaranteeing the availability of accessing that information
and the performance of the network
21
22. Consumerization is Driving Disruption
Embracing the Personally-Owned & Unmanaged â âBYODâ
Info/App Access Only
Data Sources: Gartner, & IDC
Evolving
Focus
Unmanaged
246M Corp PCs Relevent
293M Personal PCs Devices
819M Smartphones Today
116M Tablets
Future
Devices
177M Corp PCs
Full Control
Managed
300M Smarphones
15M Tablets
Traditional
Focus
Agency-Owned Personally-Owned
Devices
Symantec Confidential and Proprietary - Not for Distribution Outside SYMC
23. Cloud Differs from Traditional IT
Service
Deployment
Models Cloud Needs
Models
1. Infrastructure 1. Public Cloud 1. On-Demand Self-service
2. Platform 2. Private Cloud 2. Resource pooling
3. Software 3. Hybrid Cloud 3. Rapid elasticity
4. Community Cloud 4. Measured service
23
24. Cloud Reality
PaaS
(Azure)
IaaS
SaaS Apps
(AWS,
(SFDC, Concur)
Rackspace)
SYMC Apps Private Cloud
(e.g. VIP) (HP, Fujitsu,
VMware)
⢠Most customers will use many clouds
⢠Variety of deployment models
25. The Typical Virtualization Adoption Path
âToday, 20-25% of server workloads are virtualizedâŚâ
- Gartner, December 2010
Hybrid
Cloud
Business-
critical
Apps IncreasingâŚ
Line of
Business ďź IT Confidence
Apps
File, Print, ďź Quality of Service
DNS ďź Resiliency and Compliance
Test &
Dev ďź Business Agility
The road to the Cloud goes straight through business-
critical virtualizationâŚ
Symantec Virtualization Solutions 25
27. Mobility, Cloud and I.T. Mega- Pains
Mobile
Must support to enhance
employees productivity
I do not have the means to
control security, risk, and
Frustration compliance across all of these
new I.T. platforms
Private
Cloud
Cloud Must embrace to drive business
agility and lower costs
28. Symantec O3 : Changing the Interaction Model
Access Control
Information
Protection
Cloud Visibility
O3 Control Security Compliance
Private
Cloud
To embrace the cloud with confidence
28
29. Symantec O3 Welcome Jon Kuhn From Agency 1
⢠Allows enterprise IT to define and enforce their own
security independently of the cloud platform Click on any icon to log in
providers
Cloud Based Protection
⢠Primarily access control and information protection
⢠Access control: âwho can access what cloud
applicationsâ (authentication, authorization,
federation) Agency/Enterprise SYMC 03 Cloud
⢠Information protection: âwhat information can flow O3 Gateway O3 Intelligence Center
to the cloudâ (DLP , encryption) DLP Encrypt Key Mgmt
Disruptive Technology âSecureâ Box
⢠âCloud Firewallâ concept
⢠Both as software (large enterprises) or as SaaS (SME)
⢠For the first time, identity and information security
combined into a single security control point
Box in the Cloud
Symantec Confidential and Proprietary - Not for Distribution Outside SYMC
30. Thank you
Copyright Š 20101Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
30
By Center for Digital Government estimates the IT spend in 2012 will be relatively flat at $92 billion. As mentioned earlier, SLG is actively seeking out solutions to their budgets woes. Until the national and state economies recover, tight budgets will continue to spur action in the IT realm in the states. Many economists predict that we will see SLG start to rebound financially by 2013. We will do a deep dive into the four largest vertical areas of spend a little later in the presentation but what is evident from our research is that IT will play a key role in transforming service delivery, bolstering program results and delivering cost savings.
Moving from the Industrial Age, to the Information Age to Interaction Age. Right now there is a perfect storm of trends impacting agencies today. This storm is quickly creating a frenzy of new business value creation. The changes driven by computing inventions of the past â the mainframe, client-server computing, the personal computer, even the internet â do not even compare to what we are seeing today. The consumer with smartphone â or tablet â in hand is the defining image of this new era. This new world of change means seamless interaction, whether an organization or military installation. We want to connect to our friends, colleagues, family through our whatever means takes us there the fastest. This new era brings new problems and opportunities.
