SlideShare ist ein Scribd-Unternehmen logo
1 von 31
Downloaden Sie, um offline zu lesen
Salah Nassar
Director,Product
Marketing, Symantec
Tim Murphy
Sr. Manager,Product
Marketing, Symantec
Implementing a Zero Trust framework to
Secure Modern Workflows
Cloud & Web Access Security
Copyright © 2017 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 2
ZERO
TRUST
Agenda
Introduction to Zero Trust
Secure Migration to the Cloud
Secure Cloud Access Solution
Questions
Zero Trust Spotlight: IaaS Access
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 4
ZERO TRUST
FORRESTER INTRODUCES
OVER A DECADE AGO
• Challenged existing
perimeter-based security
strategies
• Promoteda concept of
“DefaultDeny”; Least
Privileged Access
• Network-centric
Zero Trust Security
Introduction
ZERO TRUST TODAY
ZERO TRUST HAS GROWN IN
ITS SCOPE AND DEFINITION
• Evolved beyond network
• Addresses new threats and
compliance requirements
• Becominga practical
framework capable of guiding
security practitionersacrossall
IT areas
BLUEPRINT
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 5
ZTX model’s goal is to:
• Strengthen data security
• Limit the risks associated with excessiveuser
privileges and access
• Improve security detection and response with
analytics and automation
Forrester Zero Trust eXtended (ZTX) Ecosystem Model
Introduction
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 6
Forrester ZTX Model
Applying
Zero
Trust
Data
Network
Workloads
Devices
People/
Workforce
Analytics &
Automation
Requires an organization to rethink
existing security approach
Where are our customers starting?
Securing Access
Securing Cloud Migration &
Digital Transformation
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 8
Private CloudDC
SaaS Apps & Email
Web & Internet
IaaS& PaaS
Digital Transformation Creating New Cloud
and Web Security Challenges
Regional
Office
Roaming
Users
Headquarters
COMPLEX
THREATS
BYOD
Need to mitigate security-relatedbusiness
risk from transformationprograms
Backhaulsecurity architecture
cannot scale
Digital transformationprograms
exacerbate issue
Enterprises need secure “direct-to-net”
access,across all destinations
https://
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 9
Eliminate backhaul expense
and complexity
No need to manage on-premises
appliances
Covering security needs across all
web and cloud app destinations
Private CloudDC
https://
Web & Internet
IaaS& PaaS
Digital Transformation Creating New Cloud
and Web Security Challenges
Regional
Office
Roaming
Users
Headquarters
COMPLEX
THREATS
BYOD
Cloud Delivered
Security
SaaS Apps& Email
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 10
Users need direct-to-net security and
advanced protection from web threats,
regardless of location
ADVANCED WEB THREATS
Secure access to SaaS apps difficult
to manage – especially with BYOD
SaaS APP SECURITY
Complex to manage anywhere-
anytime access to Corporate apps
CORP. APP SECURITY
Anywhere-Anytime Secure Web & Cloud Access
Remains the leadingthreat vector,
creatingincidents consuming
constrained resources
EMAIL SECURITY
CloudSOC
CASBWeb Security
Service
Secure
Access Cloud
Email
Security.cloud
Cloud Email
PrivateCloud DC
IaaS & PaaS
https://
SaaS Apps& EmailWeb & Internet
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 11
Private CloudDC
https://
Web & Internet
IaaS&PaaS
SaaS Apps& Email
Symantec Cloud & Web Access Security
Symantec uniquely
positioned to solve
broad set of access
security
requirements
CloudSOC Cloud
App Security
