SlideShare uma empresa Scribd logo
1 de 22
New Frontiers in Security 
Vineet Sood 
Director Channels & Alliances 
Wipro Leading Edge - 2010 •1
2 
More information in more 
places, accessed from more 
points, than ever before 
Symantec Enterprise Vision and Strategy
Trend 1 – Keeping the Bad Guys Out 
Protecting the Infrastructure
Trend 1 – Keeping the Bad Guys Out 
• Bermuda Triangle - FW + IDS + AV 
• Protection = Prevention + Detection 
– End of Road for IDS 
– Emergence of IPS 
• Insider Threat Emerged 
– Host Protection 
– Assesment tools/Sniffers
Trend 1 – Keeping the Bad Guys Out
Trend 2 – Letting the Good Guys In 
Business is Changing; Security Must 
Enabling Secure Business Access
Trend 2 – Letting the Good Guys In 
• Boundaryless Org - Thinning of PERIMETER 
– Each End pt becomes a Gateway 
– Work from Anywhere/Anytime (2 of the 3 Any’s) 
• Integration of Technology 
– Evolution of UTM’s & End Point Suites 
– Genesis of NAC & Secure Access 
• Security/Incident Monitoring 
– Protection = Prevention + Detection + Response 
– Closed Loop? Still a Dream
Trend 3 – Keeping Good things In 
Protecting Information
Trend 3 – Keeping Good things In 
• Data Loss Prevention 
– Network, Storage & End Point 
• Regulatory Compliance 
– Technical Controls 
• Ability to recover things 
– Back up & HA 
• Identity Mgmt Back in Vogue
Trend 4 – Security Industry Grows up 
Mergers & Acquisitions Hot-Up
Trend 4 – Security Industry Grows up 
• Acquisitions Galore in Past 2 to 3 yrs 
– Macfee, RSA, Archsight, Cogent, IronPort, Big Fix, Tricipher, 
Fortify, Arcot 
– Verisign, PGP + GE, Msg Labs, Vontu, BrightMail, Mi5 
• All Major Players in Security Bandwagon 
– Symantec, IBM, HP, Cisco, MS, Intel, Google 
• Soc + NoC Consolidation 
– Back up & HA
New Dimensions @ Work 
I want to work the way I want 
to work 
It’s a ON-DEMAND World 
Staff work can be done by 3rd party 
I want to share INFO who are you 
to say I can’t
Key IT Trends of Future 
 Consumerisation of IT 
 IT-ization of the Consumer 
 Mobile 
 Social 
 Virtual & Cloud
Mobility
By 2011 1 billion mobile devices will access internet
Sophisticated Attackers 
On July 13 2010 a unique form of 
malware was discovered that was 
attempting to take control of industrial 
infrastructure around the world
 We Protected PCs & Macs for years now 
 SMART Devices are now connecting to the Internet to offer new features 
 They will require same security, ability to update, remote support.
Inferences for the Future 
Everything Revolves Around People and Information 
Business and Personal Digital Personae Have Merged 
Simple and Secure Access To Information Is Expected 
The Enterprise Is More Scalable and Cost Effective
New Frontiers of Security in Future
Everything Revolves Around People and Information 
CONFIDENCE 
Confidential - Internal Only 
People Information 
Identity Protection Context
Building the Human Firewall
Thank you! 
Thursday, December 2, 2010 
| Renaissance Mumbai 
www.symantec.com/in/vision2010 
Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in 
the U.S. and other countries. Other names may be trademarks of their respective owners. 
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, 
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 
•22

Mais conteúdo relacionado

Mais procurados

Privacy and Security in the Internet of Things
Privacy and Security in the Internet of ThingsPrivacy and Security in the Internet of Things
Privacy and Security in the Internet of ThingsJeff Katz
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber SecurityNikunj Thakkar
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityJohn Rhoton
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
Cyber Security - Flier
Cyber Security - FlierCyber Security - Flier
Cyber Security - FlierSunit Belapure
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintSurfWatch Labs
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber securityAurobindo Nayak
 
Cyber Security & Cyber Security Threats
Cyber Security & Cyber Security ThreatsCyber Security & Cyber Security Threats
Cyber Security & Cyber Security ThreatsSiemplify
 
Network security
Network securityNetwork security
Network securityhajra azam
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoTAmy Daly
 
Ics & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesIcs & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesomriyad
 
Voice securityprotocol review
Voice securityprotocol reviewVoice securityprotocol review
Voice securityprotocol reviewFabio Pietrosanti
 
Drawing the Line Correctly: Enough Security, Everywhere
Drawing the Line Correctly:   Enough Security, EverywhereDrawing the Line Correctly:   Enough Security, Everywhere
Drawing the Line Correctly: Enough Security, EverywhereLINE Corporation
 
Cyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesCyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesPaige Rasid
 
Cyber Security College Workshop
Cyber Security College WorkshopCyber Security College Workshop
Cyber Security College WorkshopRahul Nayan
 

Mais procurados (20)

Privacy and Security in the Internet of Things
Privacy and Security in the Internet of ThingsPrivacy and Security in the Internet of Things
Privacy and Security in the Internet of Things
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Cyber Security - Flier
Cyber Security - FlierCyber Security - Flier
Cyber Security - Flier
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
Cyber security
 Cyber security Cyber security
Cyber security
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital Footprint
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Cyber Security & Cyber Security Threats
Cyber Security & Cyber Security ThreatsCyber Security & Cyber Security Threats
Cyber Security & Cyber Security Threats
 
Network security
Network securityNetwork security
Network security
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
 
Ics & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesIcs & computer security for nuclear facilities
Ics & computer security for nuclear facilities
 
Bmit meet theexperts_2013
Bmit meet theexperts_2013Bmit meet theexperts_2013
Bmit meet theexperts_2013
 
Voice securityprotocol review
Voice securityprotocol reviewVoice securityprotocol review
Voice securityprotocol review
 
Drawing the Line Correctly: Enough Security, Everywhere
Drawing the Line Correctly:   Enough Security, EverywhereDrawing the Line Correctly:   Enough Security, Everywhere
Drawing the Line Correctly: Enough Security, Everywhere
 
Cyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesCyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass Houses
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security College Workshop
Cyber Security College WorkshopCyber Security College Workshop
Cyber Security College Workshop
 

Destaque

Do Dooni Char - The Force Multipliers In Your Value Chain
Do Dooni Char -  The Force Multipliers In Your Value ChainDo Dooni Char -  The Force Multipliers In Your Value Chain
Do Dooni Char - The Force Multipliers In Your Value ChainVineet Sood
 
Advanter Group’s report - "Crisis Brands Trends"
Advanter Group’s report - "Crisis Brands Trends"Advanter Group’s report - "Crisis Brands Trends"
Advanter Group’s report - "Crisis Brands Trends"Advanter Group
 
Top 10 biotech companies & market share 2008
Top 10 biotech companies & market share 2008Top 10 biotech companies & market share 2008
Top 10 biotech companies & market share 2008Akumentis Healthcare Ltd
 
Halloween Vocabulary
Halloween VocabularyHalloween Vocabulary
Halloween Vocabularyjucadis
 
Web20 Social Tools Parents
Web20 Social Tools ParentsWeb20 Social Tools Parents
Web20 Social Tools ParentsChristineMark
 
Christmas Traditions in Great Britain
Christmas Traditions in Great BritainChristmas Traditions in Great Britain
Christmas Traditions in Great Britainjucadis
 
Wrestling Presentation
Wrestling PresentationWrestling Presentation
Wrestling Presentationguest869811
 
Research of clients expectations and satisfaction
Research of clients expectations and satisfactionResearch of clients expectations and satisfaction
Research of clients expectations and satisfactionAdvanter Group
 
Актуальные тренды потребительского поведения
Актуальные тренды потребительского поведенияАктуальные тренды потребительского поведения
Актуальные тренды потребительского поведенияAdvanter Group
 
Converting Fractions
Converting FractionsConverting Fractions
Converting FractionsBalyni
 
Halloween 2
Halloween 2Halloween 2
Halloween 2jucadis
 
Amazon Web Service Sales Role Play - Case Study
Amazon Web Service Sales Role Play - Case StudyAmazon Web Service Sales Role Play - Case Study
Amazon Web Service Sales Role Play - Case StudyVineet Sood
 
Christmas Traditions In Great Britain
Christmas Traditions In Great BritainChristmas Traditions In Great Britain
Christmas Traditions In Great Britainjucadis
 

Destaque (17)

Do Dooni Char - The Force Multipliers In Your Value Chain
Do Dooni Char -  The Force Multipliers In Your Value ChainDo Dooni Char -  The Force Multipliers In Your Value Chain
Do Dooni Char - The Force Multipliers In Your Value Chain
 
Advanter Group’s report - "Crisis Brands Trends"
Advanter Group’s report - "Crisis Brands Trends"Advanter Group’s report - "Crisis Brands Trends"
Advanter Group’s report - "Crisis Brands Trends"
 
Top 10 biotech companies & market share 2008
Top 10 biotech companies & market share 2008Top 10 biotech companies & market share 2008
Top 10 biotech companies & market share 2008
 
Halloween Vocabulary
Halloween VocabularyHalloween Vocabulary
Halloween Vocabulary
 
