SlideShare uma empresa Scribd logo
1 de 16
Building Trust – Best Practices for Protecting Data in the Cloud 1
Building Trust;
Best Practices for Protecting Data in the
Cloud
Siân John
EMEA Chief Strategist Symantec
Always On and Everywhere
Digital World Enhances or Replaces Much of the Physical World
2Building Trust – Best Practices for Protecting Data in the Cloud
Applications and Data Are Moving to The Cloud
Building Trust – Best Practices for Protecting Data in the Cloud 3
Information is
exploding
4
2020
40ZB
2015
7.9ZB
2010
1.2ZB
Building Trust – Best Practices for Protecting Data in the Cloud
The Drive for Data Privacy
Building Trust – Best Practices for Protecting Data in the Cloud 5
Lack of Business
Ownership
Data Growth
Emerging
Technology
Regulations
Lack of Visibility
Evolving Threat
landscape
Press Headlines
Reputation
Business
Opportunity
Customer Trust
Drivers Inhibitors
6
Privacy most Important when Customers
choose products or services
Symantec State of Privacy Report 2015
https://www.symantec.com/content/en/us/about/presskits/b-state-of-privacy-
report-2015.pdf.
Delivering great customer service
Keeping your data safe and secure
Delivering quality products / services
Treating their employees and
suppliers fairly
Being environmentally friendly
82%
86%
69%
56%
88%
Building Trust – Best Practices for Protecting Data in the Cloud
Not all Organisations have the same level of
Consumer Trust for Securing Data
7
https://www.symantec.com/content/en/us/about/presskits/b-state-of-privacy-report-2015.pdf.
69%
66%
45%
22% 20%
10%
Hospitals / medical services Banks Government Technology companies (i.e.
Google, Microsoft)
Retailers (Including online
shops)
Social media sites (i.e.
Facebook, Twitter)
Organisations whose business
models are based on data (tech
companies and social media
companies) appear less trusted
to keep customer data
completely secure
Data Trust
Chain
Building Trust – Best Practices for Protecting Data in the Cloud
SSL
Mobile/BYOD/IoT Endpoints
The Cloud Generation Security Challenge
A Shifting Expanse of Blind Spots
8
Headquarters
Data Center
Regional
Office
Traditional
Security Stack
Expanding Use of Encryption Creates
Blind Spots
Traditional Security Stack Has Lost
Significant Visibility As Resources Go
Direct-to-Net
Cloud Applications Causing Organizations
to Lose Control Over Their Resources
Rapidly Growing Landscape of
Unprotected Devices
Users
Cloud Applications
And Services
Building Trust – Best Practices for Protecting Data in the Cloud
Complications of
Cloud Adoption
• Who Owns the
Comprehensive
Service Level
Agreements?
• Single Pane of Glass?
• Redundancy & High-
Availability?
• Vendor Compatibility?
Cloud
Web Gateway
Provider
Cloud
DLP Provider
Cloud
Data Encryption
Provider
Cloud
Access Control
Provider
Cloud Sandbox
Provider
Cloud Breach
Analysis
Cloud Forensic /
Recording
Cloud Email
Scanning
Cloud DDoS
UBA
Innovation for the Cloud Generation:
Industry Has Created Cloud Security Chaos
Building Trust – Best Practices for Protecting Data in the Cloud 9
Gaining Control of the Cloud
Building Trust – Best Practices for Protecting Data in the Cloud 10
Visibility
Authentication
Data Protection
Secure Environment
Adaptive Security
Automation
Ease of Use
…know what is running / stored where…
…ensure only right users can access the right
apps/data…
…safeguard my data everywhere and at all
times…
…ensure the environment is protected from
malware and advanced threats…
…security stays in-sync and scales with my
constantly changing Cloud environment…
…be able to automatically apply the right
security with minimal human intervention…
…manage my complex hybrid world from single
control point…
Innovation for the Cloud Generation:
Securing A New World of Devices, Networks and Applications
11
Protection from
Advanced
Threats
Securing
the Mobile
Workforce
Ensuring
Safe
Cloud Usage
Information
Protection
Advanced
Threat Protection
Email WebEndpoint
Building Trust – Best Practices for Protecting Data in the Cloud
Mobile/BYOD/IoT Endpoints
Enable Enterprises to Securely Embrace the Cloud
Ensuring Safe Cloud Usage
12
Headquarters
Data Center
Regional
Office
Users
Building Trust – Best Practices for Protecting Data in the Cloud
Capability
One Symantec
Solution
Cloud & App-based Web Traffic Cleansing Cloud Gateway
Inspect User Communication for
Advanced Malware
Cloud-Based Sandbox
Visibility into Cloud Application Usage by
Users
Application Discovery
User-Centric DLP Data Loss Prevention
User-Based Cloud Application Authorization Cloud Broker
Audit Acceptable-Use with Real-Time
Analytics
Cloud Analytics
182M
web attacks
blocked last year
Discovered
430 million
new unique pieces
of malware last year
12,000+
Cloud applications
discovered and
protected
Innovation for the Cloud Generation:
Protecting Against Advanced Threats – Global Intelligence Network
175M
Consumer and Enterprise
endpoints protected
9global threat
response centers with
3000 Researchers and
Engineers
2 Billion
emails scanned per day
1 Billion
previously unseen web
requests scanned daily
Cloud Global Intelligence
Sourced From:
100M
social engineering
scams blocked last
year
1B
malicious emails
stopped last year
Building Trust – Best Practices for Protecting Data in the Cloud 13
A Portfolio to Deliver Cloud Generation Security
Building Trust – Best Practices for Protecting Data in the Cloud 14
Bluecoat and Symantec Defining the Future of Cyber Security
Headquarters
Data Center
Regional
Office
Roaming
Users
Next Generation
Endpoints (IoT/Mobile)
Web Protection
Encrypted Traffic
Tokenized Data storage
Advance Malware Analysis
Next-Generation SOC
Data Loss Prevention
Managed Security Service
Next Gen Endpoint
Mail Protection
Security Stack
Cloud Adoption and Protection
Maximise Benefit from Cloud Usage
• Build and Maintain Trust
• Choose the Right Cloud(s)
• Secure Digital Transformation
Minimise Cloud Risk
• Understand and Control your Cloud Usage
• Know your Data
• Harmonise Security Policies
• Control Migration to the Cloud
Ensure Compliance
• Protect Data in and for the Cloud
• Audit Cloud Activity
Building Trust – Best Practices for Protecting Data in the Cloud 15
Value of Adopting Security Best Practice
Thank you!
Copyright © 2016 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Building Trust – Best Practices for Protecting Data in the Cloud 16
Presenter’s Name
Presenter’s Email
Presenter’s Phone