Secure Access
Cloud
Web Security
Service
Email
Security.cloud
Symantec
Cloud & Web
Access
Security
Regional
Office
Roaming
Users
Headquarters
12
Symantec Cloud & Web
Access Security Solution
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 13
Cloud Email
Business Challenges
• Defend against phishing
attacks and ransomware
• Prevent Business Email
Compromise andFraud
• Eliminate SPAM
Symantec Cloud & Web Access Security
Business Requirements
• Enforce acceptable web use
• Defend against malware
• Protect information
• Eliminate backhauland
maintain performance
https://
Web & Internet
Business Requirements
• Control“ShadowIT”
• Enforce security/information
protection on sanctionedapps
• Defend against credentialtheft
and malicious insiders
SaaS Apps
Business Challenges
• Provide “lean” secure access
to corporate apps and
resources
• Prevent dataleakage and
defend against threats
• Reduce VPNcomplexity/cost
IaaS& PaaS
Web Security Service CloudSOCCASB Secure Access Cloud EmailSecurity.cloud
Access Control,Information Security, andThreat Prevention
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 14
Fully integratednetwork security stack in the cloud
Web Security Service
Web Security Service
Regional
Office
Roaming
Users
Headquarters
Accelerated
Cloud BackboneTelco POP
Backbone
Automate Policy &
Content Acceleration
Elastic Cloud
SVC Structure
Content Peering &
Connection Scaling
3rd Party
Monitoring
Advanced Security Services
Cloud Firewall Service*
Authentication
SecureSSL
Decrypt
FileExtraction
& Inspection
URL Policy
(CASB Risk, Web
Threats, Content Cat)
Proxy
Inspect Before Delivery
SEP/Agent
IPSec
SD-WAN
Connect
Connection
Services
Advanced Malware
Analysis Service (Sandbox)
Web Isolation
DLP Inspect & Enforce
Cloud Access Security
Broker (CASB)
* 2nd halfCY2020
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 15
IntegrationwithSecure Access Cloud (contextualawarenessbetweenservices)
Web Security Service
15
Web Security
Service
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 16
AUDIT – APPFEED
GIN
• Risk attribute data onover 30,000 cloudapplications
• Enforce applicationaccess policy controls by application,user,group, etc.
• In-line DLPenforcement onall cloudandwebapplicationtraffic
• Extendcontrols withmarket-leadingCASB solution: CloudSOC
CASB Audit
App
Rating
Database
Analytics
Proxy
Control Shadow IT
CASB Controls with Web Security Service
Access
Control
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 17
Symantec CASB CloudSOC for SaaS
CloudSOC
Data
Security
Understand& monitor
risk exposure across
public cloud apps &
infrastructure
• ShadowIT
• Compliance SensitiveData
• GDPR Exposure
• Cost Savings
Govern access to
critical data,extend
protectionsagainst
breach
• Discover sensitivedata
• Implement strongaccess controls
• Integrate MFA, encryption,& multi-channelDLP
• Leap forward toward GDPR
Protectagainst
threats,detect,
investigate,and
remediate incidents
• Protect against malware
• Detect malicious behavior
• Investigate activity – deep forensics across apps
• Respond with revocation,quarantine, & policy
Threat
Protection
Visibility
Comprehensive security for public SaaS applications
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 18
Addresses unmanaged devices, but:
•RequiresextensiveURLrewriting
•Limitednumberof apps supported
Traditional Control Points for CASB—Gateway & API
CloudSOC CASB
18
Real-Time Policy Enforcement
Adaptive/Conditional Access
Forward or Reverse Proxy
SanctionedApps
