SlideShare uma empresa Scribd logo
1 de 45
Baixar para ler offline
Office 365 Seguro? Sym, Cloud!
Luis Souza Lucas Romaris André de Oliveira
Channel SE Systems Engineer Advanced Support
Acerca de Nuestros Presentadores
Copyright © 2015 Symantec Corporation
LUIS SOUZA
Engenheiro de Pré-vendas, trabalha há 8 anos na Symantec e já atuou em
clientes de Large Enterprise do segmento Financeiro. Hoje é responsável pela
área técnica da área de Canais focado em Segurança da Informação.
ANDRÉ DE OLIVEIRA
Profissional com mais de 15 anos de experiência em Tecnologia da Informação e
há 8 anos trabalhando com Segurança para Endpoint e Messaging na Symantec.
Formado no Mackenzie em Ciências da Computação e Pós Graduado no IPT/USP
em Gestão de Projetos. Atualmente trabalha com foco em suporte avançado a
clientes BCS.
LUCAS ROMARIS
Formado em análise e desenvolvimento de sistemas, trabalha há 6 anos na
Symantec, atuando nas áreas de pré-vendas e consultoria. Atualmente exerce
a função de engenheiro de sistemas com foco em Compliance, Análise de
Vulnerabilidades, e Prevenção contra perda de dados confidenciais.
Agenda
Copyright © 2014 Symantec Corporation
3
1 Estratégia de Segurança da Symantec
2 VIP & SAM for Office 365
3 DLP for Office 365
4 Email Security.cloud
5 Q&A
Segurança Corporativa| Estratégia de Produtos e Serviços
4
Threat Protection
ENDPOINTS DATA CENTER GATEWAYS
• Advanced Threat Protection através de todos os pontos de controle
• Forense e Remediação embutida em cada ponto de controle
• Proteção integrada para Workloads: On-Premise, Virtual e Cloud
• Gestão baseada em nuvem para Endpoints, Datacenter e Gateways
Unified Security Analytics Platform
Coleta de Logs
e Telemetria
Gestão Unificadas
de Incidentes e
Customer Hub
Integrações com
Terceitos e Inteligência
Benchmarking
Regional e por
Segmento
Análise Integrada
de Comportamento
e Ameaças
Information Protection
DADOS IDENTIDADES
• Proteção integrada para Dados e Identidades
• Cloud Security Broker para Apps Móveis e em Nuvem
• Análise de comportamento dos usuários
• Gestão de Chaves e Criptografia em Nuvem
Users
Data
Apps
Cloud
Endpoints
Gateways
Data
Center
Cyber Security Services
Monitoramento, Resposta a Incidentes, Simulação, Inteligência conta Ameaças e Adversários
Copyright © 2015 Symantec Corporation
UNRIVALED SECURITY WITH UNIQUE VISIBLITY
175M
endpoints
57M attack sensors in 157
countries
182M web attacks blocked last
year
3.7T
rows of telemetry
30% of world’s enterprise email traffic
scanned/day
9
threat response centers
5
Symantec has Unique Visibility into Today’s Threat Landscape
Symantec Endpoint Protection 12.1
Copyright © 2014 Symantec Corporation
6
O365 tem a segurança necessária para os ataques de hoje?
7
https://www.cogmotive.com/blog/office-365-tips/vulnerability-in-office-365-allows-unauthorised-administrator-access
http://www.tripwire.com/state-of-security/latest-security-news/office-365-vulnerability-allowed-unauthorized-administrator-access/
Ataques em ambientes Cloud
8
Pontos de atenção para O365
Pare de ignorar a
necessidade de SSO e
autenticação com
duplo fator
Diminuir ao máximo
vazamento de
informação buscando
novas formas de
identificação.
APT – Ataques
direcionados estão
entre as formas mais
efetivas de ataque
usando as 3 camadas
“Email, network e
Endpoints”
Email é o #1 “Porta”de
ataques direcionados.
5 de 6 empresas
grandes (83%) foram
alvo de campanhas de
spear phishing no
ultimo ano.
9
Cloud Security for Office 365
Copyright © 2015 Symantec Corporation 10
User AuthenticationData
Protection
Threat
Protection
Admins and UsersSensitive DataEmail
Cloud Security for Office 365 – Symantec
Copyright © 2015 Symantec Corporation 11
SAM VIP
External Mail
Strong Authentication with Single Sign On
Threat Protection, Encryption, Data Protection
Admins and Users
Cloud Security for Office 365 – Symantec ( VIP + SAM)
Copyright © 2015 Symantec Corporation 12
SAM VIP
Strong Authentication with Single Sign On
Admins and Users
Symantec Identity Access Manager
14
A New Cloud Protection Platform
15
Identity-based Access
Control
Single Sign-on with Strong
Authentication
Public and private cloud
applications
User Directory
Symantec Identity Access Manager
16
User Management
• Embedded virtual user directory
• Self-Service registration, profile management, password reset
• Use credential at SSO Portal to access Web applications
Access Management
• Policies based on user’s identity and session context
• VIP, RSA and User certificate integration
• Rich access audit logs
Single Sign On with Strong Authentication
• SSO to any web application
• Federation: SAML and HTTP-Fed
• Plug-in for internal applications and consumer sites
• Extensive built-in app catalog
How SAM Works
17
SAM
Gateway
IDP, IWA, mPKI
Any User Store
LDAP RDBMS
Layered Protection
2F Authentication
(VIP, mPKI, RSA)
Admin Console
Compliance
Identity & Context based
access control
1
6
54
3
2
Flexible Deployments – SAM Architecture
18
Hosted Service On Premise Solution
Mobile User
Consumer Portal,
Business Partner
Extranet
Corporate Network
User
Enterprise
SAM Gateway
Mobile User
Consumer Portal,
Business Partner
Extranet
Corporate Network User
Enterprise
SAM Gateway
1
2
1
2
SAM ID Bridge
User Friendly – Login Anywhere, Anytime
19
Symantec VIP – Validation and Identity Protection
