SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Gordon Love
                 Regional
Symantec.cloud   Director - Africa
Cloud Adoption in South Africa




                                 Source : Forrester
Cloud Solutions currently adopted?




                                     Source : Forrester
Perception of Value




                      Source : Forrester
Concerns and Barriers to Adoption




                                    Source : Forrester
Cloud Related Cost savings




                             Source : Forrester
Future Adoption




                  Source : Forrester
Future Demand




                Source : Forrester
Symantec
   and the cloud?
90+
petabytes
Global Intelligence Network
  Identifies more threats, takes action faster & prevents impact


                Calgary, Alberta                               Dublin, Ireland



                                                                                                                                                    Tokyo, Japan
    San Francisco, CA
    Mountain View, CA              Austin, TX                                                                            Chengdu, China
          Culver City, CA
                                                                                                                                          Taipei, Taiwan
                                                                                                                    Chennai, India
                                                                                                      Pune, India




  Worldwide Coverage                                        Global Scope and Scale               24x7 Event Logging

                                                                 Rapid Detection
Attack Activity                             Malware Intelligence                 Vulnerabilities                         Spam/Phishing
‱ 240,000 sensors                           ‱ 133M                               ‱ 35,000+ vulnerabilities               ‱ 5M decoy accounts
‱ 200+ countries                              client, server, gateways           ‱ 11,000 vendors                        ‱ 8B+ email messages/day
  and territories                             monitored                          ‱ 80,000 technologies                   ‱ 1B+ web requests/day
                                            ‱ Global coverage
  Preemptive Security Alerts                                 Information Protection              Threat Triggered Actions

                                                                                                                                                             1
                                                                                                                                                             1
Threat landscape in context – January 2012
Threat landscape in context – February 2012
Threat landscape in context – January 2012
Threat landscape in context – February 2012
Botnets in South Africa




                          1
Window of vulnerability:
Imsolk.B “Here you have” worm




Threat Landscape
Email Security
                 Email Anti Spam
                 Email Anti Virus
                 Email Image Control
                 Email Content Control
                 Email Management
                 Boundary Encryption
                 Policy Based Encryption
                 Email Archiving
                 Email Continuity
                 Web & IM Security
                 Web Anti Virus & Anti Spyware
                 Web URL Filtering
                 Web Roaming User
Pre-integrated   Secure Enterprise IM
 applications    IM Security
                 Endpoint Security
                 Hosted Endpoint Protection
The Cloud – By the Numbers
           Estimated Addressable SaaS Market ($B) - 30% CAGR


 9                                                             0.4   Remote Access /Monitoring
                                                               0.4   Endpoint Management
 8
 7                                                      0.3
                                                        0.3
                                                               2.4   Backup

 6
                                                 0.3    1.9    0.3
                                                                     Continuity
 5                                               0.3

                                                        0.2    1.8
                                                 1.5                 Archiving
 4                                        0.2
                                          0.2           1.3
                                                 0.2           0.5
 3                           0.2
                             0.2
                                          1.2
                                                 1.0    0.4    0.6   DLP
             0.2             0.9
                                          0.1
                                                 0.3
                                                        0.4
                                                               0.6
                                                                     Encryption
 2           0.1
             0.7             0.1
                                          0.7
                                          0.2
                                                 0.2
                                                 0.4
                                                        0.5
                                                               0.7
                                                                     Endpoint Protection
                             0.5          0.1           0.6
             0.1
 1           0.4             0.1
                             0.0
                             0.2
                                          0.3
                                          0.3
                                                 0.5                 Web Security
             0.1
             0.0             0.2
             0.2                                        1.1    1.3
             0.1                          0.8    1.0
             0.5             0.6
 0                                                                   Email Security

          2009           2010            2011   2012   2013   2014
     Source: IDC and Symantec analysis
Cloud Computing is inevitable




Thank you – Questions?

