Content is King - Symantec
- 2. 11/7/2018 2www.secdata.com
• “Content is King”
• Why SecureData feel Symantec are the right choice
• A unique relationship and exclusive bundles
• Partner Status = Gold Reseller / Gold Competency
- 4. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Complex User Definition
Evolving Data Attack Surface
Expanding Perimeter
Multi-Phased, Multi-Staged Attacks
4
- 5. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Data Growth
• 2.5 Billion GB of data created every day (2)
• Total data footprint of 40 Trillion GB by 2020 (2)
• Only 3% of data is understood (2)
0
10
20
30
40
50
60
70
80
90
2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022
(2) IDC - Data Growth, Business Opportunities, and the IT Imperatives
- 6. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
The ramifications of an data breach
• Confidentiality
• Integrity
• Availability
Loss in
company
revenue
$X Negative impact
on share price
Average cost of a
data breach (1)€3.5M
Loss of existing
customers and
new business
Damage to business reputation – Local,
National and International
Increase in total cost of
data breach since 2013 (1)29% Average cost per
stolen record (1)€140
(1) Ponemon – 2016 Cost of Data Breach Study: Global Analysis
- 7. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Complex User Definition
7
Regional
Office
Headquarters
Data Center
Security Stack
- 8. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Complex User Definition
Regional
Office
Headquarters
Data Center
Roaming
Users
Security Stack
- 9. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Evolving Data Attack Surface
Regional
Office
Headquarters
Data Center
Roaming
Users
Security Stack
• (3)48% of employees don’t think about
the security risks when transferring or
sharing documents via the cloud.
• (3)25% of employees use cloud tools
without IT approval.
• (3)79% of employees admit to engaging
in risky behaviour.
• (3)68% of executives are reluctant to
embrace cloud services.
- 10. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Direct Connect Creates Expanded Networks to Protect
The Expanding Network
Regional
Office
Headquarters
Data Center
Roaming
Users
SSL Encryption
SSL Encryption
Security Stack
SSL Encryption
- 11. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Multi-Phased and Multi-Staged Attacks
Regional
Office
Headquarters
Data Center
Roaming
Users
Security Stack
SSL Encryption
SSL Encryption
SSL Encryption
- 12. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Get Control: Key Termination Points
PROXY
EMAIL
CLOUD APPS
ENDPOINT
- 13. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Get Control: Information Centric Security
INFORMATION
PROTECTION
DLP
Multifactor Authentication
Encryption
Information Centric Analytics
Discovery and Compliance
- 14. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only 14
“Symantec offers the most comprehensive sensitive data detection techniques in the market,
with advanced functionality that can cover a wide breadth of data loss scenarios.”1
Forms Images, Optical
Character Recognition
SENSITIVE IMAGE
RECOGNITION
IMAGES
Source Code,
Product Designs
VECTOR MACHINE
LEARNING
UNSTRUCTURED TEXT
Financial Reports,
Marketing Plans
INDEXED DOCUMENT
MATCHING
UNSTRUCTURED DATA
Non-indexable data
DESCRIBED CONTENT
MATCHING
DESCRIBED DATA
Account Numbers, Credit
Cards, Government IDs,
EXACT DATA
MATCHING
STRUCTURED DATA
¹ Source: Magic Quadrant for Data Loss Prevention, Gartner, January 2016
Gives you the highest accuracy and minimizes false positives
Comprehensive Data Detection
- 16. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Locate where your sensitive
information resides across
your cloud, mobile, network,
endpoint and storage systems
DISCOVER
Where does your
confidential data live?
Understand how your
sensitive information is being
used, including what data is
being handled and by whom
MONITOR
How is it being used?
Stop sensitive information
from being leaked or stolen
by enforcing data loss policies
and educating employees
PROTECT
How do you prevent
data loss?
Answers these critical questions about your content
Understand your information
- 17. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
SECURED CORPORATE LAN
Roaming
DLP
ENDPOINT DLP MANAGEMENT
CONSOLE
UNIFIED
MANAGEMENT
17
DISCOVER MONITOR PROTECT
Tagging
ICE
Analytics
DLP
CLOUD
Cloud
Email
CASB
SaaS
1010110
0110101
Cloud
Proxy
(WSS)
DLP
STORAGE
DMZ
SPAN Port or Tap
MTA / Proxy
DLP
NETWORK
In the cloud
All control
points
Single pane
of glass
Mobile
& BYOD
- 18. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
ICE: Your Security Policy Follows Your Data
Shadow
Cloud
DLP protects sensitive data discovered within the organization:
storage, endpoints and network1
DLP
1
2
Users
User-Tagging augments DLP to identify sensitive data and apply
classification2
DLP Cloud extends the same DLP protection to sensitive data in
cloud repositories via CASB3
Cloud App Security Broker (CASB)
DLP
Cloud CASB
3
ICE
(PGP)
DLP triggers PGP encryption that travels with the data
everywhere outside of my control4
4
Partners
Vendors
Contractors
BYO
Unmanaged
Devices
Data Privacy and Residency: YOU CONTROL THE KEYS
Identity drives decryption of data5
VIP
5
- 19. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
ICE Demo Video….
- 21. DATA
Data Loss Prevention (DLP)
Discover and protect sensitive data
across all egress points
Info-Centric Encryption (ICE)
Protect data with encryption
and rights management
Validation and ID Protection Service (VIP)
Secure data access with Multi-Factor Authentication
- 22. DATA
CloudSOC (CASB)
Extend DLP policies and robust
detection to Cloud Apps
Info-Centric Tagging (ICT)
Enable users to classify data
Info-Centric Analytics (ICA)
Detect breaches with
User Entity Behavior Analytics
Data Loss Prevention (DLP)
Discover and protect sensitive data
across all egress points
Info-Centric Encryption (ICE)
Protect data with encryption
and rights management
Validation and ID Protection Service (VIP)
Secure data access with Multi-Factor Authentication
- 24. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Symantec Endpoint Protection
Introducing SEP 15 evergreen
Modern Security for a Modern World
**Out in November!**
- 25. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
2019: The Last
Integration
SEP DLP
- 26. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
User Case: Data Exfiltration Protection
Copyright © 2017 Symantec Corporation
26
Remediate unauthorized
processes attempting to
access sensitive data
Block unauthorized
processes from accessing
sensitive data
Allow authorized processes
to access sensitive data
Data exfiltration attempt
blocked by SEP Hardening
Use Case
1. User downloads and runs file
2. SEP detects file as suspicious
3. App Isolation runs file in
Suspicious file executes by
use
4. Initiate upgrade to
recommended version which
is not vulnerable
5. OR, Apply recommended
patch on vulnerable
application version
- 27. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
SEP+DLP Demo Video….
- 28. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
CONTENT IS KING