20
CLOUD SECURITY PUTS A GREATER EMPHASIS ON IDENTITY
CLOUD AND MOBILE HAVE CHANGED THE SECURITY PARADYME
Copyright © 2015 Symantec Corporation
21
• Corporate Data (Box)
• Employee Data (Workday)
• Customer Data (Salesforce)
IDENTITYFor cloud apps the first layer of
protection – sometimes the only
layer is the PASSWORD
A PASSWORD IS NOT AN EFFECTIVE WAY TO SECURE IDENTITY
• 77% of passwords are in a 1000 word dictionary
• Contextual risk: In network vs unmanaged device on public network
• Risky password tricks – like password reuse (26 password protected accounts and 5 passwords)
Passwords are
Vulnerable
• Password resets #1 support call - 30% of calls are password related
• $70 estimated average to reset password - Billions of dollars annually
• 62% of organizations see SaaS apps as a better way to support their mobile/remote workers =
more passwords and a growing cost
Passwords are Costly
• Credential entry is a huge challenge with mobile devices
• Failed logins and account lockouts are common occurrences
Passwords are Complex
Copyright © 2015 Symantec Corporation
22
Trusted Access and
Authentication only
from Symantec
CONTROL, CONVENIENCE, CONFIDENCE WITH VIP EVERYWHERE
FOR THE ENTERPRISE AND THE CLOUD
Copyright © 2015 Symantec Corporation 23
Enterprise
Gateway (on-
premise apps)
Symantec
Access
Manager
(web apps)
WE SIMPLIFY ACCESS TO CLOUD APPLICATIONS
IDENTITY ACCESS MANAGER, VIP PUSH, ONE PASSWORD
Copyright © 2015 Symantec Corporation
24
• First layer of security: Single sign-on
portal to all cloud-based apps
provides access anytime, anywhere
WITH ONE PASSWORD
 VIP Access Push adds another layer
of security – one tap, no 6-digit
code.
 Identity and context-based policies
authorize access to only the apps a
user needs to do his/her job.
DATA LOSS PREVENTION
Protegendo sua informação e reputação
26
Cloud Security + DLP for Office 365 Architecture
DLP Cloud Prevent
DLP Enforce
External Mail
Strong Authentication with Single Sign On
Threat Protection and Encryption
Protect Confidential Data
Inbound
Admins and Users
SAM VIP
Symantec Data Loss Prevention Customer Presentation
27
You don’t own the app
You don’t own the infrastructure
You can’s say “no”
Cloud
Your security slows me down
I expect an insanely great user
experience
Mobile
You don’t own the device
You can’t lock my device down
I will use the device and app I want
BYOD
Cloud & Mobile
Create new information protection risks
and challenges
Company Information
Intellectual Property
HR Records
Internal Auditing
M&A and Strategy
Customer Information
Credit Card Info
Medical Records
SSNs and Government IDs
Financials
Protects
Your most important, high-value data
Copyright © 2015 Symantec Corporation
29
Protect Data
In the cloud
Symantec DLP
FOR CLOUD STORAGE
Symantec DLP Cloud Service
FOR EMAIL
Symantec DLP Cloud Prevent
FOR MICROSOFT OFFICE 365
Single, convenient cloud-based
email protection solution
Stop malware, spam and
malicious links
Protect against data breaches
Combines industry-leading email
security and DLP
30
Protect cloud data
In Office 365 and Gmail
Cloud Security + Email Security.cloud + ATP for Office 365 Architecture
Copyright © 2015 Symantec Corporation 33
SAM VIP
External Mail
Strong Authentication with Single Sign On
Threat Protection, Encryption, Data Protection
SEPMATPSymantec GIN
Advanced Persistent Threat Detection
Admins and Users
Cohesive and Unified Protection
Cohesive and Unified Protection
Camadas Inteligentes de Segurança
Análise Avançada de Mensagens Skeptic
Detects anomalies
Intelligence gathered through
detailed code analysis
Attack intelligence processed
and shared in real-time to
protect all Symantec customers
Análise dos Links em Tempo Real
Intelligent real-time link
following
Analyzes content in real-
time
Stops emails with bad links
from being delivered
No detectable delivery
latency
Policy-Based Data Loss Prevention
GLBA HIPAA
PCI ITAR
Policy-Based Encryption
Console Unificada de Gerenciamento
Performance & SLA`s
Target
Actual Performance
Antispam
Effectiveness
Antispam
Accuracy
Antivirus
Accuracy
Email Service
Availability
Over 99%
No more than
.0003%
No more than
.0001%
100% 100% 100% 100% 100% 100% 100%
November
2014
December
2014
January
2015
February
2015
March
2015
April
2015
99.999974% 99.999982% 99.999981% 99.999980% 99.999975% 99.999979%
0.000010% 0.000008% 0.000009% 0.000011% 0.000015% 0.000015%
0.000002% 0.000002% 0.000002% 0.000002% 0.000001% 0.000001%
Office 365 Inbound Email Flow
Copyright © 2015 Symantec Corporation
42
Connection Manager
Spam Blocklist
Spoofed Sender Detection
Malware Scanning
Skeptic™ AS & AV
ATP Synapse™
Office 365
Office 365 Outbound Email Flow
Copyright © 2015 Symantec Corporation
43
Office 365 Exchange
Data Protection
Threat Protection
Encryption
Perguntas do Chat
Copyright © 2015 Symantec Corporation
44
SymantecMarketing_BR@symantec.com
Próximo Webinar
Copyright © 2014 Symantec Corporation
45
Eliminando os
Passwords
Para mais informação
@SymantecBR
https://www.facebook.com/SymantecBrasil
SymantecMarketing_BR@symantec.com
Thank you!
Copyright © 2015 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be
trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by
law. The information in this document is subject to change without notice.
Obrigado!