Gordon_Love@Symantec.com

Weitere Àhnliche Inhalte

Andere mochten auch

Xpressions 4.0 Enhancements
Xpressions 4.0 EnhancementsXpressions 4.0 Enhancements
Xpressions 4.0 EnhancementsMichele Eaton
 
PresentaciĂłn del Betis
PresentaciĂłn del Betis PresentaciĂłn del Betis
PresentaciĂłn del Betis Alex Salas
 
FundaciĂłn progreso y democracia
FundaciĂłn progreso y democraciaFundaciĂłn progreso y democracia
FundaciĂłn progreso y democraciaelosuaj
 
VICRILA, Glassware Company from Spain -
VICRILA, Glassware Company from Spain  - VICRILA, Glassware Company from Spain  -
VICRILA, Glassware Company from Spain - Lorena Barbeitos Medina
 
Modos de valor e intensidad messiaen
Modos de valor e intensidad messiaenModos de valor e intensidad messiaen
Modos de valor e intensidad messiaenAxel1958
 
UR global
UR globalUR global
UR globalAdigital
 
AplicaciĂłn de airocide en centros educativos
AplicaciĂłn de airocide en centros educativosAplicaciĂłn de airocide en centros educativos
AplicaciĂłn de airocide en centros educativosrobertolorente
 
2010 pharo-esug-final
2010 pharo-esug-final2010 pharo-esug-final
2010 pharo-esug-finalPharo
 
El desarroyo del feto Belen y Elena
El desarroyo del feto Belen y ElenaEl desarroyo del feto Belen y Elena
El desarroyo del feto Belen y ElenaJeronimo Blancas
 
He aquí eltemor del señor es la sabiduria
He aquí eltemor del señor es la sabiduria He aquí eltemor del señor es la sabiduria
He aquí eltemor del señor es la sabiduria djduque
 
Moodle Epfl
Moodle EpflMoodle Epfl
Moodle EpflAdrix
 
TRABAJO QUÍMICA VERDE
TRABAJO QUÍMICA VERDETRABAJO QUÍMICA VERDE
TRABAJO QUÍMICA VERDEcmc11121cgrupo8
 
Rel measuring student-engagement (2011)
Rel measuring student-engagement (2011)Rel measuring student-engagement (2011)
Rel measuring student-engagement (2011)Hyunjin Kim
 
La vĂ­a de la plata
La vĂ­a de la plataLa vĂ­a de la plata
La vĂ­a de la plataMaria
 
Como descubrir si la plata es autentica antes de su compra
Como descubrir si la plata es autentica antes de su compraComo descubrir si la plata es autentica antes de su compra
Como descubrir si la plata es autentica antes de su compraCompro Plata
 
Dinopresentatie van Armin
Dinopresentatie van ArminDinopresentatie van Armin
Dinopresentatie van ArminMarc3a
 
Current and Future Trends in e-learning - MEd in Surgical Education - Imperia...
Current and Future Trends in e-learning - MEd in Surgical Education - Imperia...Current and Future Trends in e-learning - MEd in Surgical Education - Imperia...
Current and Future Trends in e-learning - MEd in Surgical Education - Imperia...mtorotro
 

Andere mochten auch (20)

Xpressions 4.0 Enhancements
Xpressions 4.0 EnhancementsXpressions 4.0 Enhancements
Xpressions 4.0 Enhancements
 
Gesiuris Asset Management
Gesiuris Asset ManagementGesiuris Asset Management
Gesiuris Asset Management
 
Salekhard Study Trip 2014
Salekhard Study Trip 2014Salekhard Study Trip 2014
Salekhard Study Trip 2014
 
PresentaciĂłn del Betis
PresentaciĂłn del Betis PresentaciĂłn del Betis
PresentaciĂłn del Betis
 
FundaciĂłn progreso y democracia
FundaciĂłn progreso y democraciaFundaciĂłn progreso y democracia
FundaciĂłn progreso y democracia
 
VICRILA, Glassware Company from Spain -
VICRILA, Glassware Company from Spain  - VICRILA, Glassware Company from Spain  -
VICRILA, Glassware Company from Spain -
 
Modos de valor e intensidad messiaen
Modos de valor e intensidad messiaenModos de valor e intensidad messiaen
Modos de valor e intensidad messiaen
 
UR global
UR globalUR global
UR global
 
AplicaciĂłn de airocide en centros educativos
AplicaciĂłn de airocide en centros educativosAplicaciĂłn de airocide en centros educativos
AplicaciĂłn de airocide en centros educativos
 
2010 pharo-esug-final
2010 pharo-esug-final2010 pharo-esug-final
2010 pharo-esug-final
 
El desarroyo del feto Belen y Elena
El desarroyo del feto Belen y ElenaEl desarroyo del feto Belen y Elena
El desarroyo del feto Belen y Elena
 
