




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、Delivering Integrated Cyber Defense in the Cloud Generation基于云计算的安全防护解决方案复杂的用户定义区域办 公室总部数据 中心Security Stack2复杂的用户定义Security Stack区域办 公室远程 用户个人设备3总部数据 中心演进的数据攻击面Security Stack远程 用户个人设备4区域办 公室总部数据 中心扩展中的网络SSL EncryptionSSL EncryptionSecurity Stack远程 用户个人设备物联网设备5区域办 公室总部数据 中心SSL Encryption多阶段,多维度的攻击SSL
2、 EncryptionSSL EncryptionSecurity Stack远程 用户个人设备物联网设备6区域办 公室总部数据 中心SSL Encryption云时代的创新:确保安全地使用云区域办 公室远程 用户个人设备物联网设备7总部数据 中心集成的网络防御8集成的网络防御9集成的网络防御10集成的网络防御11集成的网络防御1216FileURLWhitelist Blacklist CertificateMachine Learning1.75亿被保护的企业和个人终端9 全球威胁响应中心3000+ 工程师和研究人员10 亿每日全新的未分类Web请求20 亿每天扫描的电子邮件全球情报网 络
3、(GIN) :182M阻止的Web攻击发现430 million新的恶意软件,在去年 一年的时间18,000+防护的云应用100M阻止了如此多的 社会工程诈骗阻止了1B封恶意邮件64,000+保护的数据中心GINxGIN=GIN2last yearCyber Security ServicesA Comprehensive Integrated Portfolio for Every Stage of the Attack LifecycleTrack and Analyze Adversary Groups and Key Trends and Events around the globe
4、 for Actionable IntelligenceDeepSight IntelligenceDetect and Proactively Hunt for Targeted Attacks, Advanced Threats and CampaignsManaged Security ServicesRespond Quickly and Effectively to Credible Security Threats and IncidentsIncident ResponseStrengthen Cyber Readiness to Build Employee Resilienc
5、y and Prevent Sophisticated AttacksCyber Skills DevelopmentWorld-Class Security ExpertiseReactive to ProactiveIntegrated, End-to-End SecurityBefore an AttackDuring an AttackAfter an AttackPreparing for an AttackPRODUCTS14FileURLWhitelist Blacklist CertificateMachine LearningCyber Security Services集成
6、的网络安全1520近期其他重要收购24Tagging:User-Centric ClassificationDLP:Content-Centric ClassificationWatchful RightsWATCH User and policy-driven tagging, classification, and watermarkingClassification is KeyData at RestNew Data CreatedCloud Data (CASB)Network Data (Email, Web)EmailOfficeMobileEndpoint DataICT GA
7、June 2017Existing DataDLPMarket LeaderntecWCorapotrcathionful Integration, ICT Kick-off May225Skycure Solution OverviewTHREAT INTELLIGENCECrowd-sourced3rd party threat aggregation Skycure researchCLOUD SERVERRisk/compliance visibility Advanced security Automation & integrationPUBLIC APPSimple deploy
8、ment & maintenance Ensured privacyMinimal footprintConsistent across Managed & Unmanaged scenariosEMMEMM26Branch OfficeRoaming UsersGINConsoleSandboxSymantec Endpoint Protection 14Skycure Mobile Threat DefenseSymantec Endpoint Detection and ResponseSymantec Endpoint Protection CloudHeadquarters Data
9、 CenterPersonal DevicesSymantec Endpoint Security FamilySkycureSkycure27Intelligence ServicesFireglass - Proxy Policies Set to Isolate Risky TrafficUsers123Content & Malware AnalysisAllow trusted sitesBlock known bad sites Analyze risky with CA/MA4Isolate uncategorized/risky sites where accessCopyri
10、gihst ne20e1d6 eSydmantec CorporationCategorized Trusted SitesAllow1Categorized Bad SitesBlock2Uncategorized/Risky WebsitesIsolate4Risky SitesAnalyze3?Integration with Email SecurityIsolates links in email so users can safely click on themIsolates attachments eliminating the risk of malware from dow
11、nloaded filesSymantec Messaging Solutions28Symantec Secure Web Gateways with FireglassHeadquarters Data CenterSymantec Web Security Service (WSS)Threat Protection, Information Security, & Access GovernanceFireglass adds threat isolation for risky and uncategorized sitesRegional OfficePROXYPROXYSyman
12、tec ProxySG2930Leadership Slides for Gartner MQs31Symantecs Leadership in 2016 Gartner Magic QuadrantsGartner Magic Quadrant for Managed Security Services, Worldwide(December 2015)Gartner Magic Quadrant for Endpoint Protection Platforms (February 2016)Gartner Magic Quadrant for Enterprise Data Loss