BYOD & Cloud-to-Cloud
Easy to Deploy
Gateway
API
Key Unresolved Issue in the Market
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 19
Mirror Gateway Executes & Renders App Sessions Remotely
CloudSOC CASB: Introducing Mirror Gateway
19
IDP
Unmanaged
Devices
Managed
Devices
Symantec
CloudSOC
Gateway
Isolation Portal
SAML Assertation
SAMLProxy
SSO
• User goes toCloudApp andis redirected toSAML Proxy/ IDP
• SAML Proxy redirects toisolation portal (think asuser browser
running in the cloud)
• Mirror GWportal tunnels trafficthorough CASB Gatewaythat
applies allGatelet controls
• Mirror GWportal does NOTrewrite URLs,sosolution is robust
Cloud
Applications
ANY DEVICE
Unmanaged,
BYOD
SECURE
No app data
processed or
storedlocally
ANY APP
All browser
based apps
(no limit)
ROBUST
No URL rewrites,
impervious to SaaS
app changes
GRANULAR POLICY
CASB gateway provides
full threat protection,
DLP & app controls
CloudSOC Cloud
App Security
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 20
ContinuousCloud Protection with Okta and Symantec VIP
CloudSOC CASB & MFA
20
SENSITIVE CONTENT
TRANSACTION DETAILS
USER THREAT DATA
0 Step up
authentication to
sensitive content
Get visibility of all
access and actions
Deny access to
risky users
Cloud
Applications
CloudSOC Cloud
App Security
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 21
To any corporate
application
Zero trust application access for corporate apps in the cloud
Secure Access Cloud for IaaS
In the cloud / On-premises
Without provisioning VPN, DMZ
Without managing endpoint agent
Zero Trust Access—trust is continuously verified; access is limited
Security Category—Software Defined Perimeter (SDP)
Securely connect
any user
from any device
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 22
Secure Access Cloud and CloudSOC Integration
Information Protection & Threat Prevention
CloudSOC
Datacenter
Secure
Access Cloud
DLP
Isolation
MFA
Threat Prevention
UEBA
ANY DEVICE
SECURE ACCESS
ANY RESOURCE
CENTRALIZEDDLP
UNIFIEDTHREAT
PREVENTION
Unmanaged,BYOD
Mobile
Conditional,adaptive,granular access
controls with MFA
Manage threat protection,UEBA,and
investigate incidents in one console
Enforce universal policies from a single,
centrallymanaged DLP
SaaS, PaaS, IaaS
Public,Private and Hybrid Cloud Datacenters
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 23
IaaS& PaaS
Secure Access Cloud—Integrated MFA
• SDP eliminates complexity
of VPN-based access
• Agentless approach simplifies
third party& BYOD access
• Up & runningin minutes
In the cloud / On-premises
Without provisioningVPN,DMZ
Without managingendpoint agents
Securelyconnect
any user from
any device
Agentless
Deploy
in
MinutesTo any
corporate
application
AWS
AZURE
ORACLE
PRIVATE
Secure
Access Cloud
23
Secure Access Cloud now comes with MFA capability
• Stepped-Up Auth -verify usingVIP Push or One Time Password
• For mobile, a simple app is downloadedand the device becomes the credential
Authenticate User
Validate Device Health
MFA ForStepped-UpAuth
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 24
Email Security.cloud for Cloud-based Email
Comprehensive security for cloud Email
Data Security
Visibility and Control
Threat Prevention
& Fraud Protection
Social
Engineering
Users are falling for
credentialtheft,
phishing and
BEC scams
Advanced
Threats
Ransomwareand
targeted attacks are
difficult to detect
and remediate
Data
Protection
Sensitive information
is shared overemail
without control
and visibility
COMPREHENSIVE
Impersonation
Controls