What we hear from our customers, is that the changes in the current landscape are forcing their IT teams to evolveâŚor as our CEO, Enrique Salem likes to put it âRethinkâ how they run their business. Which leads to some new and evolving challenges to address. Specifically, our customers talk a lot about the challenges of information growth, especially around email and other unstructured data. Every day, there are over 294 billion emails. Thatâs 2.8 million emails a second. Nearly 90 percent of these are spam or viruses. The remainder carry everything from harmless greetings to the most sensitive corporate information imaginable. Small wonder, unstructured data makes up almost half of the enterprise data explosion. Another top concern is the increased sophistication and impact of new types of attacks like Stuxnet or WikiLeaks. This year on the threat landscape has been unprecedented not just in terms of the overall volume of malware, but also in the new levels of skill (for example Stuxnet) or the magnitude of the possible impact to enterprises (Wikileaks.) What weâre hearing, please tell us if you disagree, is that this year on the threat landscape drew intense board-room attention to the matter of computer security at enterprises worldwide. Everywhere you look youâre seeing the rapid and pervasive consumerization of IT. On the weekend of its debut, the iPad sold 3 million in 4 days. (March 16 th 2012) You know the tablet that left the store on Saturday walked into the your enterprise on Monday. Eighty-eight percent of the Fortune 500 have already realized they have to support the iPad. If you are like our other customers, you are probably considering a strategy to allow employees to connect their own devices to the network. Its no longer about âifâ you will support these devicesâŚitâs when? Identity and data protection risks are giving rise to more governance and compliance including state and federal data protection laws.   And what we are hearing from our customers, is that these unstoppable forces in the current landscape are forcing IT to evolve and rethink how they do business. Specifically customers are prioritizing efforts to: - virtualization infrastructure, - moving data, applications, and services to the cloud - embrace and protect mobile devices - protect their data and systems critical protection need for these key initiatives, - and finally, the enhanced infrastructure agility to meet the demands of their business. And all of our customers agree that the solutions to the issues, specifically virtualization and cloud, are creating new challenges. The virtual server sprawl that has occurred in our industry has compounded the storage growth for IT. And where that information is access from, or stored, is in the physical, virtual or cloud. And the number 1 request of every IT department is to secure that information, no matter where it resides.
We see a significant change in the role of IT in enterprises from system-centric to information-centric. To date, IT has brought significant productivity benefits to organizations by automating key business processes and driving efficiencies. This landscape was characterized by various business applications working centralized databases, supported by physical infrastructure. A lot of what IT departments did was focused on managing systems, including PCs, servers, storage, and networks. Today, the role of IT is starting look very different. Organizations are looking for the next level of productivity and business agility by improving collaboration and knowledge sharing. They are looking to better connect their employees, teams, business partners and customers to each other. This is changing the nature of data into highly distributed, largely unstructured information. The infrastructure is moving virtual within the company or turning into an external cloud. Instead of focusing of physical systems management, the role of IT is transforming into more information-centric tasks with governance, policies, risks, and controls.
