SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Gordon Love
                 Regional
Symantec.cloud   Director - Africa
Cloud Adoption in South Africa




                                 Source : Forrester
Cloud Solutions currently adopted?




                                     Source : Forrester
Perception of Value




                      Source : Forrester
Concerns and Barriers to Adoption




                                    Source : Forrester
Cloud Related Cost savings




                             Source : Forrester
Future Adoption




                  Source : Forrester
Future Demand




                Source : Forrester
Symantec
   and the cloud?
90+
petabytes
Global Intelligence Network
  Identifies more threats, takes action faster & prevents impact


                Calgary, Alberta                               Dublin, Ireland



                                                                                                                                                    Tokyo, Japan
    San Francisco, CA
    Mountain View, CA              Austin, TX                                                                            Chengdu, China
          Culver City, CA
                                                                                                                                          Taipei, Taiwan
                                                                                                                    Chennai, India
                                                                                                      Pune, India




  Worldwide Coverage                                        Global Scope and Scale               24x7 Event Logging

                                                                 Rapid Detection
Attack Activity                             Malware Intelligence                 Vulnerabilities                         Spam/Phishing
• 240,000 sensors                           • 133M                               • 35,000+ vulnerabilities               • 5M decoy accounts
• 200+ countries                              client, server, gateways           • 11,000 vendors                        • 8B+ email messages/day
  and territories                             monitored                          • 80,000 technologies                   • 1B+ web requests/day
                                            • Global coverage
  Preemptive Security Alerts                                 Information Protection              Threat Triggered Actions

                                                                                                                                                             1
                                                                                                                                                             1
Threat landscape in context – January 2012
Threat landscape in context – February 2012
Threat landscape in context – January 2012
Threat landscape in context – February 2012
Botnets in South Africa




                          1
Window of vulnerability:
Imsolk.B “Here you have” worm




Threat Landscape
Email Security
                 Email Anti Spam
                 Email Anti Virus
                 Email Image Control
                 Email Content Control
                 Email Management
                 Boundary Encryption
                 Policy Based Encryption
                 Email Archiving
                 Email Continuity
                 Web & IM Security
                 Web Anti Virus & Anti Spyware
                 Web URL Filtering
                 Web Roaming User
Pre-integrated   Secure Enterprise IM
 applications    IM Security
                 Endpoint Security
                 Hosted Endpoint Protection
The Cloud – By the Numbers
           Estimated Addressable SaaS Market ($B) - 30% CAGR


 9                                                             0.4   Remote Access /Monitoring
                                                               0.4   Endpoint Management
 8
 7                                                      0.3
                                                        0.3
                                                               2.4   Backup

 6
                                                 0.3    1.9    0.3
                                                                     Continuity
 5                                               0.3

                                                        0.2    1.8
                                                 1.5                 Archiving
 4                                        0.2
                                          0.2           1.3
                                                 0.2           0.5
 3                           0.2
                             0.2
                                          1.2
                                                 1.0    0.4    0.6   DLP
             0.2             0.9
                                          0.1
                                                 0.3
                                                        0.4
                                                               0.6
                                                                     Encryption
 2           0.1
             0.7             0.1
                                          0.7
                                          0.2
                                                 0.2
                                                 0.4
                                                        0.5
                                                               0.7
                                                                     Endpoint Protection
                             0.5          0.1           0.6
             0.1
 1           0.4             0.1
                             0.0
                             0.2
                                          0.3
                                          0.3
                                                 0.5                 Web Security
             0.1
             0.0             0.2
             0.2                                        1.1    1.3
             0.1                          0.8    1.0
             0.5             0.6
 0                                                                   Email Security

          2009           2010            2011   2012   2013   2014
     Source: IDC and Symantec analysis
Cloud Computing is inevitable




Thank you – Questions?