Mais conteúdo relacionado

Mais procurados

Prakhar Sood-Resume-CV
Prakhar Sood-Resume-CVPrakhar Sood-Resume-CV
Prakhar Sood-Resume-CVPrakhar Sood
 
Ransomware webinar may 2016 final version external
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version externalZscaler
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365SecureAuth
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldKatherine Cola
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will failIBM Security
 
Securing Your Cloud Applications
Securing Your Cloud ApplicationsSecuring Your Cloud Applications
Securing Your Cloud ApplicationsIBM Security
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityRohit Kapoor
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Sverige
 
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Ping Identity
 
Securing The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StorySecuring The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StoryCloudLock
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM Sverige
 
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?michaelbasoah
 
Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016patmisasi
 
Azure AD - Password attacks - logging and protections
Azure AD - Password attacks - logging and protectionsAzure AD - Password attacks - logging and protections
Azure AD - Password attacks - logging and protectionsAndres Canello
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A ServiceOlav Tvedt
 
Arx brochure - Intellect Design
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect DesignRajat Jain
 

Mais procurados (20)

Prakhar Sood-Resume-CV
Prakhar Sood-Resume-CVPrakhar Sood-Resume-CV
Prakhar Sood-Resume-CV
 
Ransomware webinar may 2016 final version external
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version external
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will fail
 
Securing Your Cloud Applications
Securing Your Cloud ApplicationsSecuring Your Cloud Applications
Securing Your Cloud Applications
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - Portfolio
 
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
 
Securing The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StorySecuring The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's Story
 
SOC-as-a-Service - comSpark 2019
SOC-as-a-Service - comSpark 2019SOC-as-a-Service - comSpark 2019
SOC-as-a-Service - comSpark 2019
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
 
Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016
 
Azure AD - Password attacks - logging and protections
Azure AD - Password attacks - logging and protectionsAzure AD - Password attacks - logging and protections
Azure AD - Password attacks - logging and protections
 
Cyber security infotech pvt ltd
Cyber security infotech pvt ltdCyber security infotech pvt ltd
Cyber security infotech pvt ltd
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Arx brochure - Intellect Design
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect Design
 

Destaque

Symantec Enterprise Vault.cloud for Microsoft Office 365 Better together [EN]
Symantec Enterprise Vault.cloud for Microsoft Office 365 Better together [EN]Symantec Enterprise Vault.cloud for Microsoft Office 365 Better together [EN]
Symantec Enterprise Vault.cloud for Microsoft Office 365 Better together [EN]getsix Group
 
FullDay Faeder on Friday
FullDay Faeder on Friday FullDay Faeder on Friday
FullDay Faeder on Friday Adam Faeder
 
Assessing the Functions of the Spanish Tile Innovation System
Assessing the Functions of the Spanish Tile Innovation SystemAssessing the Functions of the Spanish Tile Innovation System
Assessing the Functions of the Spanish Tile Innovation SystemDaniel Gabadón-Estevan
 
Listado de credenciales estarán para su entrega a contar del lunes 6 de enero
Listado de credenciales estarán para su entrega a contar del lunes 6 de eneroListado de credenciales estarán para su entrega a contar del lunes 6 de enero
Listado de credenciales estarán para su entrega a contar del lunes 6 de eneroEduardo Sanhueza
 
Social media impact on leisure travel: The case of the Russian market and th...
Social media impact on leisure travel:  The case of the Russian market and th...Social media impact on leisure travel:  The case of the Russian market and th...
Social media impact on leisure travel: The case of the Russian market and th...John Fotis
 
Skills Portfolio 2010
Skills Portfolio 2010Skills Portfolio 2010
Skills Portfolio 2010JacquiBIUK
 
Better together: Enterprise Vault.cloud and Microsoft Office 365
Better together: Enterprise Vault.cloud and Microsoft Office 365Better together: Enterprise Vault.cloud and Microsoft Office 365
Better together: Enterprise Vault.cloud and Microsoft Office 365proutley
 
Améliorer sa performance commerciale
Améliorer sa performance commercialeAméliorer sa performance commerciale
Améliorer sa performance commercialeLudovic Charbonnel
 

Destaque (11)

Symantec Enterprise Vault.cloud for Microsoft Office 365 Better together [EN]
Symantec Enterprise Vault.cloud for Microsoft Office 365 Better together [EN]Symantec Enterprise Vault.cloud for Microsoft Office 365 Better together [EN]
Symantec Enterprise Vault.cloud for Microsoft Office 365 Better together [EN]
 