Security
Awareness
Data Protection
Policy-Based
Encryption
Anti-Spam
Anti-Malware
Advanced Threat
Protection
Threat
Isolation
Email
Analytics
Fraud
Protection
Email
Security.cloud
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 25
Allow Link
Trusted Websites
Most significant threat preventionissues in enterprise Email
Phishing/Credential Theft & Malware
Spear Phishing
Attack
Evaluate Links
at Delivery Time
Block Attack
Users
Evaluate Links
at Click Time
1 2 3
Educated Users
Don’t Click On Links
Phishing
Readiness
EmailThreat
Isolation
4
Unknown Websites
Isolate Link & Attachments
Threats reducedwith each step
Block Attack
✓
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 26
Isolation defeats even the most advanced Email attacks
Stop Phishing and Ransomware with Isolation
User gestures
100% safe
renderinginformation
RenderExecuteDownload
Secure Disposable Container
10010100101
01101001100
10101
101010011010
011
110
Email Threat
Isolation
Defends users from spear phishing attacks
by isolating suspicious links
Preventsransomwareattacksfrom infecting users
by isolating malicious attachments
Email Attachments
Email Links
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 27
Symantec Cloud & Web Access Security
• Core proxy gateway
• Firewall controls
• Threat preventionwith
Web Isolation
• Info security (DLP)& CASB
extension
• SD-WAN andSEP onramps
https://
Web &Internet
Web Security Service
• Advancedvisibility, granular
access/use controls
• Data protectionincorporate
SaaS apps
• Threat prevention&UEBA
• BYOD access to corporate
accounts via mirrorgateway
SaaS Apps
CloudSOCCASB
• Software DefinedPerimeter
(SDP) eliminates complexity
of VPN-basedaccess
• Agentless approachsimplifies
third party & BYOD access
• Up& running in minutes
IaaS& PaaS
Secure Access Cloud
Cloud Email
EmailSecurity.cloud
• Strongspear phishing
defense including link and
attachment isolation
• Multiple threat prevention
tools to prevent
ransomware
• Business email compromise
and fraudprevention
• Informationsecurity (DLP)
Access Control,Information Security, andThreat Prevention
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 28
Examples of Policy Orchestration & Execution
Service Integration Within the Solution
Web
Security Service
Email
Security.cloud
CloudSOC
CASB
• Remote Browser Isolation (WSS)
• Email URL & attachmentisolation
• Mirror Gateway@ CASB
Isolation
Web
Security
Service
CloudSOC
CASB
Secure Access
Cloud (SAC)
• Cloud App-Feed forShadowIT
identification& control
• WSS trafficforwardingto CloudSOC
gatewayfor CASB policy enforcement
• Context aware policyenforcement
(Secure Access Cloud)
Web
Security Service
Email
Security.cloud
CloudSOC
CASB
DLP
• Consistent DLP policyenforcement
across web, SaaS, IaaS,and email
SAC
Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 29
Private CloudDC
SaaS Apps & Email
Web & Internet
IaaS&PaaS
https://
Regional
Office
Roaming
Users
Headquarters
Securing your digital transformation initiatives
Symantec Cloud & Web Access Security
Mitigate business risk by partnering with Symantec
Simple& Complete
Comprehensivesecure cloud access services
ImprovedSecurity
Advanced threat prevention techniques
for Web, Email,SaaS, IaaS
Cost Effective
Subscription model;no additional
infrastructure
Symantec
Cloud &
Web Access
Security
QUESTIONS ?
Salah Nassar
Director,ProductMarketing
Symantec
Tim Murphy
Sr. Manager,ProductMarketing
Symantec
Thank you!
Visit our site and request a demo today:
go.symantec.com/SecureAccess