Gordon_Love@Symantec.com

Weitere ähnliche Inhalte

Andere mochten auch

Xpressions 4.0 Enhancements
Xpressions 4.0 EnhancementsXpressions 4.0 Enhancements
Xpressions 4.0 EnhancementsMichele Eaton
 
Presentación del Betis
Presentación del Betis Presentación del Betis
Presentación del Betis Alex Salas
 
Fundación progreso y democracia
Fundación progreso y democraciaFundación progreso y democracia
Fundación progreso y democraciaelosuaj
 
VICRILA, Glassware Company from Spain -
VICRILA, Glassware Company from Spain  - VICRILA, Glassware Company from Spain  -
VICRILA, Glassware Company from Spain - Lorena Barbeitos Medina
 
Modos de valor e intensidad messiaen
Modos de valor e intensidad messiaenModos de valor e intensidad messiaen
Modos de valor e intensidad messiaenAxel1958
 
Aplicación de airocide en centros educativos
Aplicación de airocide en centros educativosAplicación de airocide en centros educativos
Aplicación de airocide en centros educativosrobertolorente
 
2010 pharo-esug-final
2010 pharo-esug-final2010 pharo-esug-final
2010 pharo-esug-finalPharo
 
El desarroyo del feto Belen y Elena
El desarroyo del feto Belen y ElenaEl desarroyo del feto Belen y Elena
El desarroyo del feto Belen y ElenaJeronimo Blancas
 
He aquí eltemor del señor es la sabiduria
He aquí eltemor del señor es la sabiduria He aquí eltemor del señor es la sabiduria
He aquí eltemor del señor es la sabiduria djduque
 
Moodle Epfl
Moodle EpflMoodle Epfl
Moodle EpflAdrix
 
Rel measuring student-engagement (2011)
Rel measuring student-engagement (2011)Rel measuring student-engagement (2011)
Rel measuring student-engagement (2011)Hyunjin Kim
 
La vía de la plata
La vía de la plataLa vía de la plata
La vía de la plataMaria
 
Como descubrir si la plata es autentica antes de su compra
Como descubrir si la plata es autentica antes de su compraComo descubrir si la plata es autentica antes de su compra
Como descubrir si la plata es autentica antes de su compraCompro Plata
 
Dinopresentatie van Armin
Dinopresentatie van ArminDinopresentatie van Armin
Dinopresentatie van ArminMarc3a
 
Current and Future Trends in e-learning - MEd in Surgical Education - Imperia...
Current and Future Trends in e-learning - MEd in Surgical Education - Imperia...Current and Future Trends in e-learning - MEd in Surgical Education - Imperia...
Current and Future Trends in e-learning - MEd in Surgical Education - Imperia...mtorotro
 

Andere mochten auch (20)

Xpressions 4.0 Enhancements
Xpressions 4.0 EnhancementsXpressions 4.0 Enhancements
Xpressions 4.0 Enhancements
 
Gesiuris Asset Management
Gesiuris Asset ManagementGesiuris Asset Management
Gesiuris Asset Management
 
Salekhard Study Trip 2014
Salekhard Study Trip 2014Salekhard Study Trip 2014
Salekhard Study Trip 2014
 
Presentación del Betis
Presentación del Betis Presentación del Betis
Presentación del Betis
 
Fundación progreso y democracia
Fundación progreso y democraciaFundación progreso y democracia
Fundación progreso y democracia
 
VICRILA, Glassware Company from Spain -
VICRILA, Glassware Company from Spain  - VICRILA, Glassware Company from Spain  -
VICRILA, Glassware Company from Spain -
 
Modos de valor e intensidad messiaen
Modos de valor e intensidad messiaenModos de valor e intensidad messiaen
Modos de valor e intensidad messiaen
 
UR global
UR globalUR global
UR global
 
Aplicación de airocide en centros educativos
Aplicación de airocide en centros educativosAplicación de airocide en centros educativos
Aplicación de airocide en centros educativos
 
2010 pharo-esug-final
2010 pharo-esug-final2010 pharo-esug-final
2010 pharo-esug-final
 
El desarroyo del feto Belen y Elena
El desarroyo del feto Belen y ElenaEl desarroyo del feto Belen y Elena
El desarroyo del feto Belen y Elena
 
He aquí eltemor del señor es la sabiduria
He aquí eltemor del señor es la sabiduria He aquí eltemor del señor es la sabiduria
He aquí eltemor del señor es la sabiduria
 
