基于云計算的安全防護(hù)解決方案_第1頁
基于云計算的安全防護(hù)解決方案_第2頁
基于云計算的安全防護(hù)解決方案_第3頁
基于云計算的安全防護(hù)解決方案_第4頁
基于云計算的安全防護(hù)解決方案_第5頁
已閱讀5頁,還剩39頁未讀 繼續(xù)免費閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報或認(rèn)領(lǐng)

文檔簡介

1、Delivering Integrated Cyber Defense in the Cloud Generation基于云計算的安全防護(hù)解決方案復(fù)雜的用戶定義區(qū)域辦 公室總部數(shù)據(jù) 中心Security Stack2復(fù)雜的用戶定義Security Stack區(qū)域辦 公室遠(yuǎn)程 用戶個人設(shè)備3總部數(shù)據(jù) 中心演進(jìn)的數(shù)據(jù)攻擊面Security Stack遠(yuǎn)程 用戶個人設(shè)備4區(qū)域辦 公室總部數(shù)據(jù) 中心擴(kuò)展中的網(wǎng)絡(luò)SSL EncryptionSSL EncryptionSecurity Stack遠(yuǎn)程 用戶個人設(shè)備物聯(lián)網(wǎng)設(shè)備5區(qū)域辦 公室總部數(shù)據(jù) 中心SSL Encryption多階段,多維度的攻擊SSL

2、 EncryptionSSL EncryptionSecurity Stack遠(yuǎn)程 用戶個人設(shè)備物聯(lián)網(wǎng)設(shè)備6區(qū)域辦 公室總部數(shù)據(jù) 中心SSL Encryption云時代的創(chuàng)新:確保安全地使用云區(qū)域辦 公室遠(yuǎn)程 用戶個人設(shè)備物聯(lián)網(wǎng)設(shè)備7總部數(shù)據(jù) 中心集成的網(wǎng)絡(luò)防御8集成的網(wǎng)絡(luò)防御9集成的網(wǎng)絡(luò)防御10集成的網(wǎng)絡(luò)防御11集成的網(wǎng)絡(luò)防御1216FileURLWhitelist Blacklist CertificateMachine Learning1.75億被保護(hù)的企業(yè)和個人終端9 全球威脅響應(yīng)中心3000+ 工程師和研究人員10 億每日全新的未分類Web請求20 億每天掃描的電子郵件全球情報網(wǎng) 絡(luò)

3、(GIN) :182M阻止的Web攻擊發(fā)現(xiàn)430 million新的惡意軟件,在去年 一年的時間18,000+防護(hù)的云應(yīng)用100M阻止了如此多的 社會工程詐騙阻止了1B封惡意郵件64,000+保護(hù)的數(shù)據(jù)中心GINxGIN=GIN2last yearCyber Security ServicesA Comprehensive Integrated Portfolio for Every Stage of the Attack LifecycleTrack and Analyze Adversary Groups and Key Trends and Events around the globe

4、 for Actionable IntelligenceDeepSight IntelligenceDetect and Proactively Hunt for Targeted Attacks, Advanced Threats and CampaignsManaged Security ServicesRespond Quickly and Effectively to Credible Security Threats and IncidentsIncident ResponseStrengthen Cyber Readiness to Build Employee Resilienc

5、y and Prevent Sophisticated AttacksCyber Skills DevelopmentWorld-Class Security ExpertiseReactive to ProactiveIntegrated, End-to-End SecurityBefore an AttackDuring an AttackAfter an AttackPreparing for an AttackPRODUCTS14FileURLWhitelist Blacklist CertificateMachine LearningCyber Security Services集成

6、的網(wǎng)絡(luò)安全1520近期其他重要收購24Tagging:User-Centric ClassificationDLP:Content-Centric ClassificationWatchful RightsWATCH User and policy-driven tagging, classification, and watermarkingClassification is KeyData at RestNew Data CreatedCloud Data (CASB)Network Data (Email, Web)EmailOfficeMobileEndpoint DataICT GA