Weitere ähnliche Inhalte

Was ist angesagt?

Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Management Associates
 
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...Amazon Web Services
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Securescoopnewsgroup
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access Er. Ajay Sirsat
 
Mark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust NothingMark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust NothingPro Mrkt
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)Ahmed Banafa
 
Zero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at AdobeZero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at AdobeVishwas Manral
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​AlgoSec
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportMcAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportIftikhar Ali Iqbal
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud SecuritySusanne Tedrick
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityRohit Kapoor
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoCristian Garcia G.
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaCristian Garcia G.
 
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnoxZero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnoxAccuKnox
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!Netskope
 
63 Requirements for CASB
63 Requirements for CASB63 Requirements for CASB
63 Requirements for CASBKyle Watson
 

Was ist angesagt? (20)

Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
 
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
 
Mark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust NothingMark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust Nothing
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
Zero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at AdobeZero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at Adobe
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportMcAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
 
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnoxZero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption? CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption?
 
Don't let wireless_detour_your_pci_compliance
Don't let wireless_detour_your_pci_complianceDon't let wireless_detour_your_pci_compliance
Don't let wireless_detour_your_pci_compliance
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
 
63 Requirements for CASB
63 Requirements for CASB63 Requirements for CASB
63 Requirements for CASB
 

Ähnlich wie Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workflows

Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecSegurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecCSA Argentina
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)Iftikhar Ali Iqbal
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsZscaler
 
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyvSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyMarketingArrowECS_CZ
 
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerMigration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerZscaler
 
De-Witt Tromp- Introduction to Zero Trust & SASE.
De-Witt Tromp- Introduction to Zero Trust & SASE.De-Witt Tromp- Introduction to Zero Trust & SASE.
De-Witt Tromp- Introduction to Zero Trust & SASE.itnewsafrica
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCSA Argentina
 
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBETENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBECristian Garcia G.
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraZscaler
 
Securing Your Cloud Applications
Securing Your Cloud ApplicationsSecuring Your Cloud Applications
Securing Your Cloud ApplicationsIBM Security
 
Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Cynthia Hsieh
 
Accelerating Your Cloud Innovation
Accelerating Your Cloud InnovationAccelerating Your Cloud Innovation
Accelerating Your Cloud InnovationAmazon Web Services
 
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...Amazon Web Services
 
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...Digital Transformation EXPO Event Series
 
2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinarAlgoSec
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Technologies
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Securitycentralohioissa
 
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017Amazon Web Services
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --SymantecAbhishek Sood
 

Ähnlich wie Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workflows (20)

Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecSegurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in aws
 
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyvSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
 
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerMigration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscaler
 
De-Witt Tromp- Introduction to Zero Trust & SASE.
De-Witt Tromp- Introduction to Zero Trust & SASE.De-Witt Tromp- Introduction to Zero Trust & SASE.
De-Witt Tromp- Introduction to Zero Trust & SASE.
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
 
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBETENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
Securing Your Cloud Applications
Securing Your Cloud ApplicationsSecuring Your Cloud Applications
Securing Your Cloud Applications
 
Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020
 
Accelerating Your Cloud Innovation
Accelerating Your Cloud InnovationAccelerating Your Cloud Innovation
Accelerating Your Cloud Innovation
 
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
 
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
 
2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge Security
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Security
 
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --Symantec
 

Mehr von Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantSymantec
 
Symantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec
 

Mehr von Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators Want
 
Symantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 Webinar
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
 

Kürzlich hochgeladen

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Kürzlich hochgeladen (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workflows