FullDay Faeder on Friday
FullDay Faeder on Friday FullDay Faeder on Friday
FullDay Faeder on Friday
 
Assessing the Functions of the Spanish Tile Innovation System
Assessing the Functions of the Spanish Tile Innovation SystemAssessing the Functions of the Spanish Tile Innovation System
Assessing the Functions of the Spanish Tile Innovation System
 
Humanites pp
Humanites ppHumanites pp
Humanites pp
 
Ensayo tecnico a campo coadyuvantes
Ensayo tecnico a campo coadyuvantesEnsayo tecnico a campo coadyuvantes
Ensayo tecnico a campo coadyuvantes
 
Listado de credenciales estarán para su entrega a contar del lunes 6 de enero
Listado de credenciales estarán para su entrega a contar del lunes 6 de eneroListado de credenciales estarán para su entrega a contar del lunes 6 de enero
Listado de credenciales estarán para su entrega a contar del lunes 6 de enero
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
Social media impact on leisure travel: The case of the Russian market and th...
Social media impact on leisure travel:  The case of the Russian market and th...Social media impact on leisure travel:  The case of the Russian market and th...
Social media impact on leisure travel: The case of the Russian market and th...
 
Skills Portfolio 2010
Skills Portfolio 2010Skills Portfolio 2010
Skills Portfolio 2010
 
Better together: Enterprise Vault.cloud and Microsoft Office 365
Better together: Enterprise Vault.cloud and Microsoft Office 365Better together: Enterprise Vault.cloud and Microsoft Office 365
Better together: Enterprise Vault.cloud and Microsoft Office 365
 
Améliorer sa performance commerciale
Améliorer sa performance commercialeAméliorer sa performance commerciale
Améliorer sa performance commerciale
 

Semelhante a Be Aware Webinar – Office 365 Seguro? Sym, Cloud!

Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DaySymantec
 
Issa symc la 5min mr
Issa symc la 5min mrIssa symc la 5min mr
Issa symc la 5min mrISSA LA
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONInfosec Train
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itPeter De Tender
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier AGC Networks Ltd
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughImperva
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingPing Identity
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 sucesuminas
 
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...eFolder
 
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITMarketingArrowECS_CZ
 
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.Cristian Garcia G.
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceVignesh Ganesan I Microsoft MVP
 

Semelhante a Be Aware Webinar – Office 365 Seguro? Sym, Cloud! (20)

Community IT - Single Sign On
Community IT - Single Sign OnCommunity IT - Single Sign On
Community IT - Single Sign On
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO Day
 
Issa symc la 5min mr
Issa symc la 5min mrIssa symc la 5min mr
Issa symc la 5min mr
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
 
Atelier Technique - Symantec - #ACSS2019
Atelier Technique - Symantec - #ACSS2019Atelier Technique - Symantec - #ACSS2019
Atelier Technique - Symantec - #ACSS2019
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
 
Uid101 intro preso
Uid101 intro presoUid101 intro preso
Uid101 intro preso
 
Webinar: Microsoft 365 - Your Gateway to Data Loss Prevention
Webinar: Microsoft 365 - Your Gateway to Data Loss PreventionWebinar: Microsoft 365 - Your Gateway to Data Loss Prevention
Webinar: Microsoft 365 - Your Gateway to Data Loss Prevention
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
Onegini Brochure
Onegini BrochureOnegini Brochure
Onegini Brochure
 
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
eFolder Partner Chat Webinar – "How We Minimized Risk": An eFolder and OpenDN...
 
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
 
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and Compliance
 

Mais de Symantec Brasil

Symantec -Executive Report - edicao 1
Symantec -Executive Report - edicao 1Symantec -Executive Report - edicao 1
Symantec -Executive Report - edicao 1Symantec Brasil
 
A Symantec Fornece Solução Automatizada para Proteção contra o Comprometiment...
A Symantec Fornece Solução Automatizada para Proteção contra o Comprometiment...A Symantec Fornece Solução Automatizada para Proteção contra o Comprometiment...
A Symantec Fornece Solução Automatizada para Proteção contra o Comprometiment...Symantec Brasil
 
Por dentro da la transformación - Entrevista Sheila Jordan (BR)
Por dentro da la transformación - Entrevista Sheila Jordan (BR)Por dentro da la transformación - Entrevista Sheila Jordan (BR)
Por dentro da la transformación - Entrevista Sheila Jordan (BR)Symantec Brasil
 
Por dentro da transformação - Entrevista Sheila Jordan (BR)
Por dentro da transformação - Entrevista Sheila Jordan (BR)Por dentro da transformação - Entrevista Sheila Jordan (BR)
Por dentro da transformação - Entrevista Sheila Jordan (BR)Symantec Brasil
 
Be Aware - Eu sou o próximo alvo?
Be Aware - Eu sou o próximo alvo?Be Aware - Eu sou o próximo alvo?
Be Aware - Eu sou o próximo alvo?Symantec Brasil
 
Como garantir um maior nívelde proteção de dados
Como garantir um maior nívelde proteção de dadosComo garantir um maior nívelde proteção de dados
Como garantir um maior nívelde proteção de dadosSymantec Brasil
 
