08448380779 Call Girls In Civil Lines Women Seeking Men
Building Trust; best practics for protecting data in the cloud
1. Building Trust – Best Practices for Protecting Data in the Cloud 1
Building Trust;
Best Practices for Protecting Data in the
Cloud
Siân John
EMEA Chief Strategist Symantec
2. Always On and Everywhere
Digital World Enhances or Replaces Much of the Physical World
2Building Trust – Best Practices for Protecting Data in the Cloud
3. Applications and Data Are Moving to The Cloud
Building Trust – Best Practices for Protecting Data in the Cloud 3
5. The Drive for Data Privacy
Building Trust – Best Practices for Protecting Data in the Cloud 5
Lack of Business
Ownership
Data Growth
Emerging
Technology
Regulations
Lack of Visibility
Evolving Threat
landscape
Press Headlines
Reputation
Business
Opportunity
Customer Trust
Drivers Inhibitors
6. 6
Privacy most Important when Customers
choose products or services
Symantec State of Privacy Report 2015
https://www.symantec.com/content/en/us/about/presskits/b-state-of-privacy-
report-2015.pdf.
Delivering great customer service
Keeping your data safe and secure
Delivering quality products / services
Treating their employees and
suppliers fairly
Being environmentally friendly
82%
86%
69%
56%
88%
Building Trust – Best Practices for Protecting Data in the Cloud
7. Not all Organisations have the same level of
Consumer Trust for Securing Data
7
https://www.symantec.com/content/en/us/about/presskits/b-state-of-privacy-report-2015.pdf.
69%
66%
45%
22% 20%
10%
Hospitals / medical services Banks Government Technology companies (i.e.
Google, Microsoft)
Retailers (Including online
shops)
Social media sites (i.e.
Facebook, Twitter)
Organisations whose business
models are based on data (tech
companies and social media
companies) appear less trusted
to keep customer data
completely secure
Data Trust
Chain
Building Trust – Best Practices for Protecting Data in the Cloud
8. SSL
Mobile/BYOD/IoT Endpoints
The Cloud Generation Security Challenge
A Shifting Expanse of Blind Spots
8
Headquarters
Data Center
Regional
Office
Traditional
Security Stack
Expanding Use of Encryption Creates
Blind Spots
Traditional Security Stack Has Lost
Significant Visibility As Resources Go
Direct-to-Net
Cloud Applications Causing Organizations
to Lose Control Over Their Resources
Rapidly Growing Landscape of
Unprotected Devices
Users
Cloud Applications
And Services
Building Trust – Best Practices for Protecting Data in the Cloud
9. Complications of
Cloud Adoption
• Who Owns the
Comprehensive
Service Level
Agreements?
• Single Pane of Glass?
• Redundancy & High-
Availability?
• Vendor Compatibility?
Cloud
Web Gateway
Provider
Cloud
DLP Provider
Cloud
Data Encryption
Provider
Cloud
Access Control
Provider
Cloud Sandbox
Provider
Cloud Breach
Analysis
Cloud Forensic /
Recording
Cloud Email
Scanning
Cloud DDoS
UBA
Innovation for the Cloud Generation:
Industry Has Created Cloud Security Chaos
Building Trust – Best Practices for Protecting Data in the Cloud 9
10. Gaining Control of the Cloud
Building Trust – Best Practices for Protecting Data in the Cloud 10
Visibility
Authentication
Data Protection
Secure Environment
Adaptive Security
Automation
Ease of Use
…know what is running / stored where…
…ensure only right users can access the right
apps/data…
…safeguard my data everywhere and at all
times…
…ensure the environment is protected from
malware and advanced threats…
…security stays in-sync and scales with my
constantly changing Cloud environment…
…be able to automatically apply the right
security with minimal human intervention…
…manage my complex hybrid world from single
control point…
11. Innovation for the Cloud Generation:
Securing A New World of Devices, Networks and Applications
11
Protection from
Advanced
Threats
Securing
the Mobile
Workforce
Ensuring
Safe
Cloud Usage
Information
Protection
Advanced
Threat Protection
Email WebEndpoint
Building Trust – Best Practices for Protecting Data in the Cloud
12. Mobile/BYOD/IoT Endpoints
Enable Enterprises to Securely Embrace the Cloud
Ensuring Safe Cloud Usage
12
Headquarters
Data Center
Regional
Office
Users
Building Trust – Best Practices for Protecting Data in the Cloud
Capability
One Symantec
Solution
Cloud & App-based Web Traffic Cleansing Cloud Gateway
Inspect User Communication for
Advanced Malware
Cloud-Based Sandbox
Visibility into Cloud Application Usage by
Users
Application Discovery
User-Centric DLP Data Loss Prevention
User-Based Cloud Application Authorization Cloud Broker
Audit Acceptable-Use with Real-Time
Analytics
Cloud Analytics
13. 182M
web attacks
blocked last year
Discovered
430 million
new unique pieces
of malware last year
12,000+
Cloud applications
discovered and
protected
Innovation for the Cloud Generation:
Protecting Against Advanced Threats – Global Intelligence Network
175M
Consumer and Enterprise
endpoints protected
9global threat
response centers with
3000 Researchers and
Engineers
2 Billion
emails scanned per day
1 Billion
previously unseen web
requests scanned daily
Cloud Global Intelligence
Sourced From:
100M
social engineering
scams blocked last
year
1B
malicious emails
stopped last year
Building Trust – Best Practices for Protecting Data in the Cloud 13
14. A Portfolio to Deliver Cloud Generation Security
Building Trust – Best Practices for Protecting Data in the Cloud 14
Bluecoat and Symantec Defining the Future of Cyber Security
Headquarters
Data Center
Regional
Office
Roaming
Users
Next Generation
Endpoints (IoT/Mobile)
Web Protection
Encrypted Traffic
Tokenized Data storage
Advance Malware Analysis
Next-Generation SOC
Data Loss Prevention
Managed Security Service
Next Gen Endpoint
Mail Protection
Security Stack
15. Cloud Adoption and Protection
Maximise Benefit from Cloud Usage
• Build and Maintain Trust
• Choose the Right Cloud(s)
• Secure Digital Transformation
Minimise Cloud Risk
• Understand and Control your Cloud Usage
• Know your Data
• Harmonise Security Policies
• Control Migration to the Cloud
Ensure Compliance
• Protect Data in and for the Cloud
• Audit Cloud Activity
Building Trust – Best Practices for Protecting Data in the Cloud 15
Value of Adopting Security Best Practice
Slide 3: Talking of data……..
