SlideShare a Scribd company logo
11/7/2018 1www.secdata.com
Nick King, CISSP
Pre-Sales Consultant
November 2018
11/7/2018 2www.secdata.com
• “Content is King”
• Why SecureData feel Symantec are the right choice
• A unique relationship and exclusive bundles
• Partner Status = Gold Reseller / Gold Competency
Content is King
Clive Finlay
6th November 2018
Director, Sales Engineering
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Complex User Definition
Evolving Data Attack Surface
Expanding Perimeter
Multi-Phased, Multi-Staged Attacks
4
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Data Growth
• 2.5 Billion GB of data created every day (2)
• Total data footprint of 40 Trillion GB by 2020 (2)
• Only 3% of data is understood (2)
0
10
20
30
40
50
60
70
80
90
2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022
(2) IDC - Data Growth, Business Opportunities, and the IT Imperatives
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
The ramifications of an data breach
• Confidentiality
• Integrity
• Availability
Loss in
company
revenue
$X Negative impact
on share price
Average cost of a
data breach (1)€3.5M
Loss of existing
customers and
new business
Damage to business reputation – Local,
National and International
Increase in total cost of
data breach since 2013 (1)29% Average cost per
stolen record (1)€140
(1) Ponemon – 2016 Cost of Data Breach Study: Global Analysis
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Complex User Definition
7
Regional
Office
Headquarters
Data Center
Security Stack
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Complex User Definition
Regional
Office
Headquarters
Data Center
Roaming
Users
Security Stack
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Evolving Data Attack Surface
Regional
Office
Headquarters
Data Center
Roaming
Users
Security Stack
• (3)48% of employees don’t think about
the security risks when transferring or
sharing documents via the cloud.
• (3)25% of employees use cloud tools
without IT approval.
• (3)79% of employees admit to engaging
in risky behaviour.
• (3)68% of executives are reluctant to
embrace cloud services.
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Direct Connect Creates Expanded Networks to Protect
The Expanding Network
Regional
Office
Headquarters
Data Center
Roaming
Users
SSL Encryption
SSL Encryption
Security Stack
SSL Encryption
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Multi-Phased and Multi-Staged Attacks
Regional
Office
Headquarters
Data Center
Roaming
Users
Security Stack
SSL Encryption
SSL Encryption
SSL Encryption
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Get Control: Key Termination Points
PROXY
EMAIL
CLOUD APPS
ENDPOINT
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Get Control: Information Centric Security
INFORMATION
PROTECTION
DLP
Multifactor Authentication
Encryption
Information Centric Analytics
Discovery and Compliance
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only 14
“Symantec offers the most comprehensive sensitive data detection techniques in the market,
with advanced functionality that can cover a wide breadth of data loss scenarios.”1
Forms Images, Optical
Character Recognition
SENSITIVE IMAGE
RECOGNITION
IMAGES
Source Code,
Product Designs
VECTOR MACHINE
LEARNING
UNSTRUCTURED TEXT
Financial Reports,
Marketing Plans
INDEXED DOCUMENT
MATCHING
UNSTRUCTURED DATA
Non-indexable data
DESCRIBED CONTENT
MATCHING
DESCRIBED DATA
Account Numbers, Credit
Cards, Government IDs,
EXACT DATA
MATCHING
STRUCTURED DATA
¹ Source: Magic Quadrant for Data Loss Prevention, Gartner, January 2016
Gives you the highest accuracy and minimizes false positives
Comprehensive Data Detection
A best practice for
unstructured content
15
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Locate where your sensitive
information resides across
your cloud, mobile, network,
endpoint and storage systems
DISCOVER
Where does your
confidential data live?
Understand how your
sensitive information is being
used, including what data is
being handled and by whom
MONITOR
How is it being used?
Stop sensitive information
from being leaked or stolen
by enforcing data loss policies
and educating employees
PROTECT
How do you prevent
data loss?
Answers these critical questions about your content
Understand your information
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
SECURED CORPORATE LAN
Roaming
DLP
ENDPOINT DLP MANAGEMENT
CONSOLE
UNIFIED
MANAGEMENT
17
DISCOVER MONITOR PROTECT
Tagging
ICE
Analytics
DLP
CLOUD
Cloud
Email
CASB
SaaS
1010110
0110101
Cloud
Proxy
(WSS)
DLP
STORAGE
DMZ
SPAN Port or Tap
MTA / Proxy
DLP
NETWORK
In the cloud
All control
points
Single pane
of glass
Mobile
& BYOD
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
ICE: Your Security Policy Follows Your Data
Shadow
Cloud
DLP protects sensitive data discovered within the organization:
storage, endpoints and network1
DLP
1
2
Users
User-Tagging augments DLP to identify sensitive data and apply
classification2
DLP Cloud extends the same DLP protection to sensitive data in
cloud repositories via CASB3
Cloud App Security Broker (CASB)
DLP
Cloud CASB
3
ICE
(PGP)
DLP triggers PGP encryption that travels with the data
everywhere outside of my control4
4
Partners
Vendors
Contractors
BYO
Unmanaged
Devices
Data Privacy and Residency: YOU CONTROL THE KEYS
Identity drives decryption of data5
VIP
5
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
ICE Demo Video….