Web20 Social Tools Parents
Web20 Social Tools ParentsWeb20 Social Tools Parents
Web20 Social Tools Parents
 
Payment
PaymentPayment
Payment
 
Christmas Traditions in Great Britain
Christmas Traditions in Great BritainChristmas Traditions in Great Britain
Christmas Traditions in Great Britain
 
Networking success
Networking successNetworking success
Networking success
 
Wrestling Presentation
Wrestling PresentationWrestling Presentation
Wrestling Presentation
 
Research of clients expectations and satisfaction
Research of clients expectations and satisfactionResearch of clients expectations and satisfaction
Research of clients expectations and satisfaction
 
Jane Jackson Coaching and Training 2016
Jane Jackson Coaching and Training 2016Jane Jackson Coaching and Training 2016
Jane Jackson Coaching and Training 2016
 
Актуальные тренды потребительского поведения
Актуальные тренды потребительского поведенияАктуальные тренды потребительского поведения
Актуальные тренды потребительского поведения
 
Converting Fractions
Converting FractionsConverting Fractions
Converting Fractions
 
Halloween 2
Halloween 2Halloween 2
Halloween 2
 
Polish your Professional Image
Polish your Professional ImagePolish your Professional Image
Polish your Professional Image
 
Amazon Web Service Sales Role Play - Case Study
Amazon Web Service Sales Role Play - Case StudyAmazon Web Service Sales Role Play - Case Study
Amazon Web Service Sales Role Play - Case Study
 
Christmas Traditions In Great Britain
Christmas Traditions In Great BritainChristmas Traditions In Great Britain
Christmas Traditions In Great Britain
 

Semelhante a The New frontiers in Information Security

The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsOurCrowd
 
Cyber security event
Cyber security eventCyber security event
Cyber security eventTryzens
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionGianmarco Ferri
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-securityskumartarget
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Huntsman Security
 
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)sandhibhide
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2SafeNet
 
Gus Hunt's Work-Bench Enterprise Security Summit Keynote
Gus Hunt's Work-Bench Enterprise Security Summit KeynoteGus Hunt's Work-Bench Enterprise Security Summit Keynote
Gus Hunt's Work-Bench Enterprise Security Summit KeynoteWork-Bench
 
Enterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile worldEnterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile worldSamsung Business USA
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...Arbp Worldwide
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceNISIInstituut
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Samuel Kamuli
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, LondonJohn Palfreyman
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Minh Le
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?Ulf Mattsson
 
Internet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of thingsInternet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of thingsHuntsman Security
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021lior mazor
 
Trinity Profile 001
Trinity Profile 001Trinity Profile 001
Trinity Profile 001trifuturein
 

Semelhante a The New frontiers in Information Security (20)

The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtection
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)
 
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
Gus Hunt's Work-Bench Enterprise Security Summit Keynote
Gus Hunt's Work-Bench Enterprise Security Summit KeynoteGus Hunt's Work-Bench Enterprise Security Summit Keynote
Gus Hunt's Work-Bench Enterprise Security Summit Keynote
 
Enterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile worldEnterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile world
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?
 
Internet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of thingsInternet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of things
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
 
Trinity Profile 001
Trinity Profile 001Trinity Profile 001
Trinity Profile 001
 

Mais de Vineet Sood

Customer success when you have millions of customers
Customer success when you have millions of customersCustomer success when you have millions of customers
Customer success when you have millions of customersVineet Sood
 
Building influence for 1st time mgrs
Building influence for 1st time mgrsBuilding influence for 1st time mgrs
Building influence for 1st time mgrsVineet Sood
 
Vineet Sood - thinker & planner 2019
Vineet Sood - thinker & planner 2019Vineet Sood - thinker & planner 2019
Vineet Sood - thinker & planner 2019Vineet Sood
 
Adobe connectED donation program
Adobe connectED donation programAdobe connectED donation program
Adobe connectED donation programVineet Sood
 
Partner matrices & model by Vineet Sood
Partner matrices & model by Vineet SoodPartner matrices & model by Vineet Sood
Partner matrices & model by Vineet SoodVineet Sood
 
Activity based Sales Process
Activity based Sales ProcessActivity based Sales Process
Activity based Sales ProcessVineet Sood
 
Growing the Adobe business
Growing the Adobe business Growing the Adobe business
Growing the Adobe business Vineet Sood
 
My Role @ Symantec
My Role @ SymantecMy Role @ Symantec
My Role @ SymantecVineet Sood
 
Unleash your potential final
Unleash your potential finalUnleash your potential final
Unleash your potential finalVineet Sood
 