Mais conteúdo relacionado

Destaque

Cyber Security in Transportation
Cyber Security in TransportationCyber Security in Transportation
Cyber Security in TransportationOren Elimelech
 
[HUN] Védtelen böngészők - Ethical Hacking
[HUN] Védtelen böngészők - Ethical Hacking [HUN] Védtelen böngészők - Ethical Hacking
[HUN] Védtelen böngészők - Ethical Hacking Zoltan Balazs
 
Symantec Mobility Suite -Workforce apps
 Symantec Mobility Suite -Workforce apps Symantec Mobility Suite -Workforce apps
Symantec Mobility Suite -Workforce appsSymantec
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DaySymantec
 
A Vision of Cybercrime in Italy
A Vision of Cybercrime in ItalyA Vision of Cybercrime in Italy
A Vision of Cybercrime in ItalyMatteo Cavallini
 
Introduction to Agile Software Development - Eric Wu - MBAX6360 New Product D...
Introduction to Agile Software Development - Eric Wu - MBAX6360 New Product D...Introduction to Agile Software Development - Eric Wu - MBAX6360 New Product D...
Introduction to Agile Software Development - Eric Wu - MBAX6360 New Product D...Eric Wu
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportSymantec
 
How to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within BoxHow to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within BoxElastica Inc.
 
Reasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy WorldReasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy WorldElastica Inc.
 
Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google AppsElastica Inc.
 