7、June 2017Existing DataDLPMarket LeaderntecWCorapotrcathionful Integration, ICT Kick-off May225Skycure Solution OverviewTHREAT INTELLIGENCECrowd-sourced3rd party threat aggregation Skycure researchCLOUD SERVERRisk/compliance visibility Advanced security Automation & integrationPUBLIC APPSimple deploy

8、ment & maintenance Ensured privacyMinimal footprintConsistent across Managed & Unmanaged scenariosEMMEMM26Branch OfficeRoaming UsersGINConsoleSandboxSymantec Endpoint Protection 14Skycure Mobile Threat DefenseSymantec Endpoint Detection and ResponseSymantec Endpoint Protection CloudHeadquarters Data

9、 CenterPersonal DevicesSymantec Endpoint Security FamilySkycureSkycure27Intelligence ServicesFireglass - Proxy Policies Set to Isolate Risky TrafficUsers123Content & Malware AnalysisAllow trusted sitesBlock known bad sites Analyze risky with CA/MA4Isolate uncategorized/risky sites where accessCopyri

10、gihst ne20e1d6 eSydmantec CorporationCategorized Trusted SitesAllow1Categorized Bad SitesBlock2Uncategorized/Risky WebsitesIsolate4Risky SitesAnalyze3?Integration with Email SecurityIsolates links in email so users can safely click on themIsolates attachments eliminating the risk of malware from dow

11、nloaded filesSymantec Messaging Solutions28Symantec Secure Web Gateways with FireglassHeadquarters Data CenterSymantec Web Security Service (WSS)Threat Protection, Information Security, & Access GovernanceFireglass adds threat isolation for risky and uncategorized sitesRegional OfficePROXYPROXYSyman

12、tec ProxySG2930Leadership Slides for Gartner MQs31Symantecs Leadership in 2016 Gartner Magic QuadrantsGartner Magic Quadrant for Managed Security Services, Worldwide(December 2015)Gartner Magic Quadrant for Endpoint Protection Platforms (February 2016)Gartner Magic Quadrant for Enterprise Data Loss

13、Prevention (January 2016)Gartner Magic Quadrant for Secure Web Gateways (June 2016)This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request fromSymantec. Gart

14、ner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartners research organization and shou

15、ld not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose32Blue Coat (Now Symantec) is Named a Leader in 2016 Gartner Magic Quadrant for Secure Web

16、Gateways:Positioned Highest for Ability to ExecuteThis Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from Symantec. Gartner does not endorse any vendor,

17、 product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartners research organization and should not be construed as statement

18、s of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purposeSource: Magic Quadrant for Secure Web Gateways, Lawrence Orans, Peter Firstbrook, 06 June 2016, Gartner, Inc.33Symantec Nam

19、ed a Leader in the Dec 2015 Gartner Magic Quadrant for Managed Security Services, WorldwideThis Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from Syman

20、tec. Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartners research organization

21、 and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purposeSource: Gartner, Inc., Magic Quadrant for Managed Security Services, Worldwide, Ke

22、lly M. Kavanagh, Toby Bussa, December 23, 201534Symantec Hits Another Milestone 14 Years Running a Leader in Gartner Magic Quadrant for Endpoint Protection Platforms Positioned Highest in Ability to ExecuteThis Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note a

23、nd should be evaluated in the context of the entire report. The Gartner report is available upon request from Symantec. Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ra

24、tings or other designation. Gartner research publications consist of the opinions of Gartners research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or

25、 fitness for a particular purposeSource: Magic Quadrant for Endpoint Protection Platforms, Peter Firstbrook, Eric Ouellet, February 1, 2016Symantec is Named a Leader in 2016 Gartner Magic Quadrant for Enterprise Data Loss Prevention:Positioned Furthest for Ability to Execute and Completeness of Visi

26、onThis Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from Symantec. Gartner does not endorse any vendor, product or service depicted in our research pub

27、lications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartners research organization and should not be construed as statements of fact. Gartner disclaims all warranties, exp

28、ressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purposeSource: Magic Quadrant for Enterprise Data Loss Prevention, Brian Reed, Neil Wynne 28 January 2016, Gartner, Inc.3536Leadership Slides for Forrester Waves37Symantecs Leade

