Uncommitted Roadmap - PowerPoint PPT Presentation

1 / 20
About This Presentation
Title:

Uncommitted Roadmap

Description:

Reduce volume of spam before it hits network and email infrastructure ... Stop viruses, spam, phishing attacks before reaching email stores, end-users ... – PowerPoint PPT presentation

Number of Views:80
Avg rating:3.0/5.0
Slides: 21
Provided by: Natalie152
Category:

less

Transcript and Presenter's Notes

Title: Uncommitted Roadmap


1
The Next Destination Information Integrity
Bernard Kwok Vice President President of Greater
China Region
2
The NEW Symantec
  • VERITAS merger completed July 2, 2005
  • Safeguarding information from the desktop to the
    data center
  • Serving a full spectrum of customers
  • Consumers
  • Small Businesses
  • Mid-size Businesses
  • Enterprise and Government
  • A full menu of security, storage, availability
    and performance products
  • Global network of partners
  • Global service and support

Symantec Worldwide
3
Information is the Currency of Business
  • The pace of business change is quickening
  • Your business depends on information to grow
  • To create value information must be made secure
    and available

4
When Information is at Risk, Consequences are Real
Security
Availability
5
The Challenges You Face are Clear
6
The Requirement A Flexible and Rigid Foundation
That Protects Information From Risk
  • Information Infrastructure Must
  • Be agile based on changing business needs and
    threats
  • Deliver maximum value from your IT technology,
    people and processes
  • Enable ongoing demonstration of compliance
  • Ensure information is both secure and available
    24 X 7 no matter where it resides

7
Symantec Trusted to Deliver Information Integrity
  • Proactively protect all layers of the
    infrastructure against security threats
  • Early warning of emerging threats
  • Monitor systems for compliance

Information Security
Information Integrity
  • Provision, optimize, monitor and remediate
    systems and storage to ensure uptime and maintain
    performance levels
  • Recover systems and data in the event of an outage

Information Availability
  • Information is secure and available
  • Greater Efficiency
  • Less Complexity
  • Greater Compliance
  • Reduced Risk

The result is greater resilience in your
infrastructure
8
A Progressive Approach Attaining Information
Integrity
  • External and internal insight that drives faster,
    better decision-making
  • End-to-end integrated solutions that proactively
    protect and recover information and IT assets
  • An integrated approach that maximizes data and
    application availability, increases operating
    efficiency, and preserves business continuity
  • Unmatched Capabilities
  • Unsurpassed product breadth and depth
  • Category and market leadership
  • OS and hardware vendor independence
  • Integrated services

9
Global Intelligence Network Provides Early Warning
5 Symantec SOCs
61 Symantec Monitored Countries
20,000 Registered Sensors in 180 Countries
29 Worldwide Symantec Support Centers
6 Symantec Security Response Labs




Tokyo, Japan
Reading, England
Boston, MA
Roseville, MN
Calgary, Canada
Seoul, Korea
Milan, Italy
Or-Yehuda, Israel
London, England
Beijing, China
Redwood City, CA
Munich, Germany
Madrid, Spain
Taipei, Taiwan
Mountain View, CA
Paris, France
Pune, India
Singapore
Santa Monica, CA
Heathrow, FL
Orem, UT/American Fork, UT
Austin, TX
Buenos Aires, Argentina
Sydney, Australia
10
Integrated Information Integrity Solutions
Email Security and Availability Business
Continuity Regulatory Compliance
5
11
Email Security and Availability
  • Challenges
  • Email is the mission critical application for
    conducting business, a growing vulnerability for
    security and availability, and the document of
    record for business
  • Symantec Email Security and Availability Solution
  • Protect from email born threats
  • Manage the increasing cost of storage for email
  • Meet compliance and risk management requirements
  • Benefits
  • Reduce infrastructure costs
  • Improve service levels
  • Address critical policy needs
  • Email has become the primary medium for how we
    communicate. The consequence is that email has
    become a de facto record repository.
  • CIO Magazine, Jan 2005