In 2010, 350.9m PCâs were shipped (177.8m professional, 173.2m home) 2014 # of Agency PCâs (laptop, desktop, notebook): 246,600,000 (Gartner: G00212068, Apr 2011) 2014 # of Consumer PCâs (laptop, desktop, notebook): 293,500,000 (Gartner: G00212068, Apr 2011) 2014 # of Tablets: 116,900,000 (IDC: 227941, Apr 2011) 2014 # of Smartphones: 819,946,600 (IDC: 227367, Mar 2011) Market size for endpoint security in 2014: $9,852.40 million (Agency: $4,089.9 million; Consumer: $5,773.5 million) (IDC: 225759, Nov 2010)
Letâs start with a quick definition of cloud. Letâs start with 3-4-5. 3 service models, 4 deployment models and 5 essential characteristics. This structure corresponds to the NIST definition, and is a good model to start to understand how people talk about cloud. 3. Service Models: 1.Cloud Software as a Service (SaaS). The capability provided to the consumer is to use the providerâs applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based email). The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings. 2. Cloud Platform as a Service (PaaS). The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations . 3. Cloud Infrastructure as a Service (IaaS). The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls). 4.Deployment Models: 1. Private cloud. The cloud infrastructure is operated solely for an organization . It may be managed by the organization or a third party and may exist on premise or off premise. 2. Public cloud. The cloud infrastructure is made available to the general public and is owned by an organization selling cloud services. 3.Hybrid cloud. The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability. This might include the ability to store data on your private cloud and public clouds. 4.Community cloud. The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be managed by the organizations or a third party and may exist on premise or off premise. 5 Essential Characteristics: 1. On-demand self-service. A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each serviceâs provider. 2. Broad network access. client Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick platforms (e.g., mobile phones, laptops, and PDAs). 3. Resource pooling. The providerâs computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. There is a sense of location independence in that the customer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter). Examples of resources include storage, processing, memory, network bandwidth, and virtual machines. 4. Rapid elasticity. Capabilities can be rapidly and elastically provisioned, in some cases automatically, to quickly scale out, and rapidly released to quickly scale in. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time. 5. Measured Service. Cloud systems automatically control and optimize resource use by leveraging a metering capability1 at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service. Now that we have an understanding of the terminology and characteristics of cloud, letâs talk about some of the benefits and risks of cloud.
The reality that we see is that most companies will use many clouds, depending on what is right for them. To gain confidence in your cloud, you must understand the patterns of success for cloud and implement strategies that support the pattern that fits your company and your situation. Our customers tell us they have an average of 5 or more SaaS applications, and 2 or more IaaS partners. They already have many partners for app hosting, web hosting, and IT services. They are deploying a variety of deployment models, including Public, Private, and Hybrid. Reflecting the cloud reality, letâs hear from an innovator in the cloud, Microsoft, and how their cloud platform, Azure, is used to build, host and scale web applications through Microsoft datacenters.
Visual representation of customerâs journey in adopting virtualization. Typically, most organizations start with non-critical assets to take advantage of capex savings. Then, they grow their adoption to more vital, business-critical applications and services. This progress can many times slow due to challenges that materialize in areas of increasing storage costs, concerns over application availability, broken backup and recovery processes and concerns over unknown security and compliance challenges. As they progress, they focus on increasing confidence in ITâs ability to deliver consistent and reliable services levels, increasing and preserving the quality of those services, securing the resiliency and compliance of their infrastructure and overall achieving a higher level of business agility or aligning IT to meet new business challenges and demands. Upon reaching a point of being able to deliver business-critical services, customers begin to understand the greater value that virtualization will bring in developing an agile service delivery architecture. So we say that the road to Cloud goes straight through business-critical virtualization.
Identity Security â Strong Single Sign-on / authentication, context based policy engine Information Security â Strong Box â who has access to what and where â managed or unmanaged device â Auditing â works with any SIEM, incident management, which clients accessing which cloud services, any data loss incidents or violations â device independent and cloud services independent. Leverages Existing IDM Infrastructure Any corporate directory or user store Single ID SSO Strong Authentication VIP OTP Stepped up (per application policy) Other forms using custom portal integration Authorization Context-based policy engine Who (identity-based) What (device-based) Federation & Password Mgmt SAML & OpenID Gateway-based keychain 100 apps catalog (+ connectors) Availability: Q1 CY2012 DLP for information classification Leverages existing DLP deployment Identity context Any device, any cloud Silent File Encryption Leverages existing PGP deployment Key management option Other forms using custom portal integration iPad Secure Sandbox App â bring your iPad to workâ Integrated with gateway (SSL VPN with 2FA) Sandbox data at rest encryption Availability: 2H CY2012 Cloud Audits Cloud logs consolidated in ONE place Gateway visibility spawns all cloud services Gateway visibility spawns both access & information events Cloud Security Management Standard logging format (Syslog) Well understood by existing log mgmt solutions Enables SIEM and event correlation across internal and external systems Cloud Compliance Management O3 logs are foundational to cloud compliance Demonstrable controls (gateway policy) and collectable proofs and evidence (gateway logs) â Cloud PCIâ, âCloud HIPAAâ become possible Availability: Q1 CY2012 for access events 2H CY2012 for info events