Segurança da Informação na era do IoT: conectividade, e ameaças, por todos os...
Segurança da Informação na era do IoT: conectividade, e ameaças, por todos os...Segurança da Informação na era do IoT: conectividade, e ameaças, por todos os...
Segurança da Informação na era do IoT: conectividade, e ameaças, por todos os...Symantec Brasil
 
Be Aware Webinar Symantec - O que há de novo? Data Loss Prevention 14.5
Be Aware Webinar Symantec - O que há de novo? Data Loss Prevention 14.5Be Aware Webinar Symantec - O que há de novo? Data Loss Prevention 14.5
Be Aware Webinar Symantec - O que há de novo? Data Loss Prevention 14.5Symantec Brasil
 
Be Aware Webinar Symantec - Spear-phishing: Seus usuários estão preparados pa...
Be Aware Webinar Symantec - Spear-phishing: Seus usuários estão preparados pa...Be Aware Webinar Symantec - Spear-phishing: Seus usuários estão preparados pa...
Be Aware Webinar Symantec - Spear-phishing: Seus usuários estão preparados pa...Symantec Brasil
 
Be Aware Webinar Symantec - Reduza as vulnerabilidades do seu ambiente de TI
Be Aware Webinar Symantec - Reduza as vulnerabilidades do seu ambiente de TIBe Aware Webinar Symantec - Reduza as vulnerabilidades do seu ambiente de TI
Be Aware Webinar Symantec - Reduza as vulnerabilidades do seu ambiente de TISymantec Brasil
 
Be Aware Webinar Symantec - Relatório de Ameaças à Segurança na Internet de 2...
Be Aware Webinar Symantec - Relatório de Ameaças à Segurança na Internet de 2...Be Aware Webinar Symantec - Relatório de Ameaças à Segurança na Internet de 2...
Be Aware Webinar Symantec - Relatório de Ameaças à Segurança na Internet de 2...Symantec Brasil
 
Be Aware Webinar - Criptografia, uma forma simples de proteger seus dados pes...
Be Aware Webinar - Criptografia, uma forma simples de proteger seus dados pes...Be Aware Webinar - Criptografia, uma forma simples de proteger seus dados pes...
Be Aware Webinar - Criptografia, uma forma simples de proteger seus dados pes...Symantec Brasil
 
Be Aware Webinar Symantec - O que devo considerar com o suporte de pós vendas...
Be Aware Webinar Symantec - O que devo considerar com o suporte de pós vendas...Be Aware Webinar Symantec - O que devo considerar com o suporte de pós vendas...
Be Aware Webinar Symantec - O que devo considerar com o suporte de pós vendas...Symantec Brasil
 
Be Aware Webinar - Segurança de email: Ameaças, SPAM e Sequestros, uma máquin...
Be Aware Webinar - Segurança de email: Ameaças, SPAM e Sequestros, uma máquin...Be Aware Webinar - Segurança de email: Ameaças, SPAM e Sequestros, uma máquin...
Be Aware Webinar - Segurança de email: Ameaças, SPAM e Sequestros, uma máquin...Symantec Brasil
 
Be Aware Webinar - Malwares Multiplataformas
Be Aware Webinar - Malwares MultiplataformasBe Aware Webinar - Malwares Multiplataformas
Be Aware Webinar - Malwares MultiplataformasSymantec Brasil
 
A Abordagem Symantec para Derrotar Ameaças Avançadas
A Abordagem Symantec para Derrotar Ameaças AvançadasA Abordagem Symantec para Derrotar Ameaças Avançadas
A Abordagem Symantec para Derrotar Ameaças AvançadasSymantec Brasil
 
Symantec Advanced Threat Protection: Symantec Cynic
Symantec Advanced Threat Protection: Symantec CynicSymantec Advanced Threat Protection: Symantec Cynic
Symantec Advanced Threat Protection: Symantec CynicSymantec Brasil
 
Ameaças Persistentes Avançadas: Passando da Detecção para a Prevenção e Resposta
Ameaças Persistentes Avançadas: Passando da Detecção para a Prevenção e RespostaAmeaças Persistentes Avançadas: Passando da Detecção para a Prevenção e Resposta
Ameaças Persistentes Avançadas: Passando da Detecção para a Prevenção e RespostaSymantec Brasil
 

Mais de Symantec Brasil (20)

Symantec -Executive Report - edicao 1
Symantec -Executive Report - edicao 1Symantec -Executive Report - edicao 1
Symantec -Executive Report - edicao 1
 
A Symantec Fornece Solução Automatizada para Proteção contra o Comprometiment...
A Symantec Fornece Solução Automatizada para Proteção contra o Comprometiment...A Symantec Fornece Solução Automatizada para Proteção contra o Comprometiment...
A Symantec Fornece Solução Automatizada para Proteção contra o Comprometiment...
 
Por dentro da la transformación - Entrevista Sheila Jordan (BR)
Por dentro da la transformación - Entrevista Sheila Jordan (BR)Por dentro da la transformación - Entrevista Sheila Jordan (BR)
Por dentro da la transformación - Entrevista Sheila Jordan (BR)
 
Por dentro da transformação - Entrevista Sheila Jordan (BR)
Por dentro da transformação - Entrevista Sheila Jordan (BR)Por dentro da transformação - Entrevista Sheila Jordan (BR)
Por dentro da transformação - Entrevista Sheila Jordan (BR)
 
Be Aware - Eu sou o próximo alvo?
Be Aware - Eu sou o próximo alvo?Be Aware - Eu sou o próximo alvo?
Be Aware - Eu sou o próximo alvo?
 