13、Prevention (January 2016)Gartner Magic Quadrant for Secure Web Gateways (June 2016)This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request fromSymantec. Gart
14、ner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartners research organization and shou
15、ld not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose32Blue Coat (Now Symantec) is Named a Leader in 2016 Gartner Magic Quadrant for Secure Web
16、Gateways:Positioned Highest for Ability to ExecuteThis Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from Symantec. Gartner does not endorse any vendor,
17、 product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartners research organization and should not be construed as statement
18、s of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purposeSource: Magic Quadrant for Secure Web Gateways, Lawrence Orans, Peter Firstbrook, 06 June 2016, Gartner, Inc.33Symantec Nam
19、ed a Leader in the Dec 2015 Gartner Magic Quadrant for Managed Security Services, WorldwideThis Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from Syman
20、tec. Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartners research organization
21、 and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purposeSource: Gartner, Inc., Magic Quadrant for Managed Security Services, Worldwide, Ke
22、lly M. Kavanagh, Toby Bussa, December 23, 201534Symantec Hits Another Milestone 14 Years Running a Leader in Gartner Magic Quadrant for Endpoint Protection Platforms Positioned Highest in Ability to ExecuteThis Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note a
23、nd should be evaluated in the context of the entire report. The Gartner report is available upon request from Symantec. Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ra
24、tings or other designation. Gartner research publications consist of the opinions of Gartners research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or
25、 fitness for a particular purposeSource: Magic Quadrant for Endpoint Protection Platforms, Peter Firstbrook, Eric Ouellet, February 1, 2016Symantec is Named a Leader in 2016 Gartner Magic Quadrant for Enterprise Data Loss Prevention:Positioned Furthest for Ability to Execute and Completeness of Visi
26、onThis Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from Symantec. Gartner does not endorse any vendor, product or service depicted in our research pub
27、lications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartners research organization and should not be construed as statements of fact. Gartner disclaims all warranties, exp
28、ressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purposeSource: Magic Quadrant for Enterprise Data Loss Prevention, Brian Reed, Neil Wynne 28 January 2016, Gartner, Inc.3536Leadership Slides for Forrester Waves37Symantecs Leade
29、rship in 2016 Forrester WavesThe Forrester Wave: Endpoint Security Suites, Q4 2016The Forrester Wave: Automated Malware Analysis, Q2 2016The Forrester Wave: Data Loss Prevention Suites, Q4 2016The Forrester Wave: Cloud Security Gateways, Q4 2016Blue Coat (Symantec) Positioned as a Leader in The Forr
30、ester Wave: Automated Malware Analysis, Q2 2016The Forrester Wave is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forresters call on a market and is plotted using a detailed spreads
31、heet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.Source: April 2016, The Forrester Wave: Aut
32、omated Malware Analysis, Q2 2016“Blue Coat integrates malware analysis into a strong investigation- focused suite”- The Forrester Wave: Automated Malware Analysis, Q2 201638Symantec Positioned as a Leader in The Forrester Wave: Endpoint Security Suites, Q4 2016Source: October 2016 The Forrester Wave