How biotechnology could improve life
How biotechnology could improve lifeHow biotechnology could improve life
How biotechnology could improve lifeCokhy Fasha
 

Destaque (14)

Cyber Security in Transportation
Cyber Security in TransportationCyber Security in Transportation
Cyber Security in Transportation
 
[HUN] Védtelen böngészők - Ethical Hacking
[HUN] Védtelen böngészők - Ethical Hacking [HUN] Védtelen böngészők - Ethical Hacking
[HUN] Védtelen böngészők - Ethical Hacking
 
Symantec Mobility Suite -Workforce apps
 Symantec Mobility Suite -Workforce apps Symantec Mobility Suite -Workforce apps
Symantec Mobility Suite -Workforce apps
 
Cyber Security in Civil Aviation
Cyber Security in Civil AviationCyber Security in Civil Aviation
Cyber Security in Civil Aviation
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO Day
 
A Vision of Cybercrime in Italy
A Vision of Cybercrime in ItalyA Vision of Cybercrime in Italy
A Vision of Cybercrime in Italy
 
Introduction to Agile Software Development - Eric Wu - MBAX6360 New Product D...
Introduction to Agile Software Development - Eric Wu - MBAX6360 New Product D...Introduction to Agile Software Development - Eric Wu - MBAX6360 New Product D...
Introduction to Agile Software Development - Eric Wu - MBAX6360 New Product D...
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
 
How to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within BoxHow to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within Box
 
Reasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy WorldReasoning About Enterprise Application Security in a Cloudy World
Reasoning About Enterprise Application Security in a Cloudy World
 
Train Employees to Avoid Cybercrime
Train Employees to Avoid CybercrimeTrain Employees to Avoid Cybercrime
Train Employees to Avoid Cybercrime
 
Shadow Data Exposed
Shadow Data ExposedShadow Data Exposed
Shadow Data Exposed
 
Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google Apps
 
How biotechnology could improve life
How biotechnology could improve lifeHow biotechnology could improve life
How biotechnology could improve life
 

Mais de Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

Mais de Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Último

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Último (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Building Trust; best practics for protecting data in the cloud

