SlideShare una empresa de Scribd logo
1 de 36
Descargar para leer sin conexión
Simplify IT with Symantec’s Cloud-Based
    Solutions

    Ron Poserina
    Director, Enterprise & Partner Services

Simplify IT with Symantec’s Cloud-Based Solutions   1
Agenda

           1        What are the Challenges and Complexities

           2        Simplify IT with Symantec.cloud Services

           3        Case in Point: Email Security

           4        Case in Point: Web Security

           5        Q&A


Simplify IT with Symantec’s Cloud-Based Solutions   SYMANTEC VISION 2011   2
Challenges of Managing IT
• Being asked to do more with less
• Upgrades & maintenance of current solutions
• Investing in new technology to address changing business
  requirements
• Keeping up with the threat landscape
• Demand to support more devices
• Mobile workforce




Simplify IT with Symantec’s Cloud-Based Solutions   SYMANTEC VISION 2011   3
IT Complexity



Simplify IT with Symantec’s Cloud-Based Solutions   SYMANTEC VISION 2011   4
The biggest concern of IT decision
            makers is their ability to support the
                        growth of their business                                          66                      %
                                                    Source: Forrester - The Writing On IT's Complexity Wall - June 2010




Simplify IT with Symantec’s Cloud-Based Solutions                           SYMANTEC VISION 2011                          5
Delta Airlines recently standardized their application
             portfolio following a 2008 merger with Northwest.
             After cutting the portfolio by 50% they still support


                                                  635
                                     different applications



Simplify IT with Symantec’s Cloud-Based Solutions   SYMANTEC VISION 2011   6
more devices X more                data X more applications X more         users


 = exponential growth in complexity


Simplify IT with Symantec’s Cloud-Based Solutions   SYMANTEC VISION 2011           7
Complexity of Multiple Vendors
• Juggling multiple vendor relationships
• Inability to reduce costs through bundling
• Multiple products to manage
• Differing platforms and technologies to support and learn
• Technical support




Simplify IT with Symantec’s Cloud-Based Solutions   SYMANTEC VISION 2011   8
Distributed and mobile workforce



Simplify IT with Symantec’s Cloud-Based Solutions   SYMANTEC VISION 2011   9
Simplify IT with Symantec’s Cloud-Based Solutions   SYMANTEC VISION 2011   10
The consumerization of IT is forcing organizations to
              support a wider array of technologies, and mobility
              allows people to connect from any location
                                                               - Enrique Salem




Simplify IT with Symantec’s Cloud-Based Solutions   SYMANTEC VISION 2011         11
Simplify IT with Symantec’s Cloud-Based Solutions   SYMANTEC VISION 2011   12
Simplify IT with Symantec’s Cloud-Based Solutions   SYMANTEC VISION 2011   13
Threat Landscape



Simplify IT with Symantec’s Cloud-Based Solutions   SYMANTEC VISION 2011   14
Simplify IT with Symantec’s Cloud-Based Solutions   SYMANTEC VISION 2011   15
Simplify IT with Symantec’s Cloud-Based Solutions   SYMANTEC VISION 2011   16
Simplify IT with Symantec’s Cloud-Based Solutions   SYMANTEC VISION 2011   17
and it is not just email




Simplify IT with Symantec’s Cloud-Based Solutions       SYMANTEC VISION 2011   18
we blocked over        3,000
                                                       new websites with spyware
                             or malware each day in 2010




Simplify IT with Symantec’s Cloud-Based Solutions      SYMANTEC VISION 2011    19
and      77targeted attacks per day by the end of 2010
                          using complex social engineering tactics to dupe
                                               victims to steal information




Simplify IT with Symantec’s Cloud-Based Solutions   SYMANTEC VISION 2011      20
Number of Targeted Attacks per Day Globally




                             SYMANTEC VISION 2011   21
That’s where we come in…




Simplify IT with Symantec’s Cloud-Based Solutions   SYMANTEC VISION 2011       22
Simple to deploy
                                                             100% protection
                                                             against both known &
                No HW/SW or                                  unknown viruses
                Appliances