29、rship in 2016 Forrester WavesThe Forrester Wave: Endpoint Security Suites, Q4 2016The Forrester Wave: Automated Malware Analysis, Q2 2016The Forrester Wave: Data Loss Prevention Suites, Q4 2016The Forrester Wave: Cloud Security Gateways, Q4 2016Blue Coat (Symantec) Positioned as a Leader in The Forr

30、ester Wave: Automated Malware Analysis, Q2 2016The Forrester Wave is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forresters call on a market and is plotted using a detailed spreads

31、heet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.Source: April 2016, The Forrester Wave: Aut

32、omated Malware Analysis, Q2 2016“Blue Coat integrates malware analysis into a strong investigation- focused suite”- The Forrester Wave: Automated Malware Analysis, Q2 201638Symantec Positioned as a Leader in The Forrester Wave: Endpoint Security Suites, Q4 2016Source: October 2016 The Forrester Wave

33、: Endpoint Security Suites, Q4 2016The Forrester Wave is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forresters call on a market and is plotted using a detailed spreadsheet with ex

34、posed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.“Symantec offers the most complete endpoint security su

35、ite on the market” - The Forrester Wave: Endpoint Security Suites, Q4 201639Symantec DLP Named as a LeaderForrester Wave: Data Loss Prevention Suites, Q4 2016Source: November 2016, The Forrester Wave: Data Loss Prevention Suites, Q4 2016The Forrester Wave is copyrighted by Forrester Research, Inc. F

36、orrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forresters call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service

37、 depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.“Symantec provides a comprehensive DLP suite with robust capabilities.”“It also offers a rich set of capabilities to help firms meet privacy requirements

38、.”“Symantec continues to innovate in this space and has strong brand recognition in the DLP market.”40Symantec* Named a Leader with the Highest Score in Current Offering in Cloud Security Gateway (CASB)First Forrester Wave in Cloud Security GatewayThe Forrester Wave is copyrighted by Forrester Resea

39、rch, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forresters call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product,

40、 or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.Source: November 2016, The Forrester Wave: Cloud Security Gateways, Q4 2016*Forrester evaluated Blue Coat in the evaluation, which was acquire

41、d by Symantec“It has strong capabilities for Salesforce and other structured data protection, including search, sort, and filtering operations, and offers a wide selection of encryption and decryption policy options.”4142Leadership Slides for IDC Market Share#1 Market Share Leader in Worldwide IT Se

42、curity ProductsSymantec, 11.4%43Cisco, 6.6%IBM, 5.4%Checkpoint,4.6%Others, 65.4%Intel, 6.6%*Source: Elizabeth Corr, Robert Ayoub, Christian A. Christiansen, Angela Gelnaw, Sean Pike, Robert Westervelt, Worldwide IT Security Products Market Shares, 2014: Comprehensive Security Product View, December

43、2015#1 Overall Market Share Leader in Endpoint Security MarketIntel Security, 15.8%Symantec, 27.6%*Source: Robert Westervelt, Elizabeth Corr, Sean Pike,IDC Worldwide Endpoint Security Market Shares, 2015: Currency Volatility Headwind, November 201644Trend Micro, 9.9%Kaspersky Lab, 7.2%ESET, 5.4%AVGT

44、echnologies, 3.9%Others, 30.2%#1 Market Share Leader in Corporate Endpoint Security MarketIntel Security, 17.1%Symantec, 18.2%*Source: Robert Westervelt, Elizabeth Corr, Sean Pike,IDC Worldwide Endpoint Security Market Shares, 2015: Currency Volatility Headwind, November 201644Sophos, 6.0%ESET, 6.0%Trend Micro, 11.7%Kaspersky Labs, 5.3%Others, 35.7%#1 Market Share Leader in Corporate Endpoint Access and Information Protection MarketSymantec, 23.0%*Source: Robert Westervelt, Elizabeth Corr, Sean Pike,IDC Worldwide Endpoint Security Market Shares, 2015: Currency Volatil

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論