Title: Uncommitted Roadmap
1The Next Destination Information Integrity
Bernard Kwok Vice President President of Greater
China Region
2The NEW Symantec
- VERITAS merger completed July 2, 2005
- Safeguarding information from the desktop to the
data center - Serving a full spectrum of customers
- Consumers
- Small Businesses
- Mid-size Businesses
- Enterprise and Government
- A full menu of security, storage, availability
and performance products - Global network of partners
- Global service and support
Symantec Worldwide
3Information is the Currency of Business
- The pace of business change is quickening
- Your business depends on information to grow
- To create value information must be made secure
and available
4When Information is at Risk, Consequences are Real
Security
Availability
5The Challenges You Face are Clear
6The Requirement A Flexible and Rigid Foundation
That Protects Information From Risk
- Information Infrastructure Must
- Be agile based on changing business needs and
threats - Deliver maximum value from your IT technology,
people and processes - Enable ongoing demonstration of compliance
- Ensure information is both secure and available
24 X 7 no matter where it resides
7Symantec Trusted to Deliver Information Integrity
- Proactively protect all layers of the
infrastructure against security threats - Early warning of emerging threats
- Monitor systems for compliance
Information Security
Information Integrity
- Provision, optimize, monitor and remediate
systems and storage to ensure uptime and maintain
performance levels - Recover systems and data in the event of an outage
Information Availability
- Information is secure and available
- Greater Efficiency
- Less Complexity
- Greater Compliance
- Reduced Risk
The result is greater resilience in your
infrastructure
8A Progressive Approach Attaining Information
Integrity
- External and internal insight that drives faster,
better decision-making - End-to-end integrated solutions that proactively
protect and recover information and IT assets - An integrated approach that maximizes data and
application availability, increases operating
efficiency, and preserves business continuity - Unmatched Capabilities
- Unsurpassed product breadth and depth
- Category and market leadership
- OS and hardware vendor independence
- Integrated services
9Global Intelligence Network Provides Early Warning
5 Symantec SOCs
61 Symantec Monitored Countries
20,000 Registered Sensors in 180 Countries
29 Worldwide Symantec Support Centers
6 Symantec Security Response Labs
Tokyo, Japan
Reading, England
Boston, MA
Roseville, MN
Calgary, Canada
Seoul, Korea
Milan, Italy
Or-Yehuda, Israel
London, England
Beijing, China
Redwood City, CA
Munich, Germany
Madrid, Spain
Taipei, Taiwan
Mountain View, CA
Paris, France
Pune, India
Singapore
Santa Monica, CA
Heathrow, FL
Orem, UT/American Fork, UT
Austin, TX
Buenos Aires, Argentina
Sydney, Australia
10Integrated Information Integrity Solutions
Email Security and Availability Business
Continuity Regulatory Compliance
5
11Email Security and Availability
- Challenges
- Email is the mission critical application for
conducting business, a growing vulnerability for
security and availability, and the document of
record for business - Symantec Email Security and Availability Solution
- Protect from email born threats
- Manage the increasing cost of storage for email
- Meet compliance and risk management requirements
- Benefits
- Reduce infrastructure costs
- Improve service levels
- Address critical policy needs
- Email has become the primary medium for how we
communicate. The consequence is that email has
become a de facto record repository. - CIO Magazine, Jan 2005
12Symantec Provides a Holistic Solution
Leading Email Archiving
Leading Email Security
Enterprise Vault
Symantec Mail Security Software/Appliances/Hosted
SMTP Traffic
MTA
Microsoft Exchange
IBM Lotus Domino
Leading Backup/Recovery
Leading Storage Management
Manage Email Lifecycle
Email Management
Keep Email Protected
Storage Foundation HA
Net Backup Backup Exec
Keep Email Running
13Keep Email Information Secure and Available
Records Discovery and Retrieval
Risk and Data Reduction
Internal Email Protection
RecordsRetention
Data Reduction
Monitor, search and retrieve archived content for
compliance, legal discovery and other needs
Automatically capture, manage and retain email
and other records based on business policies
Stop viruses, spam, phishing attacks before
reaching email stores, end-users
Reduce volume of spam before it hits network and
email infrastructure
Scan internal and outbound traffic for viruses
and unauthorized content
Resilient Foundation
Recover quickly through efficient backupReduce
downtime via clusteringReplicate and geo-cluster
for disaster recoveryManage storage for
automated provisioning
Spam Quarantine
14Business Continuity
Threats To IT Infrastructure
- Challenges
- Rediscovering the growing list of events creating
business disruption, 59 of CIOs surveyed have
budgeted increased spending for and focus for
2005/2006 on Business Continuity Initiatives - Symantec Business Continuity Solution
- Vulnerability Management
- High Availability
- Disaster Recovery
- Benefits
- Unparalleled security
- Designed for heterogeneous environments
- Built on industry leading technologies
- Human Error
- Hacking, Phishing, Pharming
- Application Failure
- Database Corruption
- Denial of Service Attacks
- Fire, Flood, Hurricane
- Equipment Failure
- Disruption of Power or Communication
- Malicious Software
- Viruses, Worms, Trojan Horses
- Strikes, Social Unrest
- Sabotage, Terrorism
Source CIO Insight, 30 strategies for the year
ahead, CIO Magazine March 2005 ZD publishing
15Get Ahead of the Problem Integrated Security and
Availability Planning
Vulnerability Proactively Blocked, Application
Failed Over
Availability of Application, Systems, and Data
Assured
Vulnerability Identified and/or Infrastructure
Instrumentation Early Warnings Sent
Mitigation
Reports on attacks and outages updates to
policies and SLAs archiving for audit
Restoration
Remediation
Patches Updates Implemented Across
Infrastructure Applications Recovered Data
Restored
Identification of Systems to Patch, Points of
Attack, Application Failures, Data Loss
16Regulatory Compliance
- Challenges
- Associated time and cost of compliance
initiatives - Lack of standardization
- Complexity
- Symantec Regulatory Compliance Solution
- Implements IT controls for an automated and
repeatable process - Enables retention and timely retrieval of
regulated documents - Benefits
- Automates testing
- Standardizes on common methods
- Addresses multiple compliance initiatives
- Multi-division companys audit and related fees
increased 77 in 2004 due to de-centralized
internal controls testing process (USA Today) - 75 of intellectual property is contained in
e-mail (Gartner Research)
17Implement IT Controls Achieve Sustained
Compliance
Continuous Improvement
Implement Changes
Plan
Manage
Oversee
- Implement and document new policies and processes
- Tools and Services for ongoing management
Project Management Support
18In the Future
an external threat alert will trigger an
internal assessment you will be able to
proactively address performance issues (e.g.
system failures, human errors, disasters, system
vulnerabilities) you will be able to
consolidate and monitor performance slowdowns
along with security alerts and you will be
able to automatically recover compromised systems
19Symantec Leading the Way
- Technology
- Knowledge
- Trusted Advice
- Global Presence
- Rapid Incident Response
- Integrated Solutions
- Partnership
20