Moodle Epfl
Moodle EpflMoodle Epfl
Moodle Epfl
 
TRABAJO QUÍMICA VERDE
TRABAJO QUÍMICA VERDETRABAJO QUÍMICA VERDE
TRABAJO QUÍMICA VERDE
 
Folleto
FolletoFolleto
Folleto
 
Rel measuring student-engagement (2011)
Rel measuring student-engagement (2011)Rel measuring student-engagement (2011)
Rel measuring student-engagement (2011)
 
La vía de la plata
La vía de la plataLa vía de la plata
La vía de la plata
 
Como descubrir si la plata es autentica antes de su compra
Como descubrir si la plata es autentica antes de su compraComo descubrir si la plata es autentica antes de su compra
Como descubrir si la plata es autentica antes de su compra
 
Dinopresentatie van Armin
Dinopresentatie van ArminDinopresentatie van Armin
Dinopresentatie van Armin
 
Current and Future Trends in e-learning - MEd in Surgical Education - Imperia...
Current and Future Trends in e-learning - MEd in Surgical Education - Imperia...Current and Future Trends in e-learning - MEd in Surgical Education - Imperia...
Current and Future Trends in e-learning - MEd in Surgical Education - Imperia...
 

Ähnlich wie Security and the Cloud- Symantec

Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Andrew Ryan
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec
 
Cloud computing security john abrena - chicago tour
Cloud computing security    john abrena - chicago tourCloud computing security    john abrena - chicago tour
Cloud computing security john abrena - chicago tourRamon Ray
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network SecurityDjadja Sardjana
 
The New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP IrelandThe New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP IrelandTyler Shields
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesIşınsu Akçetin
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Crew
 
Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1Marco Morana
 
State of the information security nation
State of the information security nationState of the information security nation
State of the information security nationSensePost
 
Defending Behind the Mobile Device
Defending Behind the Mobile DeviceDefending Behind the Mobile Device
Defending Behind the Mobile DeviceTyler Shields
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't StopSophos
 
Detection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day ThreatsDetection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day ThreatsInvincea, Inc.
 
The 5 Stages of Scale
The 5 Stages of ScaleThe 5 Stages of Scale
The 5 Stages of Scalexcbsmith
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
CCCC McAfee Marc Olesen
CCCC McAfee Marc OlesenCCCC McAfee Marc Olesen
CCCC McAfee Marc OlesenCloud Congress
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection NetworkAndrew Wong
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityBob Rhubart
 

Ähnlich wie Security and the Cloud- Symantec (20)

Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
Cloud computing security john abrena - chicago tour
Cloud computing security    john abrena - chicago tourCloud computing security    john abrena - chicago tour
Cloud computing security john abrena - chicago tour
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network Security
 
iScan Online - PCI DSS Mobile Task Force
iScan Online - PCI DSS Mobile Task ForceiScan Online - PCI DSS Mobile Task Force
iScan Online - PCI DSS Mobile Task Force
 
The New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP IrelandThe New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP Ireland
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the Cloud
 
Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1
 
State of the information security nation
State of the information security nationState of the information security nation
State of the information security nation
 
Defending Behind the Mobile Device
Defending Behind the Mobile DeviceDefending Behind the Mobile Device
Defending Behind the Mobile Device
 
S series presentation
S series presentationS series presentation
S series presentation
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop
 
Detection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day ThreatsDetection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day Threats
 
The 5 Stages of Scale
The 5 Stages of ScaleThe 5 Stages of Scale
The 5 Stages of Scale
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
CCCC McAfee Marc Olesen
CCCC McAfee Marc OlesenCCCC McAfee Marc Olesen
CCCC McAfee Marc Olesen
 
ESET on cybersecurity.
ESET on cybersecurity.ESET on cybersecurity.
ESET on cybersecurity.
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
 

Mehr von itnewsafrica

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...itnewsafrica
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...itnewsafrica
 
Koen den Hollander- The Future is Omni
Koen den Hollander- The Future is OmniKoen den Hollander- The Future is Omni
Koen den Hollander- The Future is Omniitnewsafrica
 
Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023itnewsafrica
 
Emphasising Personalization and Customer Journey Mapping in Digital Retail
Emphasising Personalization and  Customer Journey Mapping in Digital  RetailEmphasising Personalization and  Customer Journey Mapping in Digital  Retail
Emphasising Personalization and Customer Journey Mapping in Digital Retailitnewsafrica
 