                Automatic updates
                                                             24/7 customer
                                                             support as standard
                Easy to scale

                Pre-integrated
                apps
                                                             Industry leading SLAs

    $           Pay as you go

Simplify IT with Symantec’s Cloud-Based Solutions   SYMANTEC VISION 2011           23
Symantec.cloud Service Portfolio
• Email Security.cloud
    – AntiSpam
    – AntiVirus
    – Image Control
    – Content Control
• Email Encryption.cloud
• Email Archiving.cloud
• Email Continuity.cloud




Simplify IT with Symantec’s Cloud-Based Solutions   SYMANTEC VISION 2011   24
Symantec.cloud Service Portfolio
• Web Security.cloud
    – URL Filtering
    – AntiSpyware & AntiVirus
    – Roaming Users
• Endpoint Protection.cloud
• IM Security.cloud


• Threat Management through Skeptic™
    –   Proprietary, Patented Heuristic Scanner
    –   Converged Threat Analysis
    –   10+ Years in Development
    –   10GB+ of rules and algorithms

Simplify IT with Symantec’s Cloud-Based Solutions   SYMANTEC VISION 2011   25
Symantec.cloud Global Network

32,000
Clients with 10.9
                                  3.8billion
                                  Email Connections
                                                       1.1billion 15
                                                       Web Access               Data Centers are
million users in 102              are processed each   connections are          incorporated, spanning
countries to date                 day                  controlled each day      four continents




                                                          South Africa




Symantec Hosted Services Technology Review               SYMANTEC VISION 2011                      26
Symantec.cloud: Reaching the Goal of Simplification
• IT Complexity
    – Single vendor, single portal, single point of support
    – SLA’s
    – No Hardware, software or appliances
    – Simple to budget for. CapEx vs. OpEx
• Distributed and mobile workforce
    – Ensure users are protected while outside the corporate walls
• Threat Landscape
    – Block threats BEFORE they come anywhere near your network
    – Global visibility and intelligence to stop advanced threats



Simplify IT with Symantec’s Cloud-Based Solutions   SYMANTEC VISION 2011   27
Case in Point: Email Security



Simplify IT with Symantec’s Cloud-Based Solutions   SYMANTEC VISION 2011   28
Case in Point: Email Security – Arnold Worldwide
Business Requirements                               Business Value & Technical Benefits

• Protection against malware                        • Quick and easy deployment
  infections                                          as a hosted service
• Reduce help desk calls and                        • Minimal IT support require
  increase IT productivity                            to maintain service
• Secure communications                             • Increase end-user and IT
• No client/server software                           department productivity
  installation or maintenance




Simplify IT with Symantec’s Cloud-Based Solutions     SYMANTEC VISION 2011            29
Case in Point: Email Security – Perkins Eastman
Business Requirements                               Business Value & Technical Benefits

• Prevent damage from email-                        • Improved Security

  borne viruses                                        – Five years with no significant damage from
                                                         viruses or malware
• Reduce time employees                                – 99% of spam captured before reaching the
                                                         email gateway
  spend managing spam
                                                    • Operational Benefits
• Minimize IT staff spent                              – 37,000 hours/year reclaimed for end users
  managing email and Web                               – Payback in weeks
  security                                             – Self-service management of spam
                                                    • IT Staff Benefits
                                                       – 50% reduction in IT staff time spent managing
                                                         email security
                                                       – 12 hours/week reclaimed in IT staff time
                                                       – Five minutes to deploy

Simplify IT with Symantec’s Cloud-Based Solutions      SYMANTEC VISION 2011                           30
How Symantec.cloud Simplifies Email Security
• No Hardware / No Software
• Symantec.cloud becomes an extension of your network
• Predictive Threat Protection through Skeptic™
• Block unwanted content BEFORE it enters your environment
• Seamless updates and enhancements
• Adds resiliency to your email




