SlideShare a Scribd company logo
1 of 28
Download to read offline
Symantec Envisions Future Clouds as
Safe Clouds

Cloud Expo: November 5, 2012
What’s News?

 Symantec Envisions         Many clouds, many architectures
  Future Clouds as          Safe clouds that are secure, available & compliant
    Safe Clouds             Cloud computing become the new norm
                            Future Clouds are Safe Clouds with Symantec

                          Consume Clouds: SEP Small Biz Edition 2013
Symantec Solutions for    Build Clouds: Protection for Cloud Service Providers
    Safe Clouds           Extend into Clouds: Symantec O3; Symantec
                           Fileshare Encryption


                          Cloud Security Essentials Training
Symantec Programs to      CloudSmart for Service Providers
 Realize Safe Clouds      ‘Safe Cloud Now’ Event Series


                                                                             2
                                                                                  2
Symantec’s Vision

From the device to the data
center to the cloud, from
identities to interactions…



                              Symantec protects
                                 people and
                                information.




                                                  3
Symantec’s Role

From the device to the data
center to the cloud, from
identities to interactions…   Secure               Available

                                   Symantec protects
                                       people and
                Recoverable
                                     information in
                                         clouds.

                               Agile               Affordable

                                                           4
Symantec’s Role

From the device to the data
center to the cloud, from
identities to interactions…   Secure               Available

                                   Symantec protects
                                       people and
                                       Safe Clouds
                Recoverable
                                     information in
                                         clouds.

                               Agile               Affordable

                                                           5
Future of the Cloud



                      6
In the future, clouds will be ubiquitous




  Connected and
                                   Safe
    collected




              The digital native          Cloud-first becomes
                  grows up                     a reality

                                                            7
Future cloud characteristics

      Category      2.0         Cloud 2.0             3.0         Cloud 3.0
Era                            2007 - 2012                       2013 - 2018
Focus                        Experimentation;           Productivity and collaboration
                           Software as a service
Security &            Security and availability are   Security and availability expected,
Availability          afterthoughts and inhibitors        built into the foundation
Scope                           One cloud                        Many clouds
IT Role                          Reactive                      Proactive driver
Visibility                    Limited, closed                   Granular, open
App functionality            Separate, isolate        Seamless, integrated; across clouds
                                                          & across on-prem to cloud
Endpoints                   Desktops, laptops           Phones, tablets, cloud of things
SLA                         Uneven, inflexible                 Granular, flexible
How Built                 Traditional architecture               Cloud native
                              hosted off site

                                                                                            8
How IT Gets There



                    9
Not one cloud – but many, many clouds


  Community                       Virtual Private
    Clouds                            Clouds
                         Public
                         Clouds
    Clouds that                               Clouds that are
                                                       Hybrid
   you consume,
           Private                             built on many
                                                       Clouds
           Clouds
   build, extend                               architectures
                     The Cloud                  PaaS
                     of Things
            IaaS     A proliferation of
                     clouds: thousands
                              Personal
                         of clouds
                               Clouds                  New Types
     SaaS                                              of Clouds


                                                                   10
Consistent protection across all future clouds




                                                 11
Safe clouds start with policy



                                           PROTECT
                                           POLICY

                                • Understand the value of
                                  information
                                • Incorporate legal and regulatory
                                  constraints
                                • Establish GRC for clouds




                                                                     12
Not one cloud – but many, many clouds




                                   • Mechanisms to act or enforce
                                     the policies
                                   • Encrypt, backup & archive
                                     information
                                   • Identify and prevent data loss
                                     activities


                                              PROTECT
                                              INFORMATION




                                                                      13
Safe clouds must protect people




 • Mechanisms to ensure that
   the users or consumers of cloud
   services are safe
 • Authenticate, protect
   transactions and identities



           PROTECT
            PEOPLE




                                     14
Safe clouds must protect infrastructure



       PROTECT
INFRASTRUCTURE


 • Mechanisms to ensure the
   underlying hardware and
   software is safe and available




                                          15
Safe cloud success drivers



       PROTECT               PROTECT
INFRASTRUCTURE               POLICY




      PROTECT                PROTECT
       PEOPLE                INFORMATION




                                           16
What’s News?

 Symantec Envisions         Many clouds, many architectures
   Future Clouds,           Safe clouds that are secure, available & compliant
    Safe Clouds             Cloud computing become the new norm
                            Future Clouds are Safe Clouds with Symantec

                          Consume Clouds: SEP Small Biz Edition 2013
Symantec Solutions for    Build Clouds: Protection for Cloud Service Providers
    Safe Clouds           Extend into Clouds: Symantec O3; Symantec
                           Fileshare Encryption


                          Cloud Security Essentials Training
Symantec Programs to      CloudSmart for Service Providers
 Realize Safe Clouds      ‘Safe Cloud Now’ Event Series