Ameaças de Junho 2016
Ameaças de Junho 2016 Ameaças de Junho 2016
Ameaças de Junho 2016
 
Como garantir um maior nívelde proteção de dados
Como garantir um maior nívelde proteção de dadosComo garantir um maior nívelde proteção de dados
Como garantir um maior nívelde proteção de dados
 
Customer Super Care
Customer Super CareCustomer Super Care
Customer Super Care
 
Segurança da Informação na era do IoT: conectividade, e ameaças, por todos os...
Segurança da Informação na era do IoT: conectividade, e ameaças, por todos os...Segurança da Informação na era do IoT: conectividade, e ameaças, por todos os...
Segurança da Informação na era do IoT: conectividade, e ameaças, por todos os...
 
Be Aware Webinar Symantec - O que há de novo? Data Loss Prevention 14.5
Be Aware Webinar Symantec - O que há de novo? Data Loss Prevention 14.5Be Aware Webinar Symantec - O que há de novo? Data Loss Prevention 14.5
Be Aware Webinar Symantec - O que há de novo? Data Loss Prevention 14.5
 
Be Aware Webinar Symantec - Spear-phishing: Seus usuários estão preparados pa...
Be Aware Webinar Symantec - Spear-phishing: Seus usuários estão preparados pa...Be Aware Webinar Symantec - Spear-phishing: Seus usuários estão preparados pa...
Be Aware Webinar Symantec - Spear-phishing: Seus usuários estão preparados pa...
 
Be Aware Webinar Symantec - Reduza as vulnerabilidades do seu ambiente de TI
Be Aware Webinar Symantec - Reduza as vulnerabilidades do seu ambiente de TIBe Aware Webinar Symantec - Reduza as vulnerabilidades do seu ambiente de TI
Be Aware Webinar Symantec - Reduza as vulnerabilidades do seu ambiente de TI
 
Be Aware Webinar Symantec - Relatório de Ameaças à Segurança na Internet de 2...
Be Aware Webinar Symantec - Relatório de Ameaças à Segurança na Internet de 2...Be Aware Webinar Symantec - Relatório de Ameaças à Segurança na Internet de 2...
Be Aware Webinar Symantec - Relatório de Ameaças à Segurança na Internet de 2...
 
Be Aware Webinar - Criptografia, uma forma simples de proteger seus dados pes...
Be Aware Webinar - Criptografia, uma forma simples de proteger seus dados pes...Be Aware Webinar - Criptografia, uma forma simples de proteger seus dados pes...
Be Aware Webinar - Criptografia, uma forma simples de proteger seus dados pes...
 
Be Aware Webinar Symantec - O que devo considerar com o suporte de pós vendas...
Be Aware Webinar Symantec - O que devo considerar com o suporte de pós vendas...Be Aware Webinar Symantec - O que devo considerar com o suporte de pós vendas...
Be Aware Webinar Symantec - O que devo considerar com o suporte de pós vendas...
 
Be Aware Webinar - Segurança de email: Ameaças, SPAM e Sequestros, uma máquin...
Be Aware Webinar - Segurança de email: Ameaças, SPAM e Sequestros, uma máquin...Be Aware Webinar - Segurança de email: Ameaças, SPAM e Sequestros, uma máquin...
Be Aware Webinar - Segurança de email: Ameaças, SPAM e Sequestros, uma máquin...
 
Be Aware Webinar - Malwares Multiplataformas
Be Aware Webinar - Malwares MultiplataformasBe Aware Webinar - Malwares Multiplataformas
Be Aware Webinar - Malwares Multiplataformas
 
A Abordagem Symantec para Derrotar Ameaças Avançadas
A Abordagem Symantec para Derrotar Ameaças AvançadasA Abordagem Symantec para Derrotar Ameaças Avançadas
A Abordagem Symantec para Derrotar Ameaças Avançadas
 
Symantec Advanced Threat Protection: Symantec Cynic
Symantec Advanced Threat Protection: Symantec CynicSymantec Advanced Threat Protection: Symantec Cynic
Symantec Advanced Threat Protection: Symantec Cynic
 
Ameaças Persistentes Avançadas: Passando da Detecção para a Prevenção e Resposta
Ameaças Persistentes Avançadas: Passando da Detecção para a Prevenção e RespostaAmeaças Persistentes Avançadas: Passando da Detecção para a Prevenção e Resposta
Ameaças Persistentes Avançadas: Passando da Detecção para a Prevenção e Resposta
 

Último

%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...masabamasaba
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2
 
tonesoftg
tonesoftgtonesoftg
tonesoftglanshi9
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareJim McKeeth
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park masabamasaba
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyviewmasabamasaba
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...masabamasaba
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024VictoriaMetrics
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...masabamasaba
 

Último (20)

%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 

Be Aware Webinar – Office 365 Seguro? Sym, Cloud!