Simplify IT with Symantec’s Cloud-Based Solutions   SYMANTEC VISION 2011   31
Case in Point: Web Security



Simplify IT with Symantec’s Cloud-Based Solutions   SYMANTEC VISION 2011   32
Case in Point: Web Security – Groupo Lamosa
Business Requirements                               Business Value & Technical Benefits

• Enhance protection against                        • Security and data protection
  threats at the Internet and                         – 28,000 Web-borne threats blocked in
  endpoints                                             first 10 months
                                                      – No disruption from malicious code since
• Increase employee                                     deployment on protected systems
  productivity                                      • Operational and cost efficiency
• Reduce IT overhead                                  – 100% payback because Web filtering
                                                        reclaims tens of thousands of hours of
• Improve data protection and                           employee productivity

  server recovery                                     – Projected ability to delay up to $30,000
                                                        in server purchases
                                                      – Up to 520 IT staff hours available for
                                                        more valuable tasks



Simplify IT with Symantec’s Cloud-Based Solutions     SYMANTEC VISION 2011                         33
How Symantec.cloud Simplifies Web Security
• Simple to Deploy
• Doesn’t require hardware/software or appliances
• Flexible solutions for the mobile workforce
• Simple yet flexible policy management
• Seamless updates and enhancements




Simplify IT with Symantec’s Cloud-Based Solutions   SYMANTEC VISION 2011   34
In Review: Simplify IT with Symantec’s Cloud-Based Solutions

• Reduce the need to deploy & support solutions yourself
• Instantly boost security posture with best of breed technology
• Simplify Budgeting
• Vendor Consolidation
• Ease of control and management across multiple services
• Protect the Mobile Workforce
• Service Level Agreements
• Symantec.cloud scales and grows with your business



Simplify IT with Symantec’s Cloud-Based Solutions   SYMANTEC VISION 2011   35
Thank you!
    Ronald Poserina
    (646) 519-8121
    Ronald_poserina@symantec.com


    Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
    the U.S. and other countries. Other names may be trademarks of their respective owners.

    This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
    are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


Simplify IT with Symantec’s Cloud-Based Solutions                                                                                                                                           36

Más contenido relacionado

La actualidad más candente

MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee Prolifics
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guideYury Chemerkin
 
Best practices for Vblock Monitoring with FusionStorm and Nimsoft
Best practices for Vblock Monitoring with FusionStorm and NimsoftBest practices for Vblock Monitoring with FusionStorm and Nimsoft
Best practices for Vblock Monitoring with FusionStorm and NimsoftCA Nimsoft
 
Getting the Most Out of Tivoli Endpoint Manager
Getting the Most Out of Tivoli Endpoint ManagerGetting the Most Out of Tivoli Endpoint Manager
Getting the Most Out of Tivoli Endpoint ManagerTammy Biondi
 
Egress Switch Datasheet
Egress Switch Datasheet Egress Switch Datasheet
Egress Switch Datasheet yonifine
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloudInterop
 
Altiris IT Management Suite 7
Altiris IT Management Suite 7Altiris IT Management Suite 7
Altiris IT Management Suite 7Symantec
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.Onwubiko Emmanuel
 
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP CloudsHow to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP CloudsSBWebinars
 
Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9Symantec
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareMike Rizzo
 
Cutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsIBM Security
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watsonPrime Infoserv
 
Symantec control compliance suite
Symantec control compliance suiteSymantec control compliance suite
Symantec control compliance suiteSymantec
 
A Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudA Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudRochester Security Summit
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challengexKinAnx
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationAriel Martin Beliera
 

La actualidad más candente (20)

TrendMicro
TrendMicroTrendMicro
TrendMicro
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
ESET Enterprise
ESET EnterpriseESET Enterprise
ESET Enterprise
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guide
 
Best practices for Vblock Monitoring with FusionStorm and Nimsoft
Best practices for Vblock Monitoring with FusionStorm and NimsoftBest practices for Vblock Monitoring with FusionStorm and Nimsoft
Best practices for Vblock Monitoring with FusionStorm and Nimsoft
 