                                                                             17
                                                                                  17
Adoption Models for Safe Clouds

       CONSUME                          BUILD                           EXTEND
      Cloud Services               Cloud Services                  IT into the Cloud




    Simplify IT with              Deliver Secure,                  Leverage Other
    Hosted Services                Resilient and                  Clouds Safely and
                                 Compliant Clouds                     Efficiently
                               A DVA N TAG ES
   Avoid complexity            Complete control & visibility    Cross - platform support
   Pay as you go               Use existing infrastructure       physical + virtual + cloud
   Scale and grow on demand    Realize cloud benefits of        Integration with existing IT
                                 agility




                                                                                                  18
Extend Safely into the Cloud

                 Symantec O3 – the New Cloud Control Point
                 Symantec File Share Encryption NEW        POWERED BY PGP
                                                             TECHNOLOGY




         Empower Enterprises to:
          Gain data visibility and control
          Secure Shadow IT
          Ensure consistent cloud compliance
          Back up and archive to external storage clouds




                                                                        19
Symantec O3 – The New Cloud Security Control Point




    One Login with
  Strong Credentials
                       Identity-based
                       Access Control
                                                  O3       Application
                                                       Visibility and Audit
                                                                              Information
                                                                               Protection



                                        Private
                                         Cloud




                                                                                            20
Symantec Encryption Across Clouds & Mobile

                        Symantec File Share Encryption,
                         Powered by PGP Technology
Protects confidential data
   and sets user access                         Access encrypted data on
  policies on file sharing                       iPhone and iPad while
    services, Dropbox                            keeping info protected




  Mobile email encryption
   for iOS and Android
       (viewer only)          Symantec O3

                                                                           21
Encrypt Information for Advanced Protection

                Secure Information in the Clouds
                   Rampant use of Cloud data storage
Protect,           Encrypt data before syncing to Cloud apps and storage
Control, and       Access encrypted Cloud data with iOS devices
Access          Protect and Control Mobile Data
Confidential     Highly mobile workforce accessing hosted email services
                 Send & receive secure emails on iOS devices
Information      Viewer for Android devices
in Safe
Clouds          Strong Compliance: DLP & Encryption
                 Information explosion creates new data challenges
                 Automated remediation
                 One stop compliance reporting




                                                                            22
BUILD Efficient and Available Protected Clouds

                                Cloud Protection for Service Providers                 NEW
                                    Comprehensive protection (formerly Scan Engine)

                                Resilient Clouds with Veritas Cluster Server,
                                Veritas Operations Manager, Virtual Business
                                Services

                                Deliver Secure, Resilient and Compliant Clouds
                                   Maximize private and public clouds
                                   Information protection and control
                                   Secure and compliant virtual environments
                                   Leverage existing infrastructure/investments
                                   Build on-demand private storage clouds
                                   Business agility, scalability and cost efficiencies

Symantec Cloud - PR Solutions                                                                23
Consume Cloud Services

               Symantec.Cloud Services
                   14 SaaS solutions
                   Email, Web and IM security, archiving and continuity

               Symantec Endpoint Protection                                NEW
               Small Business Edition 2013
                   Cloud-managed protection service with
                    on-premise management


               Cloud-Powered Protection and Backup
                  Outsource infrastructure, no IT build-outs
                  Simple, easy management
                  Improved cost efficiencies
                  Scale for growth
                  Market agility

                                                                                 24
What’s News?

 Symantec Envisions         Many clouds, many architectures
   Future Clouds,           Safe clouds that are secure, available & compliant
    Safe Clouds             Cloud computing become the new norm
                            Future Clouds are Safe Clouds with Symantec

                          Consume Clouds: SEP Small Biz Edition 2013
Symantec Solutions for    Build Clouds: Protection for Cloud Service Providers
    Safe Clouds           Extend into Clouds: Symantec O3; Symantec
                           Fileshare Encryption


                          Cloud Security Essentials Training
Symantec Programs to      CloudSmart for Service Providers
 Realize Safe Clouds      ‘Safe Cloud Now’ Event Series


                                                                             25
                                                                                  25
Symantec Delivers Programs to Realize Safe Clouds

                Symantec Cloud Security Essentials
                 3-Day interactive and comprehensive training
                 Based on CSA guidelines for accreditation

                Symantec CloudSmart for Service Providers
                 Interactive cloud sales and services training
                 Sell, Manage, Host business models

                ‘Safe Cloud Now’ Series
                 Educational events, seminars, and webinars
                 Kicks off with Cloud Expo, CSA Congress, Vision Barcelona

                State of Cloud Survey
                 Coming January 2013




                                                                              26
What’s News?

 Symantec Envisions         Many clouds, many architectures
   Future Clouds,           Safe clouds that are secure, available & compliant
    Safe Clouds             Cloud computing become the new norm
                            Future Clouds are Safe Clouds with Symantec

