基于云计算的安全防护解决方案_第1页
基于云计算的安全防护解决方案_第2页
基于云计算的安全防护解决方案_第3页
基于云计算的安全防护解决方案_第4页
基于云计算的安全防护解决方案_第5页
已阅读5页,还剩39页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、Delivering Integrated Cyber Defense in the Cloud Generation基于云计算的安全防护解决方案复杂的用户定义区域办 公室总部数据 中心Security Stack2复杂的用户定义Security Stack区域办 公室远程 用户个人设备3总部数据 中心演进的数据攻击面Security Stack远程 用户个人设备4区域办 公室总部数据 中心扩展中的网络SSL EncryptionSSL EncryptionSecurity Stack远程 用户个人设备物联网设备5区域办 公室总部数据 中心SSL Encryption多阶段,多维度的攻击SSL

2、 EncryptionSSL EncryptionSecurity Stack远程 用户个人设备物联网设备6区域办 公室总部数据 中心SSL Encryption云时代的创新:确保安全地使用云区域办 公室远程 用户个人设备物联网设备7总部数据 中心集成的网络防御8集成的网络防御9集成的网络防御10集成的网络防御11集成的网络防御1216FileURLWhitelist Blacklist CertificateMachine Learning1.75亿被保护的企业和个人终端9 全球威胁响应中心3000+ 工程师和研究人员10 亿每日全新的未分类Web请求20 亿每天扫描的电子邮件全球情报网 络

3、(GIN) :182M阻止的Web攻击发现430 million新的恶意软件,在去年 一年的时间18,000+防护的云应用100M阻止了如此多的 社会工程诈骗阻止了1B封恶意邮件64,000+保护的数据中心GINxGIN=GIN2last yearCyber Security ServicesA Comprehensive Integrated Portfolio for Every Stage of the Attack LifecycleTrack and Analyze Adversary Groups and Key Trends and Events around the globe

4、 for Actionable IntelligenceDeepSight IntelligenceDetect and Proactively Hunt for Targeted Attacks, Advanced Threats and CampaignsManaged Security ServicesRespond Quickly and Effectively to Credible Security Threats and IncidentsIncident ResponseStrengthen Cyber Readiness to Build Employee Resilienc

5、y and Prevent Sophisticated AttacksCyber Skills DevelopmentWorld-Class Security ExpertiseReactive to ProactiveIntegrated, End-to-End SecurityBefore an AttackDuring an AttackAfter an AttackPreparing for an AttackPRODUCTS14FileURLWhitelist Blacklist CertificateMachine LearningCyber Security Services集成

6、的网络安全1520近期其他重要收购24Tagging:User-Centric ClassificationDLP:Content-Centric ClassificationWatchful RightsWATCH User and policy-driven tagging, classification, and watermarkingClassification is KeyData at RestNew Data CreatedCloud Data (CASB)Network Data (Email, Web)EmailOfficeMobileEndpoint DataICT GA

7、June 2017Existing DataDLPMarket LeaderntecWCorapotrcathionful Integration, ICT Kick-off May225Skycure Solution OverviewTHREAT INTELLIGENCECrowd-sourced3rd party threat aggregation Skycure researchCLOUD SERVERRisk/compliance visibility Advanced security Automation & integrationPUBLIC APPSimple deploy

8、ment & maintenance Ensured privacyMinimal footprintConsistent across Managed & Unmanaged scenariosEMMEMM26Branch OfficeRoaming UsersGINConsoleSandboxSymantec Endpoint Protection 14Skycure Mobile Threat DefenseSymantec Endpoint Detection and ResponseSymantec Endpoint Protection CloudHeadquarters Data

9、 CenterPersonal DevicesSymantec Endpoint Security FamilySkycureSkycure27Intelligence ServicesFireglass - Proxy Policies Set to Isolate Risky TrafficUsers123Content & Malware AnalysisAllow trusted sitesBlock known bad sites Analyze risky with CA/MA4Isolate uncategorized/risky sites where accessCopyri

10、gihst ne20e1d6 eSydmantec CorporationCategorized Trusted SitesAllow1Categorized Bad SitesBlock2Uncategorized/Risky WebsitesIsolate4Risky SitesAnalyze3?Integration with Email SecurityIsolates links in email so users can safely click on themIsolates attachments eliminating the risk of malware from dow

11、nloaded filesSymantec Messaging Solutions28Symantec Secure Web Gateways with FireglassHeadquarters Data CenterSymantec Web Security Service (WSS)Threat Protection, Information Security, & Access GovernanceFireglass adds threat isolation for risky and uncategorized sitesRegional OfficePROXYPROXYSyman

12、tec ProxySG2930Leadership Slides for Gartner MQs31Symantecs Leadership in 2016 Gartner Magic QuadrantsGartner Magic Quadrant for Managed Security Services, Worldwide(December 2015)Gartner Magic Quadrant for Endpoint Protection Platforms (February 2016)Gartner Magic Quadrant for Enterprise Data Loss

13、Prevention (January 2016)Gartner Magic Quadrant for Secure Web Gateways (June 2016)This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request fromSymantec. Gart

14、ner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartners research organization and shou

15、ld not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose32Blue Coat (Now Symantec) is Named a Leader in 2016 Gartner Magic Quadrant for Secure Web

16、Gateways:Positioned Highest for Ability to ExecuteThis Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from Symantec. Gartner does not endorse any vendor,

17、 product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartners research organization and should not be construed as statement