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...itnewsafrica
 
Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...itnewsafrica
 
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...itnewsafrica
 
Pravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in HealthcarePravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in Healthcareitnewsafrica
 
Braden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African HealthcareBraden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African Healthcareitnewsafrica
 
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...itnewsafrica
 
Anish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination PlatformAnish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination Platformitnewsafrica
 
Andrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the BetterAndrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the Betteritnewsafrica
 
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...itnewsafrica
 

Mehr von itnewsafrica (20)

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
 
Koen den Hollander- The Future is Omni
Koen den Hollander- The Future is OmniKoen den Hollander- The Future is Omni
Koen den Hollander- The Future is Omni
 
Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023
 
Emphasising Personalization and Customer Journey Mapping in Digital Retail
Emphasising Personalization and  Customer Journey Mapping in Digital  RetailEmphasising Personalization and  Customer Journey Mapping in Digital  Retail
Emphasising Personalization and Customer Journey Mapping in Digital Retail
 
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
 
Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...
 
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
 
Pravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in HealthcarePravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in Healthcare
 
Braden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African HealthcareBraden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African Healthcare
 
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
 
Anish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination PlatformAnish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination Platform
 
Andrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the BetterAndrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the Better
 
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
 

Kürzlich hochgeladen

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Kürzlich hochgeladen (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Security and the Cloud- Symantec

  • 1. Gordon Love Regional Symantec.cloud Director - Africa
  • 2. Cloud Adoption in South Africa Source : Forrester
  • 3. Cloud Solutions currently adopted? Source : Forrester
  • 4. Perception of Value Source : Forrester
  • 5. Concerns and Barriers to Adoption Source : Forrester
  • 6. Cloud Related Cost savings Source : Forrester
  • 7. Future Adoption Source : Forrester
  • 8. Future Demand Source : Forrester
  • 9. Symantec and the cloud?
  • 11. Global Intelligence Network Identifies more threats, takes action faster & prevents impact Calgary, Alberta Dublin, Ireland Tokyo, Japan San Francisco, CA Mountain View, CA Austin, TX Chengdu, China Culver City, CA Taipei, Taiwan Chennai, India Pune, India Worldwide Coverage Global Scope and Scale 24x7 Event Logging Rapid Detection Attack Activity Malware Intelligence Vulnerabilities Spam/Phishing • 240,000 sensors • 133M • 35,000+ vulnerabilities • 5M decoy accounts • 200+ countries client, server, gateways • 11,000 vendors • 8B+ email messages/day and territories monitored • 80,000 technologies • 1B+ web requests/day • Global coverage Preemptive Security Alerts Information Protection Threat Triggered Actions 1 1
  • 12. Threat landscape in context – January 2012
  • 13. Threat landscape in context – February 2012
  • 14. Threat landscape in context – January 2012
  • 15. Threat landscape in context – February 2012
  • 16. Botnets in South Africa 1
  • 17. Window of vulnerability: Imsolk.B “Here you have” worm Threat Landscape
  • 18. Email Security Email Anti Spam Email Anti Virus Email Image Control Email Content Control Email Management Boundary Encryption Policy Based Encryption Email Archiving Email Continuity Web & IM Security Web Anti Virus & Anti Spyware Web URL Filtering Web Roaming User Pre-integrated Secure Enterprise IM applications IM Security Endpoint Security Hosted Endpoint Protection
  • 19. The Cloud – By the Numbers Estimated Addressable SaaS Market ($B) - 30% CAGR 9 0.4 Remote Access /Monitoring 0.4 Endpoint Management 8 7 0.3 0.3 2.4 Backup 6 0.3 1.9 0.3 Continuity 5 0.3 0.2 1.8 1.5 Archiving 4 0.2 0.2 1.3 0.2 0.5 3 0.2 0.2 1.2 1.0 0.4 0.6 DLP 0.2 0.9 0.1 0.3 0.4 0.6 Encryption 2 0.1 0.7 0.1 0.7 0.2 0.2 0.4 0.5 0.7 Endpoint Protection 0.5 0.1 0.6 0.1 1 0.4 0.1 0.0 0.2 0.3 0.3 0.5 Web Security 0.1 0.0 0.2 0.2 1.1 1.3 0.1 0.8 1.0 0.5 0.6 0 Email Security 2009 2010 2011 2012 2013 2014 Source: IDC and Symantec analysis
  • 20. Cloud Computing is inevitable Thank you – Questions? Gordon_Love@Symantec.com