  • 1. Building Trust – Best Practices for Protecting Data in the Cloud 1 Building Trust; Best Practices for Protecting Data in the Cloud Siân John EMEA Chief Strategist Symantec
  • 2. Always On and Everywhere Digital World Enhances or Replaces Much of the Physical World 2Building Trust – Best Practices for Protecting Data in the Cloud
  • 3. Applications and Data Are Moving to The Cloud Building Trust – Best Practices for Protecting Data in the Cloud 3
  • 4. Information is exploding 4 2020 40ZB 2015 7.9ZB 2010 1.2ZB Building Trust – Best Practices for Protecting Data in the Cloud
  • 5. The Drive for Data Privacy Building Trust – Best Practices for Protecting Data in the Cloud 5 Lack of Business Ownership Data Growth Emerging Technology Regulations Lack of Visibility Evolving Threat landscape Press Headlines Reputation Business Opportunity Customer Trust Drivers Inhibitors
  • 6. 6 Privacy most Important when Customers choose products or services Symantec State of Privacy Report 2015 https://www.symantec.com/content/en/us/about/presskits/b-state-of-privacy- report-2015.pdf. Delivering great customer service Keeping your data safe and secure Delivering quality products / services Treating their employees and suppliers fairly Being environmentally friendly 82% 86% 69% 56% 88% Building Trust – Best Practices for Protecting Data in the Cloud
  • 7. Not all Organisations have the same level of Consumer Trust for Securing Data 7 https://www.symantec.com/content/en/us/about/presskits/b-state-of-privacy-report-2015.pdf. 69% 66% 45% 22% 20% 10% Hospitals / medical services Banks Government Technology companies (i.e. Google, Microsoft) Retailers (Including online shops) Social media sites (i.e. Facebook, Twitter) Organisations whose business models are based on data (tech companies and social media companies) appear less trusted to keep customer data completely secure Data Trust Chain Building Trust – Best Practices for Protecting Data in the Cloud
  • 8. SSL Mobile/BYOD/IoT Endpoints The Cloud Generation Security Challenge A Shifting Expanse of Blind Spots 8 Headquarters Data Center Regional Office Traditional Security Stack Expanding Use of Encryption Creates Blind Spots Traditional Security Stack Has Lost Significant Visibility As Resources Go Direct-to-Net Cloud Applications Causing Organizations to Lose Control Over Their Resources Rapidly Growing Landscape of Unprotected Devices Users Cloud Applications And Services Building Trust – Best Practices for Protecting Data in the Cloud
  • 9. Complications of Cloud Adoption • Who Owns the Comprehensive Service Level Agreements? • Single Pane of Glass? • Redundancy & High- Availability? • Vendor Compatibility? Cloud Web Gateway Provider Cloud DLP Provider Cloud Data Encryption Provider Cloud Access Control Provider Cloud Sandbox Provider Cloud Breach Analysis Cloud Forensic / Recording Cloud Email Scanning Cloud DDoS UBA Innovation for the Cloud Generation: Industry Has Created Cloud Security Chaos Building Trust – Best Practices for Protecting Data in the Cloud 9
  • 10. Gaining Control of the Cloud Building Trust – Best Practices for Protecting Data in the Cloud 10 Visibility Authentication Data Protection Secure Environment Adaptive Security Automation Ease of Use …know what is running / stored where… …ensure only right users can access the right apps/data… …safeguard my data everywhere and at all times… …ensure the environment is protected from malware and advanced threats… …security stays in-sync and scales with my constantly changing Cloud environment… …be able to automatically apply the right security with minimal human intervention… …manage my complex hybrid world from single control point…
  • 11. Innovation for the Cloud Generation: Securing A New World of Devices, Networks and Applications 11 Protection from Advanced Threats Securing the Mobile Workforce Ensuring Safe Cloud Usage Information Protection Advanced Threat Protection Email WebEndpoint Building Trust – Best Practices for Protecting Data in the Cloud
  • 12. Mobile/BYOD/IoT Endpoints Enable Enterprises to Securely Embrace the Cloud Ensuring Safe Cloud Usage 12 Headquarters Data Center Regional Office Users Building Trust – Best Practices for Protecting Data in the Cloud Capability One Symantec Solution Cloud & App-based Web Traffic Cleansing Cloud Gateway Inspect User Communication for Advanced Malware Cloud-Based Sandbox Visibility into Cloud Application Usage by Users Application Discovery User-Centric DLP Data Loss Prevention User-Based Cloud Application Authorization Cloud Broker Audit Acceptable-Use with Real-Time Analytics Cloud Analytics
  • 13. 182M web attacks blocked last year Discovered 430 million new unique pieces of malware last year 12,000+ Cloud applications discovered and protected Innovation for the Cloud Generation: Protecting Against Advanced Threats – Global Intelligence Network 175M Consumer and Enterprise endpoints protected 9global threat response centers with 3000 Researchers and Engineers 2 Billion emails scanned per day 1 Billion previously unseen web requests scanned daily Cloud Global Intelligence Sourced From: 100M social engineering scams blocked last year 1B malicious emails stopped last year Building Trust – Best Practices for Protecting Data in the Cloud 13
  • 14. A Portfolio to Deliver Cloud Generation Security Building Trust – Best Practices for Protecting Data in the Cloud 14 Bluecoat and Symantec Defining the Future of Cyber Security Headquarters Data Center Regional Office Roaming Users Next Generation Endpoints (IoT/Mobile) Web Protection Encrypted Traffic Tokenized Data storage Advance Malware Analysis Next-Generation SOC Data Loss Prevention Managed Security Service Next Gen Endpoint Mail Protection Security Stack
  • 15. Cloud Adoption and Protection Maximise Benefit from Cloud Usage • Build and Maintain Trust • Choose the Right Cloud(s) • Secure Digital Transformation Minimise Cloud Risk • Understand and Control your Cloud Usage • Know your Data • Harmonise Security Policies • Control Migration to the Cloud Ensure Compliance • Protect Data in and for the Cloud • Audit Cloud Activity Building Trust – Best Practices for Protecting Data in the Cloud 15 Value of Adopting Security Best Practice
  • 16. Thank you! Copyright © 2016 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Building Trust – Best Practices for Protecting Data in the Cloud 16 Presenter’s Name Presenter’s Email Presenter’s Phone