  • 1. Salah Nassar Director,Product Marketing, Symantec Tim Murphy Sr. Manager,Product Marketing, Symantec Implementing a Zero Trust framework to Secure Modern Workflows Cloud & Web Access Security
  • 2. Copyright © 2017 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 2 ZERO TRUST
  • 3. Agenda Introduction to Zero Trust Secure Migration to the Cloud Secure Cloud Access Solution Questions Zero Trust Spotlight: IaaS Access
  • 4. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 4 ZERO TRUST FORRESTER INTRODUCES OVER A DECADE AGO • Challenged existing perimeter-based security strategies • Promoteda concept of “DefaultDeny”; Least Privileged Access • Network-centric Zero Trust Security Introduction ZERO TRUST TODAY ZERO TRUST HAS GROWN IN ITS SCOPE AND DEFINITION • Evolved beyond network • Addresses new threats and compliance requirements • Becominga practical framework capable of guiding security practitionersacrossall IT areas BLUEPRINT
  • 5. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 5 ZTX model’s goal is to: • Strengthen data security • Limit the risks associated with excessiveuser privileges and access • Improve security detection and response with analytics and automation Forrester Zero Trust eXtended (ZTX) Ecosystem Model Introduction
  • 6. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 6 Forrester ZTX Model Applying Zero Trust Data Network Workloads Devices People/ Workforce Analytics & Automation Requires an organization to rethink existing security approach Where are our customers starting? Securing Access
  • 7. Securing Cloud Migration & Digital Transformation
  • 8. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 8 Private CloudDC SaaS Apps & Email Web & Internet IaaS& PaaS Digital Transformation Creating New Cloud and Web Security Challenges Regional Office Roaming Users Headquarters COMPLEX THREATS BYOD Need to mitigate security-relatedbusiness risk from transformationprograms Backhaulsecurity architecture cannot scale Digital transformationprograms exacerbate issue Enterprises need secure “direct-to-net” access,across all destinations https://
  • 9. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 9 Eliminate backhaul expense and complexity No need to manage on-premises appliances Covering security needs across all web and cloud app destinations Private CloudDC https:// Web & Internet IaaS& PaaS Digital Transformation Creating New Cloud and Web Security Challenges Regional Office Roaming Users Headquarters COMPLEX THREATS BYOD Cloud Delivered Security SaaS Apps& Email
  • 10. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 10 Users need direct-to-net security and advanced protection from web threats, regardless of location ADVANCED WEB THREATS Secure access to SaaS apps difficult to manage – especially with BYOD SaaS APP SECURITY Complex to manage anywhere- anytime access to Corporate apps CORP. APP SECURITY Anywhere-Anytime Secure Web & Cloud Access Remains the leadingthreat vector, creatingincidents consuming constrained resources EMAIL SECURITY CloudSOC CASBWeb Security Service Secure Access Cloud Email Security.cloud Cloud Email PrivateCloud DC IaaS & PaaS https:// SaaS Apps& EmailWeb & Internet
  • 11. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 11 Private CloudDC https:// Web & Internet IaaS&PaaS SaaS Apps& Email Symantec Cloud & Web Access Security Symantec uniquely positioned to solve broad set of access security requirements CloudSOC Cloud App Security Secure Access Cloud Web Security Service Email Security.cloud Symantec Cloud & Web Access Security Regional Office Roaming Users Headquarters
  • 12. 12 Symantec Cloud & Web Access Security Solution
  • 13. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 13 Cloud Email Business Challenges • Defend against phishing attacks and ransomware • Prevent Business Email Compromise andFraud • Eliminate SPAM Symantec Cloud & Web Access Security Business Requirements • Enforce acceptable web use • Defend against malware • Protect information • Eliminate backhauland maintain performance https:// Web & Internet Business Requirements • Control“ShadowIT” • Enforce security/information protection on sanctionedapps • Defend against credentialtheft and malicious insiders SaaS Apps Business Challenges • Provide “lean” secure access to corporate apps and resources • Prevent dataleakage and defend against threats • Reduce VPNcomplexity/cost IaaS& PaaS Web Security Service CloudSOCCASB Secure Access Cloud EmailSecurity.cloud Access Control,Information Security, andThreat Prevention