Getting the Most Out of Tivoli Endpoint Manager
Getting the Most Out of Tivoli Endpoint ManagerGetting the Most Out of Tivoli Endpoint Manager
Getting the Most Out of Tivoli Endpoint Manager
 
Egress Switch Datasheet
Egress Switch Datasheet Egress Switch Datasheet
Egress Switch Datasheet
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
 
Altiris IT Management Suite 7
Altiris IT Management Suite 7Altiris IT Management Suite 7
Altiris IT Management Suite 7
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
 
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP CloudsHow to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
 
Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
Cutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control Costs
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
 
Symantec control compliance suite
Symantec control compliance suiteSymantec control compliance suite
Symantec control compliance suite
 
A Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudA Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public Cloud
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
IBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References GuideIBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References Guide
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
 

Destacado

FileStore 5.7
FileStore 5.7FileStore 5.7
FileStore 5.7Symantec
 
Attack Toolkits and Malicious Websites
Attack Toolkits and Malicious WebsitesAttack Toolkits and Malicious Websites
Attack Toolkits and Malicious WebsitesSymantec
 
Symantec 2011 Virtualization and Evolution to Cloud
Symantec 2011 Virtualization and Evolution to CloudSymantec 2011 Virtualization and Evolution to Cloud
Symantec 2011 Virtualization and Evolution to CloudSymantec
 
2013 State of Cloud Survey Global Results
2013 State of Cloud Survey Global Results2013 State of Cloud Survey Global Results
2013 State of Cloud Survey Global ResultsSymantec
 
Veritas Dynamic Multi-Pathing for VMware 6
Veritas Dynamic Multi-Pathing for VMware 6Veritas Dynamic Multi-Pathing for VMware 6
Veritas Dynamic Multi-Pathing for VMware 6Symantec
 
Symantec 2011 Small Business Virtualization Poll Global Findings August 2011
Symantec 2011 Small Business Virtualization Poll Global Findings August 2011Symantec 2011 Small Business Virtualization Poll Global Findings August 2011
Symantec 2011 Small Business Virtualization Poll Global Findings August 2011Symantec
 
Slide share apj symantec 2011 small business virtualization poll
Slide share   apj symantec 2011 small business virtualization pollSlide share   apj symantec 2011 small business virtualization poll
Slide share apj symantec 2011 small business virtualization pollwuiwuiyu
 

Destacado (7)

FileStore 5.7
FileStore 5.7FileStore 5.7
FileStore 5.7
 
Attack Toolkits and Malicious Websites
Attack Toolkits and Malicious WebsitesAttack Toolkits and Malicious Websites
Attack Toolkits and Malicious Websites
 
Symantec 2011 Virtualization and Evolution to Cloud
Symantec 2011 Virtualization and Evolution to CloudSymantec 2011 Virtualization and Evolution to Cloud
Symantec 2011 Virtualization and Evolution to Cloud
 
2013 State of Cloud Survey Global Results
2013 State of Cloud Survey Global Results2013 State of Cloud Survey Global Results
2013 State of Cloud Survey Global Results
 
Veritas Dynamic Multi-Pathing for VMware 6
Veritas Dynamic Multi-Pathing for VMware 6Veritas Dynamic Multi-Pathing for VMware 6
Veritas Dynamic Multi-Pathing for VMware 6
 
Symantec 2011 Small Business Virtualization Poll Global Findings August 2011
Symantec 2011 Small Business Virtualization Poll Global Findings August 2011Symantec 2011 Small Business Virtualization Poll Global Findings August 2011
Symantec 2011 Small Business Virtualization Poll Global Findings August 2011
 
Slide share apj symantec 2011 small business virtualization poll
Slide share   apj symantec 2011 small business virtualization pollSlide share   apj symantec 2011 small business virtualization poll
Slide share apj symantec 2011 small business virtualization poll
 

Similar a Simplify IT with Symantec's Cloud Solutions

Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxssuser365526
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...NetworkCollaborators
 
Learnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueLearnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueDan Mårtensson
 
2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinarAlgoSec
 
Security automation architecture principles for effective vulnerability manag...
Security automation architecture principles for effective vulnerability manag...Security automation architecture principles for effective vulnerability manag...
Security automation architecture principles for effective vulnerability manag...SecPod
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Symantec
 
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mwaresolarisyourep
 
Security as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionSecurity as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionMarketingArrowECS_CZ
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)Glenn Ambler
 
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecSegurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecCSA Argentina
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonDigital Catapult
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterVMUG IT
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud worldZscaler
 
Computacenter success story
Computacenter success storyComputacenter success story
Computacenter success storyMartin Rutkowski
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DaySymantec
 
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesPartnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesSutedjo Tjahjadi
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSMAU
 

Similar a Simplify IT with Symantec's Cloud Solutions (20)

Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
 
Learnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueLearnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business value
 
2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar
 
Security automation architecture principles for effective vulnerability manag...
Security automation architecture principles for effective vulnerability manag...Security automation architecture principles for effective vulnerability manag...
Security automation architecture principles for effective vulnerability manag...
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
 
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
 
Security as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionSecurity as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud Adoption
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
 
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecSegurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantec
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud world
 
Computacenter success story
Computacenter success storyComputacenter success story
Computacenter success story
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO Day
 
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesPartnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - Cisco
 

Más de Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantSymantec
 

Más de Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators Want
 

Último

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Último (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Simplify IT with Symantec's Cloud Solutions