                          Consume Clouds: SEP Small Biz Edition 2013
Symantec Solutions for    Build Clouds: Protection for Cloud Service Providers
    Safe Clouds           Extend into Clouds: Symantec O3; Symantec
                           Fileshare Encryption


                          Cloud Security Essentials Training
Symantec Programs to      CloudSmart for Service Providers
 Realize Safe Clouds      ‘Safe Cloud Now’ Event Series


                                                                             27
                                                                                  27
Thank you!
Dave Elliott
dave_elliott@symantec.com
+1.858.775.6721


Copyright © 2012 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec
Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


                                                                                                                                                                                        28

More Related Content

More from Symantec

Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantSymantec
 
Symantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec
 

More from Symantec (20)

Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators Want
 
Symantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 Webinar
 

Recently uploaded

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 

Recently uploaded (20)

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 

Symantec Envisions Future Clouds As Safe Clouds November 2012

  • 1. Symantec Envisions Future Clouds as Safe Clouds Cloud Expo: November 5, 2012
  • 2. What’s News? Symantec Envisions  Many clouds, many architectures Future Clouds as  Safe clouds that are secure, available & compliant Safe Clouds  Cloud computing become the new norm  Future Clouds are Safe Clouds with Symantec  Consume Clouds: SEP Small Biz Edition 2013 Symantec Solutions for  Build Clouds: Protection for Cloud Service Providers Safe Clouds  Extend into Clouds: Symantec O3; Symantec Fileshare Encryption  Cloud Security Essentials Training Symantec Programs to  CloudSmart for Service Providers Realize Safe Clouds  ‘Safe Cloud Now’ Event Series 2 2
  • 3. Symantec’s Vision From the device to the data center to the cloud, from identities to interactions… Symantec protects people and information. 3
  • 4. Symantec’s Role From the device to the data center to the cloud, from identities to interactions… Secure Available Symantec protects people and Recoverable information in clouds. Agile Affordable 4
  • 5. Symantec’s Role From the device to the data center to the cloud, from identities to interactions… Secure Available Symantec protects people and Safe Clouds Recoverable information in clouds. Agile Affordable 5
  • 6. Future of the Cloud 6
  • 7. In the future, clouds will be ubiquitous Connected and Safe collected The digital native Cloud-first becomes grows up a reality 7
  • 8. Future cloud characteristics Category 2.0 Cloud 2.0 3.0 Cloud 3.0 Era 2007 - 2012 2013 - 2018 Focus Experimentation; Productivity and collaboration Software as a service Security & Security and availability are Security and availability expected, Availability afterthoughts and inhibitors built into the foundation Scope One cloud Many clouds IT Role Reactive Proactive driver Visibility Limited, closed Granular, open App functionality Separate, isolate Seamless, integrated; across clouds & across on-prem to cloud Endpoints Desktops, laptops Phones, tablets, cloud of things SLA Uneven, inflexible Granular, flexible How Built Traditional architecture Cloud native hosted off site 8
  • 9. How IT Gets There 9
  • 10. Not one cloud – but many, many clouds Community Virtual Private Clouds Clouds Public Clouds Clouds that Clouds that are Hybrid you consume, Private built on many Clouds Clouds build, extend architectures The Cloud PaaS of Things IaaS A proliferation of clouds: thousands Personal of clouds Clouds New Types SaaS of Clouds 10
  • 11. Consistent protection across all future clouds 11
  • 12. Safe clouds start with policy PROTECT POLICY • Understand the value of information • Incorporate legal and regulatory constraints • Establish GRC for clouds 12
  • 13. Not one cloud – but many, many clouds • Mechanisms to act or enforce the policies • Encrypt, backup & archive information • Identify and prevent data loss activities PROTECT INFORMATION 13
  • 14. Safe clouds must protect people • Mechanisms to ensure that the users or consumers of cloud services are safe • Authenticate, protect transactions and identities PROTECT PEOPLE 14
  • 15. Safe clouds must protect infrastructure PROTECT INFRASTRUCTURE • Mechanisms to ensure the underlying hardware and software is safe and available 15
  • 16. Safe cloud success drivers PROTECT PROTECT INFRASTRUCTURE POLICY PROTECT PROTECT PEOPLE INFORMATION 16