  • 1. Office 365 Seguro? Sym, Cloud! Luis Souza Lucas Romaris André de Oliveira Channel SE Systems Engineer Advanced Support
  • 2. Acerca de Nuestros Presentadores Copyright © 2015 Symantec Corporation LUIS SOUZA Engenheiro de Pré-vendas, trabalha há 8 anos na Symantec e já atuou em clientes de Large Enterprise do segmento Financeiro. Hoje é responsável pela área técnica da área de Canais focado em Segurança da Informação. ANDRÉ DE OLIVEIRA Profissional com mais de 15 anos de experiência em Tecnologia da Informação e há 8 anos trabalhando com Segurança para Endpoint e Messaging na Symantec. Formado no Mackenzie em Ciências da Computação e Pós Graduado no IPT/USP em Gestão de Projetos. Atualmente trabalha com foco em suporte avançado a clientes BCS. LUCAS ROMARIS Formado em análise e desenvolvimento de sistemas, trabalha há 6 anos na Symantec, atuando nas áreas de pré-vendas e consultoria. Atualmente exerce a função de engenheiro de sistemas com foco em Compliance, Análise de Vulnerabilidades, e Prevenção contra perda de dados confidenciais.
  • 3. Agenda Copyright © 2014 Symantec Corporation 3 1 Estratégia de Segurança da Symantec 2 VIP & SAM for Office 365 3 DLP for Office 365 4 Email Security.cloud 5 Q&A
  • 4. Segurança Corporativa| Estratégia de Produtos e Serviços 4 Threat Protection ENDPOINTS DATA CENTER GATEWAYS • Advanced Threat Protection através de todos os pontos de controle • Forense e Remediação embutida em cada ponto de controle • Proteção integrada para Workloads: On-Premise, Virtual e Cloud • Gestão baseada em nuvem para Endpoints, Datacenter e Gateways Unified Security Analytics Platform Coleta de Logs e Telemetria Gestão Unificadas de Incidentes e Customer Hub Integrações com Terceitos e Inteligência Benchmarking Regional e por Segmento Análise Integrada de Comportamento e Ameaças Information Protection DADOS IDENTIDADES • Proteção integrada para Dados e Identidades • Cloud Security Broker para Apps Móveis e em Nuvem • Análise de comportamento dos usuários • Gestão de Chaves e Criptografia em Nuvem Users Data Apps Cloud Endpoints Gateways Data Center Cyber Security Services Monitoramento, Resposta a Incidentes, Simulação, Inteligência conta Ameaças e Adversários Copyright © 2015 Symantec Corporation
  • 5. UNRIVALED SECURITY WITH UNIQUE VISIBLITY 175M endpoints 57M attack sensors in 157 countries 182M web attacks blocked last year 3.7T rows of telemetry 30% of world’s enterprise email traffic scanned/day 9 threat response centers 5 Symantec has Unique Visibility into Today’s Threat Landscape Symantec Endpoint Protection 12.1
  • 6. Copyright © 2014 Symantec Corporation 6
  • 7. O365 tem a segurança necessária para os ataques de hoje? 7 https://www.cogmotive.com/blog/office-365-tips/vulnerability-in-office-365-allows-unauthorised-administrator-access http://www.tripwire.com/state-of-security/latest-security-news/office-365-vulnerability-allowed-unauthorized-administrator-access/
  • 9. Pontos de atenção para O365 Pare de ignorar a necessidade de SSO e autenticação com duplo fator Diminuir ao máximo vazamento de informação buscando novas formas de identificação. APT – Ataques direcionados estão entre as formas mais efetivas de ataque usando as 3 camadas “Email, network e Endpoints” Email é o #1 “Porta”de ataques direcionados. 5 de 6 empresas grandes (83%) foram alvo de campanhas de spear phishing no ultimo ano. 9
  • 10. Cloud Security for Office 365 Copyright © 2015 Symantec Corporation 10 User AuthenticationData Protection Threat Protection Admins and UsersSensitive DataEmail
  • 11. Cloud Security for Office 365 – Symantec Copyright © 2015 Symantec Corporation 11 SAM VIP External Mail Strong Authentication with Single Sign On Threat Protection, Encryption, Data Protection Admins and Users
  • 12. Cloud Security for Office 365 – Symantec ( VIP + SAM) Copyright © 2015 Symantec Corporation 12 SAM VIP Strong Authentication with Single Sign On Admins and Users
  • 14. A New Cloud Protection Platform 15 Identity-based Access Control Single Sign-on with Strong Authentication Public and private cloud applications User Directory
  • 15. Symantec Identity Access Manager 16 User Management • Embedded virtual user directory • Self-Service registration, profile management, password reset • Use credential at SSO Portal to access Web applications Access Management • Policies based on user’s identity and session context • VIP, RSA and User certificate integration • Rich access audit logs Single Sign On with Strong Authentication • SSO to any web application • Federation: SAML and HTTP-Fed • Plug-in for internal applications and consumer sites • Extensive built-in app catalog
  • 16. How SAM Works 17 SAM Gateway IDP, IWA, mPKI Any User Store LDAP RDBMS Layered Protection 2F Authentication (VIP, mPKI, RSA) Admin Console Compliance Identity & Context based access control 1 6 54 3 2
  • 17. Flexible Deployments – SAM Architecture 18 Hosted Service On Premise Solution Mobile User Consumer Portal, Business Partner Extranet Corporate Network User Enterprise SAM Gateway Mobile User Consumer Portal, Business Partner Extranet Corporate Network User Enterprise SAM Gateway 1 2 1 2 SAM ID Bridge
  • 18. User Friendly – Login Anywhere, Anytime 19
  • 19. Symantec VIP – Validation and Identity Protection 20