12
Symantec Provides a Holistic Solution
Leading Email Archiving
Leading Email Security
Enterprise Vault
Symantec Mail Security Software/Appliances/Hosted
SMTP Traffic
MTA
Microsoft Exchange
IBM Lotus Domino
Leading Backup/Recovery
Leading Storage Management
Manage Email Lifecycle
Email Management
Keep Email Protected
Storage Foundation HA
Net Backup Backup Exec
Keep Email Running
13
Keep Email Information Secure and Available
Records Discovery and Retrieval
Risk and Data Reduction
Internal Email Protection
RecordsRetention
Data Reduction
Monitor, search and retrieve archived content for
compliance, legal discovery and other needs
Automatically capture, manage and retain email
and other records based on business policies
Stop viruses, spam, phishing attacks before
reaching email stores, end-users
Reduce volume of spam before it hits network and
email infrastructure
Scan internal and outbound traffic for viruses
and unauthorized content
Resilient Foundation
Recover quickly through efficient backupReduce
downtime via clusteringReplicate and geo-cluster
for disaster recoveryManage storage for
automated provisioning
Spam Quarantine
14
Business Continuity
Threats To IT Infrastructure
  • Challenges
  • Rediscovering the growing list of events creating
    business disruption, 59 of CIOs surveyed have
    budgeted increased spending for and focus for
    2005/2006 on Business Continuity Initiatives
  • Symantec Business Continuity Solution
  • Vulnerability Management
  • High Availability
  • Disaster Recovery
  • Benefits
  • Unparalleled security
  • Designed for heterogeneous environments
  • Built on industry leading technologies
  • Human Error
  • Hacking, Phishing, Pharming
  • Application Failure
  • Database Corruption
  • Denial of Service Attacks
  • Fire, Flood, Hurricane
  • Equipment Failure
  • Disruption of Power or Communication
  • Malicious Software
  • Viruses, Worms, Trojan Horses
  • Strikes, Social Unrest
  • Sabotage, Terrorism

Source CIO Insight, 30 strategies for the year
ahead, CIO Magazine March 2005 ZD publishing
15
Get Ahead of the Problem Integrated Security and
Availability Planning
Vulnerability Proactively Blocked, Application
Failed Over
Availability of Application, Systems, and Data
Assured
Vulnerability Identified and/or Infrastructure
Instrumentation Early Warnings Sent
Mitigation
Reports on attacks and outages updates to
policies and SLAs archiving for audit
Restoration
Remediation
Patches Updates Implemented Across
Infrastructure Applications Recovered Data
Restored
Identification of Systems to Patch, Points of
Attack, Application Failures, Data Loss
16
Regulatory Compliance
  • Challenges
  • Associated time and cost of compliance
    initiatives
  • Lack of standardization
  • Complexity
  • Symantec Regulatory Compliance Solution
  • Implements IT controls for an automated and
    repeatable process
  • Enables retention and timely retrieval of
    regulated documents
  • Benefits
  • Automates testing
  • Standardizes on common methods
  • Addresses multiple compliance initiatives
  • Multi-division companys audit and related fees
    increased 77 in 2004 due to de-centralized
    internal controls testing process (USA Today)
  • 75 of intellectual property is contained in
    e-mail (Gartner Research)

17
Implement IT Controls Achieve Sustained
Compliance
Continuous Improvement
Implement Changes
Plan
Manage
Oversee
  • Implement and document new policies and processes
  • Tools and Services for ongoing management
  • Report
  • Audit
  • Assessments
  • Design

Project Management Support
18
In the Future
an external threat alert will trigger an
internal assessment you will be able to
proactively address performance issues (e.g.
system failures, human errors, disasters, system
vulnerabilities) you will be able to
consolidate and monitor performance slowdowns
along with security alerts and you will be
able to automatically recover compromised systems
19
Symantec Leading the Way
  • Technology
  • Knowledge
  • Trusted Advice
  • Global Presence
  • Rapid Incident Response
  • Integrated Solutions
  • Partnership

20
Write a Comment
User Comments (0)
About PowerShow.com