  • 17. What’s News? Symantec Envisions  Many clouds, many architectures Future Clouds,  Safe clouds that are secure, available & compliant Safe Clouds  Cloud computing become the new norm  Future Clouds are Safe Clouds with Symantec  Consume Clouds: SEP Small Biz Edition 2013 Symantec Solutions for  Build Clouds: Protection for Cloud Service Providers Safe Clouds  Extend into Clouds: Symantec O3; Symantec Fileshare Encryption  Cloud Security Essentials Training Symantec Programs to  CloudSmart for Service Providers Realize Safe Clouds  ‘Safe Cloud Now’ Event Series 17 17
  • 18. Adoption Models for Safe Clouds CONSUME BUILD EXTEND Cloud Services Cloud Services IT into the Cloud Simplify IT with Deliver Secure, Leverage Other Hosted Services Resilient and Clouds Safely and Compliant Clouds Efficiently A DVA N TAG ES  Avoid complexity  Complete control & visibility  Cross - platform support  Pay as you go  Use existing infrastructure physical + virtual + cloud  Scale and grow on demand  Realize cloud benefits of  Integration with existing IT agility 18
  • 19. Extend Safely into the Cloud  Symantec O3 – the New Cloud Control Point  Symantec File Share Encryption NEW POWERED BY PGP TECHNOLOGY Empower Enterprises to:  Gain data visibility and control  Secure Shadow IT  Ensure consistent cloud compliance  Back up and archive to external storage clouds 19
  • 20. Symantec O3 – The New Cloud Security Control Point One Login with Strong Credentials Identity-based Access Control O3 Application Visibility and Audit Information Protection Private Cloud 20
  • 21. Symantec Encryption Across Clouds & Mobile Symantec File Share Encryption, Powered by PGP Technology Protects confidential data and sets user access Access encrypted data on policies on file sharing iPhone and iPad while services, Dropbox keeping info protected Mobile email encryption for iOS and Android (viewer only) Symantec O3 21
  • 22. Encrypt Information for Advanced Protection Secure Information in the Clouds  Rampant use of Cloud data storage Protect,  Encrypt data before syncing to Cloud apps and storage Control, and  Access encrypted Cloud data with iOS devices Access Protect and Control Mobile Data Confidential  Highly mobile workforce accessing hosted email services  Send & receive secure emails on iOS devices Information  Viewer for Android devices in Safe Clouds Strong Compliance: DLP & Encryption  Information explosion creates new data challenges  Automated remediation  One stop compliance reporting 22
  • 23. BUILD Efficient and Available Protected Clouds Cloud Protection for Service Providers NEW  Comprehensive protection (formerly Scan Engine) Resilient Clouds with Veritas Cluster Server, Veritas Operations Manager, Virtual Business Services Deliver Secure, Resilient and Compliant Clouds  Maximize private and public clouds  Information protection and control  Secure and compliant virtual environments  Leverage existing infrastructure/investments  Build on-demand private storage clouds  Business agility, scalability and cost efficiencies Symantec Cloud - PR Solutions 23
  • 24. Consume Cloud Services Symantec.Cloud Services  14 SaaS solutions  Email, Web and IM security, archiving and continuity Symantec Endpoint Protection NEW Small Business Edition 2013  Cloud-managed protection service with on-premise management Cloud-Powered Protection and Backup  Outsource infrastructure, no IT build-outs  Simple, easy management  Improved cost efficiencies  Scale for growth  Market agility 24
  • 25. What’s News? Symantec Envisions  Many clouds, many architectures Future Clouds,  Safe clouds that are secure, available & compliant Safe Clouds  Cloud computing become the new norm  Future Clouds are Safe Clouds with Symantec  Consume Clouds: SEP Small Biz Edition 2013 Symantec Solutions for  Build Clouds: Protection for Cloud Service Providers Safe Clouds  Extend into Clouds: Symantec O3; Symantec Fileshare Encryption  Cloud Security Essentials Training Symantec Programs to  CloudSmart for Service Providers Realize Safe Clouds  ‘Safe Cloud Now’ Event Series 25 25
  • 26. Symantec Delivers Programs to Realize Safe Clouds Symantec Cloud Security Essentials  3-Day interactive and comprehensive training  Based on CSA guidelines for accreditation Symantec CloudSmart for Service Providers  Interactive cloud sales and services training  Sell, Manage, Host business models ‘Safe Cloud Now’ Series  Educational events, seminars, and webinars  Kicks off with Cloud Expo, CSA Congress, Vision Barcelona State of Cloud Survey  Coming January 2013 26
  • 27. What’s News? Symantec Envisions  Many clouds, many architectures Future Clouds,  Safe clouds that are secure, available & compliant Safe Clouds  Cloud computing become the new norm  Future Clouds are Safe Clouds with Symantec  Consume Clouds: SEP Small Biz Edition 2013 Symantec Solutions for  Build Clouds: Protection for Cloud Service Providers Safe Clouds  Extend into Clouds: Symantec O3; Symantec Fileshare Encryption  Cloud Security Essentials Training Symantec Programs to  CloudSmart for Service Providers Realize Safe Clouds  ‘Safe Cloud Now’ Event Series 27 27
  • 28. Thank you! Dave Elliott dave_elliott@symantec.com +1.858.775.6721 Copyright © 2012 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 28