Notas do Editor

  1. Slide 3: Talking of data…….. 2: At the same time, the amount of data stored is exploding: Information growth is exploding – more and more data to manage. Data growth strains infrastructure & security in every conceivable way, and this will get exponentially worse over time. Major date – 2010 = 1ZB: Such a big number = every man, woman and child tweeting continously for 100 years each. Growing at 62% per year By 2020 will get to 40ZB = there will be as many bytes of data on the planet as stars in the sky! These trends will not abate - Software and data will only get more persuasive in all of our lives!
  2. GDPR is all about data privacy. There are a number of drivers for privacy, of which the GDPR is just one. You need to get this right to protect your reputation with key stakeholders (eg press, consumers, customers, suppliers, vendors), and doing that can lead to new business opportunities for you. But it’s not easy. There are some challenges. Data is growing, it’s mobile, it’s stored in places you might not know about (the cloud) and also no-one owns it in your organisations. In parallel, data is valuable so at risk of theft by people both within and outside your organisation. Our ISTR research shows that 49% of data breaches are as a result of an external threat. So you need to look holistically at the issue. I said privacy is important to customers, let’s look at some research behind that. ------------------ If your business involves personal data then privacy needs to be at the core of your business in order to be successful. Historically, businesses have not always focused on privacy in the way that they should. However, increasingly if you don’t prioritise privacy it will impact your chances of success. There has been a framework and regulation around since the 1950s. Although privacy is a business issue, it’s also an emotive issue that can create an instinctive reaction in consumers. In countries like France and Germany privacy of their personal data is culturally important and failing to look after it can directly affect business. With the increase in breaches, the press headlines that brings and the impact of business reputation protecting the personal data of customers and employees has never been more important. However, we’re working in a world where there are inhibitors to that drive. We haven’t taken ownership of the data we have and it’s growing more as we adopt new technology such as IoT. We need to take ownership for our data and ensure that we protect privacy. The GDPR is an evolution not a revolution of the existing privacy framework to deal with the inhibitors to privacy whilst protecting EU citizens and residents from abuses which could arise. This makes IT security and risk management, protecting data whilst enabling the increasingly connected and digital part of the world. IT has never been more relevant to business. Under GDPR, the “drive for privacy” come first and foremost from: - the idea of privacy being a fundamental right (you can’t fool around with it or take it lightly) - the Accountability principle (you need to prove you do the right thing across the board) - the Privacy by Design principle (you need to build all your products in a certain way) - the Privacy by Default principle (you can only bring your products to market in a certain way) And only then can we go into technicalities like the security and breach notice components, or international data transfers for that matter.
  3. Our State of Privacy report shows that privacy is the most important factor when customers use products and services from an organisation. So you need to be able to both provide data security and demonstrate this to be successful. ------------------------------ Individuals care about privacy. Getting this right is essential to the success of the business. Getting privacy right will be a competitive advantage for a business, so it’s not just about complying with the regulation, a good privacy focus can provide a real competitive advantage to a business. This will also pass down through the supply chain. Even if your business doesn’t directly consume customer data a good privacy posture will be important in successfully fulfilling contracts with other companies.
  4. Let’s take a look at how this combination will help our customers. Together we are going to deliver integrated Cyber Defense with: Shared Telemetry and Core Protection Engines across the endpoint, email, data-center and the cloud to deliver formidable cyber defense against the critical threat vectors Cross control point detection & remediation: Advanced Threat Protection will offer an integrated single control panel to detect and remediate the most sophisticated threat Data Loss Prevention and User Authentication extended to the web proxy and over 12,000 web applications through the Blue Coat Cloud Access Security Broker Enterprises can securely embrace the cloud, with a single best in breed provider for all the layers of security you are going to need for the cloud, from and to the cloud. There is not a CISO in the world that will not be interested in what we will be able to offer.