He aquí eltemor del señor es la sabiduria
He aquí eltemor del señor es la sabiduria He aquí eltemor del señor es la sabiduria
He aquí eltemor del señor es la sabiduria
 
Moodle Epfl
Moodle EpflMoodle Epfl
Moodle Epfl
 
TRABAJO QUÍMICA VERDE
TRABAJO QUÍMICA VERDETRABAJO QUÍMICA VERDE
TRABAJO QUÍMICA VERDE
 
Folleto
FolletoFolleto
Folleto
 
Rel measuring student-engagement (2011)
Rel measuring student-engagement (2011)Rel measuring student-engagement (2011)
Rel measuring student-engagement (2011)
 
La vĂ­a de la plata
La vĂ­a de la plataLa vĂ­a de la plata
La vĂ­a de la plata
 
Como descubrir si la plata es autentica antes de su compra
Como descubrir si la plata es autentica antes de su compraComo descubrir si la plata es autentica antes de su compra
Como descubrir si la plata es autentica antes de su compra
 
Dinopresentatie van Armin
Dinopresentatie van ArminDinopresentatie van Armin
Dinopresentatie van Armin
 
Current and Future Trends in e-learning - MEd in Surgical Education - Imperia...
Current and Future Trends in e-learning - MEd in Surgical Education - Imperia...Current and Future Trends in e-learning - MEd in Surgical Education - Imperia...
Current and Future Trends in e-learning - MEd in Surgical Education - Imperia...
 

Ähnlich wie Security and the Cloud- Symantec

Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Andrew Ryan
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec
 
Cloud computing security john abrena - chicago tour
Cloud computing security    john abrena - chicago tourCloud computing security    john abrena - chicago tour
Cloud computing security john abrena - chicago tourRamon Ray
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network SecurityDjadja Sardjana
 
The New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP IrelandThe New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP IrelandTyler Shields
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesIĆŸÄ±nsu Akçetin
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Crew
 
Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1Marco Morana
 
State of the information security nation
State of the information security nationState of the information security nation
State of the information security nationSensePost
 
Defending Behind the Mobile Device
Defending Behind the Mobile DeviceDefending Behind the Mobile Device
Defending Behind the Mobile DeviceTyler Shields
 
S series presentation
S series presentationS series presentation
S series presentationSergey Marunich
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't StopSophos
 
Detection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day ThreatsDetection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day ThreatsInvincea, Inc.
 
The 5 Stages of Scale
The 5 Stages of ScaleThe 5 Stages of Scale
The 5 Stages of Scalexcbsmith
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
CCCC McAfee Marc Olesen
CCCC McAfee Marc OlesenCCCC McAfee Marc Olesen
CCCC McAfee Marc OlesenCloud Congress
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection NetworkAndrew Wong
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityBob Rhubart
 

Ähnlich wie Security and the Cloud- Symantec (20)

Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
Cloud computing security john abrena - chicago tour
Cloud computing security    john abrena - chicago tourCloud computing security    john abrena - chicago tour
Cloud computing security john abrena - chicago tour
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network Security
 
iScan Online - PCI DSS Mobile Task Force
iScan Online - PCI DSS Mobile Task ForceiScan Online - PCI DSS Mobile Task Force
iScan Online - PCI DSS Mobile Task Force
 
The New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP IrelandThe New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP Ireland
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the Cloud
 
Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1
 
State of the information security nation
State of the information security nationState of the information security nation
State of the information security nation
 
Defending Behind the Mobile Device
Defending Behind the Mobile DeviceDefending Behind the Mobile Device
Defending Behind the Mobile Device
 
S series presentation
S series presentationS series presentation
S series presentation
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop
 
Detection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day ThreatsDetection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day Threats
 
The 5 Stages of Scale
The 5 Stages of ScaleThe 5 Stages of Scale
The 5 Stages of Scale
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
CCCC McAfee Marc Olesen
CCCC McAfee Marc OlesenCCCC McAfee Marc Olesen
CCCC McAfee Marc Olesen
 
ESET on cybersecurity.
ESET on cybersecurity.ESET on cybersecurity.
ESET on cybersecurity.
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
 

Mehr von itnewsafrica

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...itnewsafrica
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...itnewsafrica
 
Koen den Hollander- The Future is Omni
Koen den Hollander- The Future is OmniKoen den Hollander- The Future is Omni
Koen den Hollander- The Future is Omniitnewsafrica
 
Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023itnewsafrica
 
Emphasising Personalization and Customer Journey Mapping in Digital Retail
Emphasising Personalization and  Customer Journey Mapping in Digital  RetailEmphasising Personalization and  Customer Journey Mapping in Digital  Retail
Emphasising Personalization and Customer Journey Mapping in Digital Retailitnewsafrica
 
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...itnewsafrica
 
Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...itnewsafrica
 
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...itnewsafrica
 
Pravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in HealthcarePravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in Healthcareitnewsafrica
 
Braden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African HealthcareBraden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African Healthcareitnewsafrica
 
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...itnewsafrica
 
Anish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination PlatformAnish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination Platformitnewsafrica
 
Andrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the BetterAndrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the Betteritnewsafrica
 
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...itnewsafrica
 

Mehr von itnewsafrica (20)

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
 
Koen den Hollander- The Future is Omni
Koen den Hollander- The Future is OmniKoen den Hollander- The Future is Omni
Koen den Hollander- The Future is Omni
 
Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023
 
Emphasising Personalization and Customer Journey Mapping in Digital Retail
Emphasising Personalization and  Customer Journey Mapping in Digital  RetailEmphasising Personalization and  Customer Journey Mapping in Digital  Retail
Emphasising Personalization and Customer Journey Mapping in Digital Retail
 
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
 
Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...
 
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
 
Pravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in HealthcarePravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in Healthcare
 
Braden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African HealthcareBraden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African Healthcare
 
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
 
Anish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination PlatformAnish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination Platform
 
Andrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the BetterAndrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the Better
 
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
 

KĂŒrzlich hochgeladen

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

KĂŒrzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Security and the Cloud- Symantec

  • 1. Gordon Love Regional Symantec.cloud Director - Africa
  • 2. Cloud Adoption in South Africa Source : Forrester
  • 3. Cloud Solutions currently adopted? Source : Forrester
  • 4. Perception of Value Source : Forrester
  • 5. Concerns and Barriers to Adoption Source : Forrester
  • 6. Cloud Related Cost savings Source : Forrester
  • 7. Future Adoption Source : Forrester
  • 8. Future Demand Source : Forrester
  • 9. Symantec and the cloud?
  • 11. Global Intelligence Network Identifies more threats, takes action faster & prevents impact Calgary, Alberta Dublin, Ireland Tokyo, Japan San Francisco, CA Mountain View, CA Austin, TX Chengdu, China Culver City, CA Taipei, Taiwan Chennai, India Pune, India Worldwide Coverage Global Scope and Scale 24x7 Event Logging Rapid Detection Attack Activity Malware Intelligence Vulnerabilities Spam/Phishing ‱ 240,000 sensors ‱ 133M ‱ 35,000+ vulnerabilities ‱ 5M decoy accounts ‱ 200+ countries client, server, gateways ‱ 11,000 vendors ‱ 8B+ email messages/day and territories monitored ‱ 80,000 technologies ‱ 1B+ web requests/day ‱ Global coverage Preemptive Security Alerts Information Protection Threat Triggered Actions 1 1
  • 12. Threat landscape in context – January 2012
  • 13. Threat landscape in context – February 2012
  • 14. Threat landscape in context – January 2012
  • 15. Threat landscape in context – February 2012
  • 16. Botnets in South Africa 1
  • 17. Window of vulnerability: Imsolk.B “Here you have” worm Threat Landscape
  • 18. Email Security Email Anti Spam Email Anti Virus Email Image Control Email Content Control Email Management Boundary Encryption Policy Based Encryption Email Archiving Email Continuity Web & IM Security Web Anti Virus & Anti Spyware Web URL Filtering Web Roaming User Pre-integrated Secure Enterprise IM applications IM Security Endpoint Security Hosted Endpoint Protection
  • 19. The Cloud – By the Numbers Estimated Addressable SaaS Market ($B) - 30% CAGR 9 0.4 Remote Access /Monitoring 0.4 Endpoint Management 8 7 0.3 0.3 2.4 Backup 6 0.3 1.9 0.3 Continuity 5 0.3 0.2 1.8 1.5 Archiving 4 0.2 0.2 1.3 0.2 0.5 3 0.2 0.2 1.2 1.0 0.4 0.6 DLP 0.2 0.9 0.1 0.3 0.4 0.6 Encryption 2 0.1 0.7 0.1 0.7 0.2 0.2 0.4 0.5 0.7 Endpoint Protection 0.5 0.1 0.6 0.1 1 0.4 0.1 0.0 0.2 0.3 0.3 0.5 Web Security 0.1 0.0 0.2 0.2 1.1 1.3 0.1 0.8 1.0 0.5 0.6 0 Email Security 2009 2010 2011 2012 2013 2014 Source: IDC and Symantec analysis
  • 20. Cloud Computing is inevitable Thank you – Questions? Gordon_Love@Symantec.com