Human Element In Security
Human Element In SecurityHuman Element In Security
Human Element In SecurityVineet Sood
 

Mais de Vineet Sood (10)

Customer success when you have millions of customers
Customer success when you have millions of customersCustomer success when you have millions of customers
Customer success when you have millions of customers
 
Building influence for 1st time mgrs
Building influence for 1st time mgrsBuilding influence for 1st time mgrs
Building influence for 1st time mgrs
 
Vineet Sood - thinker & planner 2019
Vineet Sood - thinker & planner 2019Vineet Sood - thinker & planner 2019
Vineet Sood - thinker & planner 2019
 
Adobe connectED donation program
Adobe connectED donation programAdobe connectED donation program
Adobe connectED donation program
 
Partner matrices & model by Vineet Sood
Partner matrices & model by Vineet SoodPartner matrices & model by Vineet Sood
Partner matrices & model by Vineet Sood
 
Activity based Sales Process
Activity based Sales ProcessActivity based Sales Process
Activity based Sales Process
 
Growing the Adobe business
Growing the Adobe business Growing the Adobe business
Growing the Adobe business
 
My Role @ Symantec
My Role @ SymantecMy Role @ Symantec
My Role @ Symantec
 
Unleash your potential final
Unleash your potential finalUnleash your potential final
Unleash your potential final
 
Human Element In Security
Human Element In SecurityHuman Element In Security
Human Element In Security
 

Último

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Último (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

The New frontiers in Information Security

  • 1. New Frontiers in Security Vineet Sood Director Channels & Alliances Wipro Leading Edge - 2010 •1
  • 2. 2 More information in more places, accessed from more points, than ever before Symantec Enterprise Vision and Strategy
  • 3. Trend 1 – Keeping the Bad Guys Out Protecting the Infrastructure
  • 4. Trend 1 – Keeping the Bad Guys Out • Bermuda Triangle - FW + IDS + AV • Protection = Prevention + Detection – End of Road for IDS – Emergence of IPS • Insider Threat Emerged – Host Protection – Assesment tools/Sniffers
  • 5. Trend 1 – Keeping the Bad Guys Out
  • 6. Trend 2 – Letting the Good Guys In Business is Changing; Security Must Enabling Secure Business Access
  • 7. Trend 2 – Letting the Good Guys In • Boundaryless Org - Thinning of PERIMETER – Each End pt becomes a Gateway – Work from Anywhere/Anytime (2 of the 3 Any’s) • Integration of Technology – Evolution of UTM’s & End Point Suites – Genesis of NAC & Secure Access • Security/Incident Monitoring – Protection = Prevention + Detection + Response – Closed Loop? Still a Dream
  • 8. Trend 3 – Keeping Good things In Protecting Information
  • 9. Trend 3 – Keeping Good things In • Data Loss Prevention – Network, Storage & End Point • Regulatory Compliance – Technical Controls • Ability to recover things – Back up & HA • Identity Mgmt Back in Vogue
  • 10. Trend 4 – Security Industry Grows up Mergers & Acquisitions Hot-Up
  • 11. Trend 4 – Security Industry Grows up • Acquisitions Galore in Past 2 to 3 yrs – Macfee, RSA, Archsight, Cogent, IronPort, Big Fix, Tricipher, Fortify, Arcot – Verisign, PGP + GE, Msg Labs, Vontu, BrightMail, Mi5 • All Major Players in Security Bandwagon – Symantec, IBM, HP, Cisco, MS, Intel, Google • Soc + NoC Consolidation – Back up & HA
  • 12. New Dimensions @ Work I want to work the way I want to work It’s a ON-DEMAND World Staff work can be done by 3rd party I want to share INFO who are you to say I can’t
  • 13. Key IT Trends of Future  Consumerisation of IT  IT-ization of the Consumer  Mobile  Social  Virtual & Cloud
  • 15. By 2011 1 billion mobile devices will access internet
  • 16. Sophisticated Attackers On July 13 2010 a unique form of malware was discovered that was attempting to take control of industrial infrastructure around the world
  • 17.  We Protected PCs & Macs for years now  SMART Devices are now connecting to the Internet to offer new features  They will require same security, ability to update, remote support.
  • 18. Inferences for the Future Everything Revolves Around People and Information Business and Personal Digital Personae Have Merged Simple and Secure Access To Information Is Expected The Enterprise Is More Scalable and Cost Effective
  • 19. New Frontiers of Security in Future
  • 20. Everything Revolves Around People and Information CONFIDENCE Confidential - Internal Only People Information Identity Protection Context
  • 21. Building the Human Firewall
  • 22. Thank you! Thursday, December 2, 2010 | Renaissance Mumbai www.symantec.com/in/vision2010 Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. •22