18、s of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purposeSource: Magic Quadrant for Secure Web Gateways, Lawrence Orans, Peter Firstbrook, 06 June 2016, Gartner, Inc.33Symantec Nam

19、ed a Leader in the Dec 2015 Gartner Magic Quadrant for Managed Security Services, WorldwideThis Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from Syman

20、tec. Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartners research organization

21、 and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purposeSource: Gartner, Inc., Magic Quadrant for Managed Security Services, Worldwide, Ke

22、lly M. Kavanagh, Toby Bussa, December 23, 201534Symantec Hits Another Milestone 14 Years Running a Leader in Gartner Magic Quadrant for Endpoint Protection Platforms Positioned Highest in Ability to ExecuteThis Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note a

23、nd should be evaluated in the context of the entire report. The Gartner report is available upon request from Symantec. Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ra

24、tings or other designation. Gartner research publications consist of the opinions of Gartners research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or

25、 fitness for a particular purposeSource: Magic Quadrant for Endpoint Protection Platforms, Peter Firstbrook, Eric Ouellet, February 1, 2016Symantec is Named a Leader in 2016 Gartner Magic Quadrant for Enterprise Data Loss Prevention:Positioned Furthest for Ability to Execute and Completeness of Visi

26、onThis Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from Symantec. Gartner does not endorse any vendor, product or service depicted in our research pub

27、lications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartners research organization and should not be construed as statements of fact. Gartner disclaims all warranties, exp

28、ressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purposeSource: Magic Quadrant for Enterprise Data Loss Prevention, Brian Reed, Neil Wynne 28 January 2016, Gartner, Inc.3536Leadership Slides for Forrester Waves37Symantecs Leade

29、rship in 2016 Forrester WavesThe Forrester Wave: Endpoint Security Suites, Q4 2016The Forrester Wave: Automated Malware Analysis, Q2 2016The Forrester Wave: Data Loss Prevention Suites, Q4 2016The Forrester Wave: Cloud Security Gateways, Q4 2016Blue Coat (Symantec) Positioned as a Leader in The Forr

30、ester Wave: Automated Malware Analysis, Q2 2016The Forrester Wave is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forresters call on a market and is plotted using a detailed spreads

31、heet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.Source: April 2016, The Forrester Wave: Aut

32、omated Malware Analysis, Q2 2016“Blue Coat integrates malware analysis into a strong investigation- focused suite”- The Forrester Wave: Automated Malware Analysis, Q2 201638Symantec Positioned as a Leader in The Forrester Wave: Endpoint Security Suites, Q4 2016Source: October 2016 The Forrester Wave

33、: Endpoint Security Suites, Q4 2016The Forrester Wave is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forresters call on a market and is plotted using a detailed spreadsheet with ex

34、posed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.“Symantec offers the most complete endpoint security su

35、ite on the market” - The Forrester Wave: Endpoint Security Suites, Q4 201639Symantec DLP Named as a LeaderForrester Wave: Data Loss Prevention Suites, Q4 2016Source: November 2016, The Forrester Wave: Data Loss Prevention Suites, Q4 2016The Forrester Wave is copyrighted by Forrester Research, Inc. F

36、orrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forresters call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service

37、 depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.“Symantec provides a comprehensive DLP suite with robust capabilities.”“It also offers a rich set of capabilities to help firms meet privacy requirements

38、.”“Symantec continues to innovate in this space and has strong brand recognition in the DLP market.”40Symantec* Named a Leader with the Highest Score in Current Offering in Cloud Security Gateway (CASB)First Forrester Wave in Cloud Security GatewayThe Forrester Wave is copyrighted by Forrester Resea

39、rch, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forresters call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product,

40、 or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.Source: November 2016, The Forrester Wave: Cloud Security Gateways, Q4 2016*Forrester evaluated Blue Coat in the evaluation, which was acquire

41、d by Symantec“It has strong capabilities for Salesforce and other structured data protection, including search, sort, and filtering operations, and offers a wide selection of encryption and decryption policy options.”4142Leadership Slides for IDC Market Share#1 Market Share Leader in Worldwide IT Se

42、curity ProductsSymantec, 11.4%43Cisco, 6.6%IBM, 5.4%Checkpoint,4.6%Others, 65.4%Intel, 6.6%*Source: Elizabeth Corr, Robert Ayoub, Christian A. Christiansen, Angela Gelnaw, Sean Pike, Robert Westervelt, Worldwide IT Security Products Market Shares, 2014: Comprehensive Security Product View, December

43、2015#1 Overall Market Share Leader in Endpoint Security MarketIntel Security, 15.8%Symantec, 27.6%*Source: Robert Westervelt, Elizabeth Corr, Sean Pike,IDC Worldwide Endpoint Security Market Shares, 2015: Currency Volatility Headwind, November 201644Trend Micro, 9.9%Kaspersky Lab, 7.2%ESET, 5.4%AVGT

44、echnologies, 3.9%Others, 30.2%#1 Market Share Leader in Corporate Endpoint Security MarketIntel Security, 17.1%Symantec, 18.2%*Source: Robert Westervelt, Elizabeth Corr, Sean Pike,IDC Worldwide Endpoint Security Market Shares, 2015: Currency Volatility Headwind, November 201644Sophos, 6.0%ESET, 6.0%Trend Micro, 11.7%Kaspersky Labs, 5.3%Others, 35.7%#1 Market Share Leader in Corporate Endpoint Access and Information Protection MarketSymantec, 23.0%*Source: Robert Westervelt, Elizabeth Corr, Sean Pike,IDC Worldwide Endpoint Security Market Shares, 2015: Currency Volatil

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论