Hinweis der Redaktion

  1. Overview of SymantecOpened DataCentre in March 2011 in SAConnectivity cheaper, more accessible, one of the mega trendsLocalised Delivery capabiltiy and supportNo vendor specific info – Forrester research, specific to 700 in MEA – SA6 industries
  2. Are Symantec a serious cloud player in the eyes of our customers and partners?
  3. Norton 360Largest Public Storage cloud, 5 Ptb per month, 300 million usersTrust takes time to earnStorage is one thingSecurity is top of mind concern, on avg 8 bn per day through our serviceGives us intelligence - AV, AS, mail filtering
  4. Slide ObjectiveDescribe the strength of the Global Intelligence Network, which is truly a differentiator for Symantec. ScriptAt the heart of all of our products is the Symantec Global Intelligence Network. We are incredibly proud of this Network, and it just gets more and more powerful all the time.We have a 95% detection rate—that’s the highest of any security vendor And the lowest number of false positives (0.0001%)***KM: This is just the anti-spam stat. What stat do we have for our overall effectiveness?***This is, by far, the largest, most sophisticated intelligence network on the planet.It processes over 8 billion email messages daily and gathers malicious code data from 130 million systemsThe Network updates every 5-10 Minutes from 240,000 Sensors In over 200 CountriesThere are more than 35,000 vulnerabilities in the Symantec vulnerability databaseThere are 5 million decoy accounts in the Symantec Probe NetworkThere are 4 Symantec Security Operations Centerslocated in Australia, UK, USA, IndiaThere are 11 Security Response Centers in the USA, Australia, Canada, India, China, IrelandWhat all of this means is that if there is a malicious attack about to hit you, we know about it first. We block it, we keep it from affecting your business, and we tell you how to take action. It’s about prioritized risk and response, and our intelligence network keeps you protected and tells you what to do first. There simply is no approach that’s faster or more thorough than ours. This Network is the main reason that 99% of the Fortune 500 & 1000 utilize our products. This is what makes all the difference between having security software and knowing that your information is protected 24/7.
  5. Environment moves quickly, very dynamicThis nis global phising rateBredoLabbotnetSmaller the company more exposed
  6. 12 months ago – South Africa was 1 in 40. 4 months in a row, top phising target in worldSecurity awareness in SA relatively low in relation to # of new online users
  7. You may pull something from the most current threat deck for this slide. The objective here is that we demonstrate a current example where we used Skeptic to protect our customers with zero hour protection.Tribute to Anikornikova Virus – mass mailerOn September 9, 2010 Symantec .cloud Skeptic technology proactively identified and started blocking a new mass mailer worm.  This new worm, W32.Imsolk.B@mm, with its “Here you have” subject line was a throwback to the types of worms we used to see years ago and used infected machines to send out more copies to the victims’ entire address book. Skeptic is Symantec .cloud’s proprietary heuristic technology for malware and spam filtering. It uses an arsenal of unique and patent-protected technologies to deliver accurate detection of malware including application reputation, junk code analysis, and link following. Skeptic is a core component of Symantec.cloud’s email, web, and instant messaging security services.  Not only did the Symantec .cloud Email Security offering, prevent a single copy from reaching any of our clients, the heuristic rule that triggered the block had actually been in place since 2008. Clients of our Web Security service were also protected due to our converged threat analysis.  For example, if a customer received a copy of the virus via Web mail and clicked the link, we were able to block the downloader upon its first interaction with our Web service. This occurs because the hyperlink is copied across from the Skeptic email towers where the threat first emerged thus ensuring that the link does not operate when detected via the Web.All about scale – 2 cloud vendors beat 85% of traditional security AV vendors – validates the model – sheer scale and volume
  8. The news isn’t all bad – there is a tremendous opportunity for Symantec if we can move quickly