  • 1. Simplify IT with Symantec’s Cloud-Based Solutions Ron Poserina Director, Enterprise & Partner Services Simplify IT with Symantec’s Cloud-Based Solutions 1
  • 2. Agenda 1 What are the Challenges and Complexities 2 Simplify IT with Symantec.cloud Services 3 Case in Point: Email Security 4 Case in Point: Web Security 5 Q&A Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 2
  • 3. Challenges of Managing IT • Being asked to do more with less • Upgrades & maintenance of current solutions • Investing in new technology to address changing business requirements • Keeping up with the threat landscape • Demand to support more devices • Mobile workforce Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 3
  • 4. IT Complexity Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 4
  • 5. The biggest concern of IT decision makers is their ability to support the growth of their business 66 % Source: Forrester - The Writing On IT's Complexity Wall - June 2010 Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 5
  • 6. Delta Airlines recently standardized their application portfolio following a 2008 merger with Northwest. After cutting the portfolio by 50% they still support 635 different applications Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 6
  • 7. more devices X more data X more applications X more users = exponential growth in complexity Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 7
  • 8. Complexity of Multiple Vendors • Juggling multiple vendor relationships • Inability to reduce costs through bundling • Multiple products to manage • Differing platforms and technologies to support and learn • Technical support Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 8
  • 9. Distributed and mobile workforce Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 9
  • 10. Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 10
  • 11. The consumerization of IT is forcing organizations to support a wider array of technologies, and mobility allows people to connect from any location - Enrique Salem Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 11
  • 12. Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 12
  • 13. Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 13
  • 14. Threat Landscape Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 14
  • 15. Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 15
  • 16. Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 16
  • 17. Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 17
  • 18. and it is not just email Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 18
  • 19. we blocked over 3,000 new websites with spyware or malware each day in 2010 Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 19
  • 20. and 77targeted attacks per day by the end of 2010 using complex social engineering tactics to dupe victims to steal information Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 20
  • 21. Number of Targeted Attacks per Day Globally SYMANTEC VISION 2011 21
  • 22. That’s where we come in… Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 22
  • 23. Simple to deploy 100% protection against both known & No HW/SW or unknown viruses Appliances Automatic updates 24/7 customer support as standard Easy to scale Pre-integrated apps Industry leading SLAs $ Pay as you go Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 23
  • 24. Symantec.cloud Service Portfolio • Email Security.cloud – AntiSpam – AntiVirus – Image Control – Content Control • Email Encryption.cloud • Email Archiving.cloud • Email Continuity.cloud Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 24
  • 25. Symantec.cloud Service Portfolio • Web Security.cloud – URL Filtering – AntiSpyware & AntiVirus – Roaming Users • Endpoint Protection.cloud • IM Security.cloud • Threat Management through Skeptic™ – Proprietary, Patented Heuristic Scanner – Converged Threat Analysis – 10+ Years in Development – 10GB+ of rules and algorithms Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 25
  • 26. Symantec.cloud Global Network 32,000 Clients with 10.9 3.8billion Email Connections 1.1billion 15 Web Access Data Centers are million users in 102 are processed each connections are incorporated, spanning countries to date day controlled each day four continents South Africa Symantec Hosted Services Technology Review SYMANTEC VISION 2011 26
  • 27. Symantec.cloud: Reaching the Goal of Simplification • IT Complexity – Single vendor, single portal, single point of support – SLA’s – No Hardware, software or appliances – Simple to budget for. CapEx vs. OpEx • Distributed and mobile workforce – Ensure users are protected while outside the corporate walls • Threat Landscape – Block threats BEFORE they come anywhere near your network – Global visibility and intelligence to stop advanced threats Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 27
  • 28. Case in Point: Email Security Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 28
  • 29. Case in Point: Email Security – Arnold Worldwide Business Requirements Business Value & Technical Benefits • Protection against malware • Quick and easy deployment infections as a hosted service • Reduce help desk calls and • Minimal IT support require increase IT productivity to maintain service • Secure communications • Increase end-user and IT • No client/server software department productivity installation or maintenance Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 29
  • 30. Case in Point: Email Security – Perkins Eastman Business Requirements Business Value & Technical Benefits • Prevent damage from email- • Improved Security borne viruses – Five years with no significant damage from viruses or malware • Reduce time employees – 99% of spam captured before reaching the email gateway spend managing spam • Operational Benefits • Minimize IT staff spent – 37,000 hours/year reclaimed for end users managing email and Web – Payback in weeks security – Self-service management of spam • IT Staff Benefits – 50% reduction in IT staff time spent managing email security – 12 hours/week reclaimed in IT staff time – Five minutes to deploy Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 30
  • 31. How Symantec.cloud Simplifies Email Security • No Hardware / No Software • Symantec.cloud becomes an extension of your network • Predictive Threat Protection through Skeptic™ • Block unwanted content BEFORE it enters your environment • Seamless updates and enhancements • Adds resiliency to your email Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 31
  • 32. Case in Point: Web Security Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 32
  • 33. Case in Point: Web Security – Groupo Lamosa Business Requirements Business Value & Technical Benefits • Enhance protection against • Security and data protection threats at the Internet and – 28,000 Web-borne threats blocked in endpoints first 10 months – No disruption from malicious code since • Increase employee deployment on protected systems productivity • Operational and cost efficiency • Reduce IT overhead – 100% payback because Web filtering reclaims tens of thousands of hours of • Improve data protection and employee productivity server recovery – Projected ability to delay up to $30,000 in server purchases – Up to 520 IT staff hours available for more valuable tasks Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 33
  • 34. How Symantec.cloud Simplifies Web Security • Simple to Deploy • Doesn’t require hardware/software or appliances • Flexible solutions for the mobile workforce • Simple yet flexible policy management • Seamless updates and enhancements Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 34
  • 35. In Review: Simplify IT with Symantec’s Cloud-Based Solutions • Reduce the need to deploy & support solutions yourself • Instantly boost security posture with best of breed technology • Simplify Budgeting • Vendor Consolidation • Ease of control and management across multiple services • Protect the Mobile Workforce • Service Level Agreements • Symantec.cloud scales and grows with your business Simplify IT with Symantec’s Cloud-Based Solutions SYMANTEC VISION 2011 35
  • 36. Thank you! Ronald Poserina (646) 519-8121 Ronald_poserina@symantec.com Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Simplify IT with Symantec’s Cloud-Based Solutions 36