DATA
DATA
Data Loss Prevention (DLP)
Discover and protect sensitive data
across all egress points
Info-Centric Encryption (ICE)
Protect data with encryption
and rights management
Validation and ID Protection Service (VIP)
Secure data access with Multi-Factor Authentication
DATA
CloudSOC (CASB)
Extend DLP policies and robust
detection to Cloud Apps
Info-Centric Tagging (ICT)
Enable users to classify data
Info-Centric Analytics (ICA)
Detect breaches with
User Entity Behavior Analytics
Data Loss Prevention (DLP)
Discover and protect sensitive data
across all egress points
Info-Centric Encryption (ICE)
Protect data with encryption
and rights management
Validation and ID Protection Service (VIP)
Secure data access with Multi-Factor Authentication
What’s next?
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
Symantec Endpoint Protection
Introducing SEP 15 evergreen
Modern Security for a Modern World
**Out in November!**
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
2019: The Last
Integration
SEP DLP
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
User Case: Data Exfiltration Protection
Copyright © 2017 Symantec Corporation
26
Remediate unauthorized
processes attempting to
access sensitive data
Block unauthorized
processes from accessing
sensitive data
Allow authorized processes
to access sensitive data
Data exfiltration attempt
blocked by SEP Hardening
Use Case
1. User downloads and runs file
2. SEP detects file as suspicious
3. App Isolation runs file in
Suspicious file executes by
use
4. Initiate upgrade to
recommended version which
is not vulnerable
5. OR, Apply recommended
patch on vulnerable
application version
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
SEP+DLP Demo Video….
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only
CONTENT IS KING
Thank You!
Clive Finlay
Clive_finlay@symantec.com
@CliveFinlay
11/7/2018 30www.secdata.com
• Symantec, a leader!
• Questions?

More Related Content

Content is King - Symantec

  • 1. 11/7/2018 1www.secdata.com Nick King, CISSP Pre-Sales Consultant November 2018
  • 2. 11/7/2018 2www.secdata.com • “Content is King” • Why SecureData feel Symantec are the right choice • A unique relationship and exclusive bundles • Partner Status = Gold Reseller / Gold Competency
  • 3. Content is King Clive Finlay 6th November 2018 Director, Sales Engineering
  • 4. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Complex User Definition Evolving Data Attack Surface Expanding Perimeter Multi-Phased, Multi-Staged Attacks 4
  • 5. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Data Growth • 2.5 Billion GB of data created every day (2) • Total data footprint of 40 Trillion GB by 2020 (2) • Only 3% of data is understood (2) 0 10 20 30 40 50 60 70 80 90 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 (2) IDC - Data Growth, Business Opportunities, and the IT Imperatives
  • 6. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only The ramifications of an data breach • Confidentiality • Integrity • Availability Loss in company revenue $X Negative impact on share price Average cost of a data breach (1)€3.5M Loss of existing customers and new business Damage to business reputation – Local, National and International Increase in total cost of data breach since 2013 (1)29% Average cost per stolen record (1)€140 (1) Ponemon – 2016 Cost of Data Breach Study: Global Analysis
  • 7. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Complex User Definition 7 Regional Office Headquarters Data Center Security Stack
  • 8. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Complex User Definition Regional Office Headquarters Data Center Roaming Users Security Stack
  • 9. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Evolving Data Attack Surface Regional Office Headquarters Data Center Roaming Users Security Stack • (3)48% of employees don’t think about the security risks when transferring or sharing documents via the cloud. • (3)25% of employees use cloud tools without IT approval. • (3)79% of employees admit to engaging in risky behaviour. • (3)68% of executives are reluctant to embrace cloud services.
