25. 赛门铁克愿景
“Confidence in the Connected World”
Confidence?in?the?Connected?World
互联世界,满怀信心
Secure?and?Manage?Your?Information‐Driven?
S dM Y I f ti D i
Enterprise,?across?Physical,?Virtual,?and?Cloud
Symantec? Vision 2010 25
26. 来自最佳实践的公司安全建设框架:
? 以合规管理推动安全治理常态化
– 以风险和公司策略为驱动
Risk?Based?and?Policy?Driven
Ri k B d d P li D i
– 以自动化的风险与合规管理为手段
IT Governance, Risk and Compliance
– 不断治理和改善安全状态
– 应对不断变化的挑战
? 以“信息”风险管理为核心
Information? Centric – 信息的安全更针对数据的内容
Information Risk – 信息是IT系统的核心与重点
Identity?Centric Management
Operationalized ? 增强基础设施管理
Identity
Id tit & – 标准化、流程化、自动化
Authentication Infrastructure
Management – 更加高效、安全的IT运行管理
Management
? 以身份管理确保可信的访问 Well?
Well ? 提供良好的基础设施保护
– 人是IT系统使用的主体 Protected? – 提供安全保护良好的基础设施
Infrastructure
– 身份的标识与认证确保主体的安全 Infrastructure – 更加安全的基础设施环境
Protection
Symantec?Vision?2010
26
38. Global?Intelligence?Network
Identifies?more?threats,?takes?action?faster?&?prevents?impact
Calgary, Alberta Dublin, Ireland
Reading, England
San Francisco, CA Alexandria, VA Tokyo, Japan
Mountain View, CA Chengdu, China
Austin, TX
Culver City, CA
City
Taipei, Taiwan
Chennai, India
Pune, India
Sydney, AU
Worldwide Coverage Global Scope and Scale 24x7 Event Logging
Rapid Detection
Attack Activity Malware Intelligence Vulnerabilities Spam/Phishing
? 240,000 sensors ? 130M client, server, ? 32,000+ vulnerabilities ? 2.5M decoy accounts
? 200+ countries g
gateways monitored
y ? 11,000 vendors ? 8B+ email messages/day
g y
? Global coverage ? 72,000 technologies ? 1B+ web requests/day
Preemptive Security Alerts Symantec?Vision?2010
Copyright ? 2009 Symantec Corporation. All rights reserved. Protection
Information Threat Triggered Actions 38
39. Building?a? Community?of?Defense with Businesses
Building a “Community of Defense”?with?Businesses
> Customers?from?businesses?around?the?world
Who
> Symantec?Security?Leadership?and?Experts?on?
Threat?Research
> Ongoing discussions about the types of IT risks
Ongoing?discussions about?the?types?of?IT?risks?
What businesses?face?today
> Share?information?about?security incidents,?impact?
, p p
assessment,?and?best?practices?to?prevent
> Today’s?targeted?attacks?characterized?by?
mend
organization,?covert?nature?and?patience
g , p
Recomm
Key?
> Strong?consensus?these?attacks?represent?a?
significant risk?to?intellectual?property
> Suggestions?……
gg
Symantec?Vision?2010 39
41. Thank?you!
y
马蔚彦
Weiyan_ma@symantec.com
y @y
13601394620
Copyright???2010?Symantec?Corporation.?All?rights?reserved. Symantec?and?the?Symantec?Logo?are?trademarks?or?registered?trademarks?of?Symantec?Corporation?or?its?affiliates?in?
the?U.S.?and?other?countries. Other?names?may?be?trademarks?of?their?respective?owners.
This?document?is?provided?for?informational?purposes?only?and?is?not?intended?as?advertising. All
Thi d ti id d f i f ti l l di ti t d d d ti i All?warranties?relating?to?the?information?in?this?document,?either?express?or?implied,?
ti l ti t th i f ti i thi d t ith i li d
are?disclaimed?to?the?maximum?extent?allowed?by?law. The?information?in?this?document?is?subject?to?change?without?notice.
Presentation?Identifier?Goes?Here 41