  • 20. CLOUD SECURITY PUTS A GREATER EMPHASIS ON IDENTITY CLOUD AND MOBILE HAVE CHANGED THE SECURITY PARADYME Copyright © 2015 Symantec Corporation 21 • Corporate Data (Box) • Employee Data (Workday) • Customer Data (Salesforce) IDENTITYFor cloud apps the first layer of protection – sometimes the only layer is the PASSWORD
  • 21. A PASSWORD IS NOT AN EFFECTIVE WAY TO SECURE IDENTITY • 77% of passwords are in a 1000 word dictionary • Contextual risk: In network vs unmanaged device on public network • Risky password tricks – like password reuse (26 password protected accounts and 5 passwords) Passwords are Vulnerable • Password resets #1 support call - 30% of calls are password related • $70 estimated average to reset password - Billions of dollars annually • 62% of organizations see SaaS apps as a better way to support their mobile/remote workers = more passwords and a growing cost Passwords are Costly • Credential entry is a huge challenge with mobile devices • Failed logins and account lockouts are common occurrences Passwords are Complex Copyright © 2015 Symantec Corporation 22
  • 22. Trusted Access and Authentication only from Symantec CONTROL, CONVENIENCE, CONFIDENCE WITH VIP EVERYWHERE FOR THE ENTERPRISE AND THE CLOUD Copyright © 2015 Symantec Corporation 23 Enterprise Gateway (on- premise apps) Symantec Access Manager (web apps)
  • 23. WE SIMPLIFY ACCESS TO CLOUD APPLICATIONS IDENTITY ACCESS MANAGER, VIP PUSH, ONE PASSWORD Copyright © 2015 Symantec Corporation 24 • First layer of security: Single sign-on portal to all cloud-based apps provides access anytime, anywhere WITH ONE PASSWORD  VIP Access Push adds another layer of security – one tap, no 6-digit code.  Identity and context-based policies authorize access to only the apps a user needs to do his/her job.
  • 24. DATA LOSS PREVENTION Protegendo sua informação e reputação
  • 25. 26 Cloud Security + DLP for Office 365 Architecture DLP Cloud Prevent DLP Enforce External Mail Strong Authentication with Single Sign On Threat Protection and Encryption Protect Confidential Data Inbound Admins and Users SAM VIP
  • 26. Symantec Data Loss Prevention Customer Presentation 27 You don’t own the app You don’t own the infrastructure You can’s say “no” Cloud Your security slows me down I expect an insanely great user experience Mobile You don’t own the device You can’t lock my device down I will use the device and app I want BYOD Cloud & Mobile Create new information protection risks and challenges
  • 27. Company Information Intellectual Property HR Records Internal Auditing M&A and Strategy Customer Information Credit Card Info Medical Records SSNs and Government IDs Financials Protects Your most important, high-value data
  • 28. Copyright © 2015 Symantec Corporation 29 Protect Data In the cloud Symantec DLP FOR CLOUD STORAGE Symantec DLP Cloud Service FOR EMAIL Symantec DLP Cloud Prevent FOR MICROSOFT OFFICE 365
  • 29. Single, convenient cloud-based email protection solution Stop malware, spam and malicious links Protect against data breaches Combines industry-leading email security and DLP 30 Protect cloud data In Office 365 and Gmail
  • 30.
  • 31.
  • 32. Cloud Security + Email Security.cloud + ATP for Office 365 Architecture Copyright © 2015 Symantec Corporation 33 SAM VIP External Mail Strong Authentication with Single Sign On Threat Protection, Encryption, Data Protection SEPMATPSymantec GIN Advanced Persistent Threat Detection Admins and Users
  • 33. Cohesive and Unified Protection Cohesive and Unified Protection
  • 35. Análise Avançada de Mensagens Skeptic Detects anomalies Intelligence gathered through detailed code analysis Attack intelligence processed and shared in real-time to protect all Symantec customers
  • 36. Análise dos Links em Tempo Real Intelligent real-time link following Analyzes content in real- time Stops emails with bad links from being delivered No detectable delivery latency
  • 37. Policy-Based Data Loss Prevention GLBA HIPAA PCI ITAR
  • 39. Console Unificada de Gerenciamento
  • 40. Performance & SLA`s Target Actual Performance Antispam Effectiveness Antispam Accuracy Antivirus Accuracy Email Service Availability Over 99% No more than .0003% No more than .0001% 100% 100% 100% 100% 100% 100% 100% November 2014 December 2014 January 2015 February 2015 March 2015 April 2015 99.999974% 99.999982% 99.999981% 99.999980% 99.999975% 99.999979% 0.000010% 0.000008% 0.000009% 0.000011% 0.000015% 0.000015% 0.000002% 0.000002% 0.000002% 0.000002% 0.000001% 0.000001%
  • 41. Office 365 Inbound Email Flow Copyright © 2015 Symantec Corporation 42 Connection Manager Spam Blocklist Spoofed Sender Detection Malware Scanning Skeptic™ AS & AV ATP Synapse™ Office 365
  • 42. Office 365 Outbound Email Flow Copyright © 2015 Symantec Corporation 43 Office 365 Exchange Data Protection Threat Protection Encryption
  • 43. Perguntas do Chat Copyright © 2015 Symantec Corporation 44 SymantecMarketing_BR@symantec.com
  • 44. Próximo Webinar Copyright © 2014 Symantec Corporation 45 Eliminando os Passwords Para mais informação @SymantecBR https://www.facebook.com/SymantecBrasil SymantecMarketing_BR@symantec.com
  • 45. Thank you! Copyright © 2015 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Obrigado!