190 likes | 195 Views
Learn how to protect your organization from targeted attacks on intellectual property and build a strong defense with Symantec's comprehensive security suites. Explore the anatomy of a breach and discover strategies to develop and enforce IT policies, protect sensitive information, and manage systems effectively. Join us for this informative program to stay ahead of potential threats to your intellectual property.
E N D
Q1: Joint ISO/Marketing Program: Security Penney Farris April 29, 2010
Program Agenda April 29 – Targeted Attacks on Intellectual Property May 4 – Altiris 7.0 May 25 – Data Loss Prevention 10.5* June 1 – Control Compliance Suite 10.0* June 8 – Symantec Protection Suite* June 9 – Call Blitz focusing on above messaging and products * Tentative schedule
Targeted Attacks on Intellectual Property David Dorosin Director of Product Marketing, DLP and Compliance April 29, 2010 Targeted Attacks on Intellectual Property
Agenda Symantec’s Unique Vantage Point 1 Targeted Attacks on Intellectual Property 2 New Security Suites from Symantec 3 Targeted Attacks on Intellectual Property
Building a “Community of Defense” with Businesses Targeted Attacks on Intellectual Property
Anatomy of a Breach Targeted Attacks on Intellectual Property
Dissecting Hydraq Hi, I met you at the Malware Conference last month. Wanted to let you know I got this great shot of you doing your presentation. I posted it here: Incursion Attacker breaks into the network by delivering targeted malware to vulnerable systems and employees Organized Criminal Organized Criminal Targeted Attacks on Intellectual Property
Dissecting Hydraq Discovery Hacker maps organization’s defenses from the inside and creates battle plan Organized Criminal Organized Criminal Targeted Attacks on Intellectual Property
Dissecting Hydraq Capture Attacker accesses data on unprotected systems and installs malware to secretly acquire crucial data Organized Criminal Organized Criminal Targeted Attacks on Intellectual Property
Dissecting Hydraq Hydraq Attacker Exfiltration Confidential data sent back to enemy’s “home base” for exploitation and fraud Victim Organized Criminal Organized Criminal 72.3.224.71:443 Targeted Attacks on Intellectual Property
Mass Attack vs. Targeted Attack Incursion Discovery Capture Exfiltration Targeted Attacks on Intellectual Property
The Challenges Develop and Enforce IT Policies Protect The Information Manage Systems Protect The Infrastructure Targeted Attacks on Intellectual Property
Comprehensive Security Strategy is Required Risk Based and Policy Driven IT Governance, Risk and Compliance Information - Centric Information Risk Management Operationalized Infrastructure Management Well Managed Infrastructure Infrastructure Protection Targeted Attacks on Intellectual Property
New Security Suites Meet These Challenges Develop and Enforce IT Policies Protect the Information Manage Systems Protect the Infrastructure Targeted Attacks on Intellectual Property
Develop and Enforce IT Policies Key Benefits New in Version 10.0 • Define risk and develop IT policies • Assess infrastructure and processes • Report, monitor and demonstrate due care • Remediate problems • Centralized evidence collection and management • Dynamic web-based dashboards • Integration with Symantec Data Loss Prevention • New CCS Vulnerability Manager Targeted Attacks on Intellectual Property
Protect the Information • Discover where sensitive information resides • Monitor how data is being used • Protect sensitive information from loss Key Benefits New in Version 10.5 • Better visibility and control of unstructured data • Enhanced protection for social media sites • Twitter, LinkedIn, YouTube, … • New protection for private clouds (Citrix) • New endpoint option for less complex environments Targeted Attacks on Intellectual Property
Manage Systems Key Benefits New in Version 7.0 • Implement secure operating environments • Distribute and enforce patch levels • Automate processes to streamline efficiency • Monitor and report on system status • New comprehensive suite that brings together all Altiris components • Automated end to end Windows 7 migration process • Intelligent software management providing complete visibility • Process automation of complex, time-consuming IT tasks Targeted Attacks on Intellectual Property
Protect the Infrastructure • Improved Visibility into Security & Operations • Stronger Protection • Accelerated Remediation • Containment of Security Expenses Key Benefits What’s New • Symantec Protection Center: • Next generation security management solution • Simplifies management & improves security posture • Symantec Protection Suites: • Three new suites designed to meet the needs of enterprise IT personnel in endpoint, gateway and server functions Targeted Attacks on Intellectual Property