33、: Endpoint Security Suites, Q4 2016The Forrester Wave is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forresters call on a market and is plotted using a detailed spreadsheet with ex
34、posed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.“Symantec offers the most complete endpoint security su
35、ite on the market” - The Forrester Wave: Endpoint Security Suites, Q4 201639Symantec DLP Named as a LeaderForrester Wave: Data Loss Prevention Suites, Q4 2016Source: November 2016, The Forrester Wave: Data Loss Prevention Suites, Q4 2016The Forrester Wave is copyrighted by Forrester Research, Inc. F
36、orrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forresters call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service
37、 depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.“Symantec provides a comprehensive DLP suite with robust capabilities.”“It also offers a rich set of capabilities to help firms meet privacy requirements
38、.”“Symantec continues to innovate in this space and has strong brand recognition in the DLP market.”40Symantec* Named a Leader with the Highest Score in Current Offering in Cloud Security Gateway (CASB)First Forrester Wave in Cloud Security GatewayThe Forrester Wave is copyrighted by Forrester Resea
39、rch, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forresters call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product,
40、 or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.Source: November 2016, The Forrester Wave: Cloud Security Gateways, Q4 2016*Forrester evaluated Blue Coat in the evaluation, which was acquire
41、d by Symantec“It has strong capabilities for Salesforce and other structured data protection, including search, sort, and filtering operations, and offers a wide selection of encryption and decryption policy options.”4142Leadership Slides for IDC Market Share#1 Market Share Leader in Worldwide IT Se
42、curity ProductsSymantec, 11.4%43Cisco, 6.6%IBM, 5.4%Checkpoint,4.6%Others, 65.4%Intel, 6.6%*Source: Elizabeth Corr, Robert Ayoub, Christian A. Christiansen, Angela Gelnaw, Sean Pike, Robert Westervelt, Worldwide IT Security Products Market Shares, 2014: Comprehensive Security Product View, December
43、2015#1 Overall Market Share Leader in Endpoint Security MarketIntel Security, 15.8%Symantec, 27.6%*Source: Robert Westervelt, Elizabeth Corr, Sean Pike,IDC Worldwide Endpoint Security Market Shares, 2015: Currency Volatility Headwind, November 201644Trend Micro, 9.9%Kaspersky Lab, 7.2%ESET, 5.4%AVGT
44、echnologies, 3.9%Others, 30.2%#1 Market Share Leader in Corporate Endpoint Security MarketIntel Security, 17.1%Symantec, 18.2%*Source: Robert Westervelt, Elizabeth Corr, Sean Pike,IDC Worldwide Endpoint Security Market Shares, 2015: Currency Volatility Headwind, November 201644Sophos, 6.0%ESET, 6.0%Trend Micro, 11.7%Kaspersky Labs, 5.3%Others, 35.7%#1 Market Share Leader in Corporate Endpoint Access and Information Protection MarketSymantec, 23.0%*Source: Robert Westervelt, Elizabeth Corr, Sean Pike,IDC Worldwide Endpoint Security Market Shares, 2015: Currency Volatil
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 农药残留检测与风险评估作业指导书
- 三农产业园区运营及管理指南
- 部门协同工作流程梳理与改进方案
- 公路工程与桥梁工程作业指导书
- 贺州2025年广西贺州市事业单位招聘610人笔试历年参考题库附带答案详解
- 湖北2025年湖北省空间规划研究院招聘专业技术人员笔试历年参考题库附带答案详解
- 2023年证券从业资格考试《金融市场基础知识》真题汇编三
- X市孕期营养干预对妊娠期糖尿病孕妇血糖控制的影响研究
- 核磁共振在膝骨性关节炎诊断中的应用价值探讨分析
- 全流程信息化管理对门诊安全采血流程的优化作用研究
- 2024-2025学年第二学期天域全国名校协作体高三3月联考 地理试卷(含答案)
- 学校2025年每日两小时体育活动方案-阳光体育活力四溢
- B超的基本知识
- 2025年云南省高职单招《职测》高频必练考试题库400题(含答案)
- JT-T-1202-2018城市公共汽电车场站配置规范
- 气缸选型介绍.ppt课件
- 水上危险化学品泄漏事故处置技术研究
- 数字电子技术基础第1章--康华光-第五版
- 国内汽车产销数据四个统计口径数据利益链
- 消防设施检测内容及流程
- 零序保护整定说明
评论
0/150
提交评论