  • 14. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 14 Fully integratednetwork security stack in the cloud Web Security Service Web Security Service Regional Office Roaming Users Headquarters Accelerated Cloud BackboneTelco POP Backbone Automate Policy & Content Acceleration Elastic Cloud SVC Structure Content Peering & Connection Scaling 3rd Party Monitoring Advanced Security Services Cloud Firewall Service* Authentication SecureSSL Decrypt FileExtraction & Inspection URL Policy (CASB Risk, Web Threats, Content Cat) Proxy Inspect Before Delivery SEP/Agent IPSec SD-WAN Connect Connection Services Advanced Malware Analysis Service (Sandbox) Web Isolation DLP Inspect & Enforce Cloud Access Security Broker (CASB) * 2nd halfCY2020
  • 15. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 15 IntegrationwithSecure Access Cloud (contextualawarenessbetweenservices) Web Security Service 15 Web Security Service
  • 16. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 16 AUDIT – APPFEED GIN • Risk attribute data onover 30,000 cloudapplications • Enforce applicationaccess policy controls by application,user,group, etc. • In-line DLPenforcement onall cloudandwebapplicationtraffic • Extendcontrols withmarket-leadingCASB solution: CloudSOC CASB Audit App Rating Database Analytics Proxy Control Shadow IT CASB Controls with Web Security Service Access Control
  • 17. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 17 Symantec CASB CloudSOC for SaaS CloudSOC Data Security Understand& monitor risk exposure across public cloud apps & infrastructure • ShadowIT • Compliance SensitiveData • GDPR Exposure • Cost Savings Govern access to critical data,extend protectionsagainst breach • Discover sensitivedata • Implement strongaccess controls • Integrate MFA, encryption,& multi-channelDLP • Leap forward toward GDPR Protectagainst threats,detect, investigate,and remediate incidents • Protect against malware • Detect malicious behavior • Investigate activity – deep forensics across apps • Respond with revocation,quarantine, & policy Threat Protection Visibility Comprehensive security for public SaaS applications
  • 18. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 18 Addresses unmanaged devices, but: •RequiresextensiveURLrewriting •Limitednumberof apps supported Traditional Control Points for CASB—Gateway & API CloudSOC CASB 18 Real-Time Policy Enforcement Adaptive/Conditional Access Forward or Reverse Proxy SanctionedApps BYOD & Cloud-to-Cloud Easy to Deploy Gateway API Key Unresolved Issue in the Market
  • 19. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 19 Mirror Gateway Executes & Renders App Sessions Remotely CloudSOC CASB: Introducing Mirror Gateway 19 IDP Unmanaged Devices Managed Devices Symantec CloudSOC Gateway Isolation Portal SAML Assertation SAMLProxy SSO • User goes toCloudApp andis redirected toSAML Proxy/ IDP • SAML Proxy redirects toisolation portal (think asuser browser running in the cloud) • Mirror GWportal tunnels trafficthorough CASB Gatewaythat applies allGatelet controls • Mirror GWportal does NOTrewrite URLs,sosolution is robust Cloud Applications ANY DEVICE Unmanaged, BYOD SECURE No app data processed or storedlocally ANY APP All browser based apps (no limit) ROBUST No URL rewrites, impervious to SaaS app changes GRANULAR POLICY CASB gateway provides full threat protection, DLP & app controls CloudSOC Cloud App Security
  • 20. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 20 ContinuousCloud Protection with Okta and Symantec VIP CloudSOC CASB & MFA 20 SENSITIVE CONTENT TRANSACTION DETAILS USER THREAT DATA 0 Step up authentication to sensitive content Get visibility of all access and actions Deny access to risky users Cloud Applications CloudSOC Cloud App Security
  • 21. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 21 To any corporate application Zero trust application access for corporate apps in the cloud Secure Access Cloud for IaaS In the cloud / On-premises Without provisioning VPN, DMZ Without managing endpoint agent Zero Trust Access—trust is continuously verified; access is limited Security Category—Software Defined Perimeter (SDP) Securely connect any user from any device
  • 22. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 22 Secure Access Cloud and CloudSOC Integration Information Protection & Threat Prevention CloudSOC Datacenter Secure Access Cloud DLP Isolation MFA Threat Prevention UEBA ANY DEVICE SECURE ACCESS ANY RESOURCE CENTRALIZEDDLP UNIFIEDTHREAT PREVENTION Unmanaged,BYOD Mobile Conditional,adaptive,granular access controls with MFA Manage threat protection,UEBA,and investigate incidents in one console Enforce universal policies from a single, centrallymanaged DLP SaaS, PaaS, IaaS Public,Private and Hybrid Cloud Datacenters