Hinweis der Redaktion

  1. Overview of SymantecOpened DataCentre in March 2011 in SAConnectivity cheaper, more accessible, one of the mega trendsLocalised Delivery capabiltiy and supportNo vendor specific info – Forrester research, specific to 700 in MEA – SA6 industries
  2. Are Symantec a serious cloud player in the eyes of our customers and partners?
  3. Norton 360Largest Public Storage cloud, 5 Ptb per month, 300 million usersTrust takes time to earnStorage is one thingSecurity is top of mind concern, on avg 8 bn per day through our serviceGives us intelligence - AV, AS, mail filtering
  4. Slide ObjectiveDescribe the strength of the Global Intelligence Network, which is truly a differentiator for Symantec. ScriptAt the heart of all of our products is the Symantec Global Intelligence Network. We are incredibly proud of this Network, and it just gets more and more powerful all the time.We have a 95% detection rate—that’s the highest of any security vendor And the lowest number of false positives (0.0001%)***KM: This is just the anti-spam stat. What stat do we have for our overall effectiveness?***This is, by far, the largest, most sophisticated intelligence network on the planet.It processes over 8 billion email messages daily and gathers malicious code data from 130 million systemsThe Network updates every 5-10 Minutes from 240,000 Sensors In over 200 CountriesThere are more than 35,000 vulnerabilities in the Symantec vulnerability databaseThere are 5 million decoy accounts in the Symantec Probe NetworkThere are 4 Symantec Security Operations Centerslocated in Australia, UK, USA, IndiaThere are 11 Security Response Centers in the USA, Australia, Canada, India, China, IrelandWhat all of this means is that if there is a malicious attack about to hit you, we know about it first. We block it, we keep it from affecting your business, and we tell you how to take action. It’s about prioritized risk and response, and our intelligence network keeps you protected and tells you what to do first. There simply is no approach that’s faster or more thorough than ours. This Network is the main reason that 99% of the Fortune 500 & 1000 utilize our products. This is what makes all the difference between having security software and knowing that your information is protected 24/7.
  5. Environment moves quickly, very dynamicThis nis global phising rateBredoLabbotnetSmaller the company more exposed
  6. 12 months ago – South Africa was 1 in 40. 4 months in a row, top phising target in worldSecurity awareness in SA relatively low in relation to # of new online users
  7. You may pull something from the most current threat deck for this slide. The objective here is that we demonstrate a current example where we used Skeptic to protect our customers with zero hour protection.Tribute to Anikornikova Virus – mass mailerOn September 9, 2010 Symantec .cloud Skeptic technology proactively identified and started blocking a new mass mailer worm.  This new worm, W32.Imsolk.B@mm, with its “Here you have” subject line was a throwback to the types of worms we used to see years ago and used infected machines to send out more copies to the victims’ entire address book. Skeptic is Symantec .cloud’s proprietary heuristic technology for malware and spam filtering. It uses an arsenal of unique and patent-protected technologies to deliver accurate detection of malware including application reputation, junk code analysis, and link following. Skeptic is a core component of Symantec.cloud’s email, web, and instant messaging security services.  Not only did the Symantec .cloud Email Security offering, prevent a single copy from reaching any of our clients, the heuristic rule that triggered the block had actually been in place since 2008. Clients of our Web Security service were also protected due to our converged threat analysis.  For example, if a customer received a copy of the virus via Web mail and clicked the link, we were able to block the downloader upon its first interaction with our Web service. This occurs because the hyperlink is copied across from the Skeptic email towers where the threat first emerged thus ensuring that the link does not operate when detected via the Web.All about scale – 2 cloud vendors beat 85% of traditional security AV vendors – validates the model – sheer scale and volume
  8. The news isn’t all bad – there is a tremendous opportunity for Symantec if we can move quickly