2: At the same time, the amount of data stored is exploding:
Information growth is exploding – more and more data to manage. Data growth strains infrastructure & security in every conceivable way, and this will get exponentially worse over time.
Major date – 2010 = 1ZB: Such a big number = every man, woman and child tweeting continously for 100 years each.
Growing at 62% per year
By 2020 will get to 40ZB = there will be as many bytes of data on the planet as stars in the sky!
These trends will not abate - Software and data will only get more persuasive in all of our lives!
GDPR is all about data privacy. There are a number of drivers for privacy, of which the GDPR is just one. You need to get this right to protect your reputation with key stakeholders (eg press, consumers, customers, suppliers, vendors), and doing that can lead to new business opportunities for you.
But it’s not easy. There are some challenges. Data is growing, it’s mobile, it’s stored in places you might not know about (the cloud) and also no-one owns it in your organisations. In parallel, data is valuable so at risk of theft by people both within and outside your organisation. Our ISTR research shows that 49% of data breaches are as a result of an external threat. So you need to look holistically at the issue.
I said privacy is important to customers, let’s look at some research behind that.
------------------
If your business involves personal data then privacy needs to be at the core of your business in order to be successful. Historically, businesses have not always focused on privacy in the way that they should. However, increasingly if you don’t prioritise privacy it will impact your chances of success. There has been a framework and regulation around since the 1950s. Although privacy is a business issue, it’s also an emotive issue that can create an instinctive reaction in consumers.
In countries like France and Germany privacy of their personal data is culturally important and failing to look after it can directly affect business. With the increase in breaches, the press headlines that brings and the impact of business reputation protecting the personal data of customers and employees has never been more important. However, we’re working in a world where there are inhibitors to that drive. We haven’t taken ownership of the data we have and it’s growing more as we adopt new technology such as IoT. We need to take ownership for our data and ensure that we protect privacy.
The GDPR is an evolution not a revolution of the existing privacy framework to deal with the inhibitors to privacy whilst protecting EU citizens and residents from abuses which could arise.
This makes IT security and risk management, protecting data whilst enabling the increasingly connected and digital part of the world. IT has never been more relevant to business.
Under GDPR, the “drive for privacy” come first and foremost from:
- the idea of privacy being a fundamental right (you can’t fool around with it or take it lightly)
- the Accountability principle (you need to prove you do the right thing across the board)
- the Privacy by Design principle (you need to build all your products in a certain way)
- the Privacy by Default principle (you can only bring your products to market in a certain way)
And only then can we go into technicalities like the security and breach notice components, or international data transfers for that matter.
Our State of Privacy report shows that privacy is the most important factor when customers use products and services from an organisation. So you need to be able to both provide data security and demonstrate this to be successful.
------------------------------
Individuals care about privacy. Getting this right is essential to the success of the business.
Getting privacy right will be a competitive advantage for a business, so it’s not just about complying with the regulation, a good privacy focus can provide a real competitive advantage to a business.
This will also pass down through the supply chain. Even if your business doesn’t directly consume customer data a good privacy posture will be important in successfully fulfilling contracts with other companies.
Let’s take a look at how this combination will help our customers.
Together we are going to deliver integrated Cyber Defense with:
Shared Telemetry and Core Protection Engines across the endpoint, email, data-center and the cloud to deliver formidable cyber defense against the critical threat vectors
Cross control point detection & remediation: Advanced Threat Protection will offer an integrated single control panel to detect and remediate the most sophisticated threat
Data Loss Prevention and User Authentication extended to the web proxy and over 12,000 web applications through the Blue Coat Cloud Access Security Broker
Enterprises can securely embrace the cloud, with a single best in breed provider for all the layers of security you are going to need for the cloud, from and to the cloud.
There is not a CISO in the world that will not be interested in what we will be able to offer.