  • 10. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Direct Connect Creates Expanded Networks to Protect The Expanding Network Regional Office Headquarters Data Center Roaming Users SSL Encryption SSL Encryption Security Stack SSL Encryption
  • 11. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Multi-Phased and Multi-Staged Attacks Regional Office Headquarters Data Center Roaming Users Security Stack SSL Encryption SSL Encryption SSL Encryption
  • 12. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Get Control: Key Termination Points PROXY EMAIL CLOUD APPS ENDPOINT
  • 13. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Get Control: Information Centric Security INFORMATION PROTECTION DLP Multifactor Authentication Encryption Information Centric Analytics Discovery and Compliance
  • 14. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only 14 “Symantec offers the most comprehensive sensitive data detection techniques in the market, with advanced functionality that can cover a wide breadth of data loss scenarios.”1 Forms Images, Optical Character Recognition SENSITIVE IMAGE RECOGNITION IMAGES Source Code, Product Designs VECTOR MACHINE LEARNING UNSTRUCTURED TEXT Financial Reports, Marketing Plans INDEXED DOCUMENT MATCHING UNSTRUCTURED DATA Non-indexable data DESCRIBED CONTENT MATCHING DESCRIBED DATA Account Numbers, Credit Cards, Government IDs, EXACT DATA MATCHING STRUCTURED DATA ¹ Source: Magic Quadrant for Data Loss Prevention, Gartner, January 2016 Gives you the highest accuracy and minimizes false positives Comprehensive Data Detection
  • 15. A best practice for unstructured content 15
  • 16. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Locate where your sensitive information resides across your cloud, mobile, network, endpoint and storage systems DISCOVER Where does your confidential data live? Understand how your sensitive information is being used, including what data is being handled and by whom MONITOR How is it being used? Stop sensitive information from being leaked or stolen by enforcing data loss policies and educating employees PROTECT How do you prevent data loss? Answers these critical questions about your content Understand your information
  • 17. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only SECURED CORPORATE LAN Roaming DLP ENDPOINT DLP MANAGEMENT CONSOLE UNIFIED MANAGEMENT 17 DISCOVER MONITOR PROTECT Tagging ICE Analytics DLP CLOUD Cloud Email CASB SaaS 1010110 0110101 Cloud Proxy (WSS) DLP STORAGE DMZ SPAN Port or Tap MTA / Proxy DLP NETWORK In the cloud All control points Single pane of glass Mobile & BYOD
  • 18. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only ICE: Your Security Policy Follows Your Data Shadow Cloud DLP protects sensitive data discovered within the organization: storage, endpoints and network1 DLP 1 2 Users User-Tagging augments DLP to identify sensitive data and apply classification2 DLP Cloud extends the same DLP protection to sensitive data in cloud repositories via CASB3 Cloud App Security Broker (CASB) DLP Cloud CASB 3 ICE (PGP) DLP triggers PGP encryption that travels with the data everywhere outside of my control4 4 Partners Vendors Contractors BYO Unmanaged Devices Data Privacy and Residency: YOU CONTROL THE KEYS Identity drives decryption of data5 VIP 5
  • 19. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only ICE Demo Video….
  • 20. DATA
  • 21. DATA Data Loss Prevention (DLP) Discover and protect sensitive data across all egress points Info-Centric Encryption (ICE) Protect data with encryption and rights management Validation and ID Protection Service (VIP) Secure data access with Multi-Factor Authentication
  • 22. DATA CloudSOC (CASB) Extend DLP policies and robust detection to Cloud Apps Info-Centric Tagging (ICT) Enable users to classify data Info-Centric Analytics (ICA) Detect breaches with User Entity Behavior Analytics Data Loss Prevention (DLP) Discover and protect sensitive data across all egress points Info-Centric Encryption (ICE) Protect data with encryption and rights management Validation and ID Protection Service (VIP) Secure data access with Multi-Factor Authentication
  • 24. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only Symantec Endpoint Protection Introducing SEP 15 evergreen Modern Security for a Modern World **Out in November!**
  • 25. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only 2019: The Last Integration SEP DLP
  • 26. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only User Case: Data Exfiltration Protection Copyright © 2017 Symantec Corporation 26 Remediate unauthorized processes attempting to access sensitive data Block unauthorized processes from accessing sensitive data Allow authorized processes to access sensitive data Data exfiltration attempt blocked by SEP Hardening Use Case 1. User downloads and runs file 2. SEP detects file as suspicious 3. App Isolation runs file in Suspicious file executes by use 4. Initiate upgrade to recommended version which is not vulnerable 5. OR, Apply recommended patch on vulnerable application version
  • 27. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only SEP+DLP Demo Video….
  • 28. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY– Limited Use Only CONTENT IS KING
  • 30. 11/7/2018 30www.secdata.com • Symantec, a leader! • Questions?