  • 23. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 23 IaaS& PaaS Secure Access Cloud—Integrated MFA • SDP eliminates complexity of VPN-based access • Agentless approach simplifies third party& BYOD access • Up & runningin minutes In the cloud / On-premises Without provisioningVPN,DMZ Without managingendpoint agents Securelyconnect any user from any device Agentless Deploy in MinutesTo any corporate application AWS AZURE ORACLE PRIVATE Secure Access Cloud 23 Secure Access Cloud now comes with MFA capability • Stepped-Up Auth -verify usingVIP Push or One Time Password • For mobile, a simple app is downloadedand the device becomes the credential Authenticate User Validate Device Health MFA ForStepped-UpAuth
  • 24. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 24 Email Security.cloud for Cloud-based Email Comprehensive security for cloud Email Data Security Visibility and Control Threat Prevention & Fraud Protection Social Engineering Users are falling for credentialtheft, phishing and BEC scams Advanced Threats Ransomwareand targeted attacks are difficult to detect and remediate Data Protection Sensitive information is shared overemail without control and visibility COMPREHENSIVE Impersonation Controls Security Awareness Data Protection Policy-Based Encryption Anti-Spam Anti-Malware Advanced Threat Protection Threat Isolation Email Analytics Fraud Protection Email Security.cloud
  • 25. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 25 Allow Link Trusted Websites Most significant threat preventionissues in enterprise Email Phishing/Credential Theft & Malware Spear Phishing Attack Evaluate Links at Delivery Time Block Attack Users Evaluate Links at Click Time 1 2 3 Educated Users Don’t Click On Links Phishing Readiness EmailThreat Isolation 4 Unknown Websites Isolate Link & Attachments Threats reducedwith each step Block Attack ✓
  • 26. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 26 Isolation defeats even the most advanced Email attacks Stop Phishing and Ransomware with Isolation User gestures 100% safe renderinginformation RenderExecuteDownload Secure Disposable Container 10010100101 01101001100 10101 101010011010 011 110 Email Threat Isolation Defends users from spear phishing attacks by isolating suspicious links Preventsransomwareattacksfrom infecting users by isolating malicious attachments Email Attachments Email Links
  • 27. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 27 Symantec Cloud & Web Access Security • Core proxy gateway • Firewall controls • Threat preventionwith Web Isolation • Info security (DLP)& CASB extension • SD-WAN andSEP onramps https:// Web &Internet Web Security Service • Advancedvisibility, granular access/use controls • Data protectionincorporate SaaS apps • Threat prevention&UEBA • BYOD access to corporate accounts via mirrorgateway SaaS Apps CloudSOCCASB • Software DefinedPerimeter (SDP) eliminates complexity of VPN-basedaccess • Agentless approachsimplifies third party & BYOD access • Up& running in minutes IaaS& PaaS Secure Access Cloud Cloud Email EmailSecurity.cloud • Strongspear phishing defense including link and attachment isolation • Multiple threat prevention tools to prevent ransomware • Business email compromise and fraudprevention • Informationsecurity (DLP) Access Control,Information Security, andThreat Prevention
  • 28. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 28 Examples of Policy Orchestration & Execution Service Integration Within the Solution Web Security Service Email Security.cloud CloudSOC CASB • Remote Browser Isolation (WSS) • Email URL & attachmentisolation • Mirror Gateway@ CASB Isolation Web Security Service CloudSOC CASB Secure Access Cloud (SAC) • Cloud App-Feed forShadowIT identification& control • WSS trafficforwardingto CloudSOC gatewayfor CASB policy enforcement • Context aware policyenforcement (Secure Access Cloud) Web Security Service Email Security.cloud CloudSOC CASB DLP • Consistent DLP policyenforcement across web, SaaS, IaaS,and email SAC
  • 29. Copyright © 2018 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 29 Private CloudDC SaaS Apps & Email Web & Internet IaaS&PaaS https:// Regional Office Roaming Users Headquarters Securing your digital transformation initiatives Symantec Cloud & Web Access Security Mitigate business risk by partnering with Symantec Simple& Complete Comprehensivesecure cloud access services ImprovedSecurity Advanced threat prevention techniques for Web, Email,SaaS, IaaS Cost Effective Subscription model;no additional infrastructure Symantec Cloud & Web Access Security
  • 30. QUESTIONS ? Salah Nassar Director,ProductMarketing Symantec Tim Murphy Sr. Manager,ProductMarketing Symantec
  • 31. Thank you! Visit our site and request a demo today: go.symantec.com/SecureAccess