Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.

Slides:



Advertisements
Similar presentations
Laptop Security in the current IT world W3 group.
Advertisements

Security and Control Soetam Rizky. Why Systems Are Vulnerable ?
©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain Digital is a trademark of Iron Mountain Incorporated. Stanford University ©2006 Iron.
Ch.5 It Security, Crime, Compliance, and Continuity
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
© 2006 PCE Systems Ltd IT Systems Integrity Chris Nabavi BSc SMIEEE.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
CYBER CRIME AND SECURITY TRENDS
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
INTRODUCTION Coined in 1996 by computer hackers. Hackers use to fish the internet hoping to hook users into supplying them the logins, passwords.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
StorTech Security Regulatory compliance provides the business foundation for security Organisations need to tackle all security challenges from a business.
© LogicaCMG All rights reserved Enabling Personal Internet Security Dave Martin Managing Security Consultant.
Copyright, 2005 Pinnacle Entertainment, Inc. 1 Auditing the Windows Network Bart A. Lewin Chief Technology Officer Pinnacle Entertainment, Inc. CS 3-2.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
Steve Bennett President & Chief Executive Officer NASDAQ OMX International Investor Program December 4, 2013.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
1 Brett Roberts Director of Innovation | Microsoft NZ | 28 Aug 07 Technology and Privacy.
David Overton Head of Small Business Technology – Head of Small Business Technology – Microsoft solutions for.
Brad Allen Windows Client Technical Specialist Microsoft Corporation.
1.1 System Performance Security Module 1 Version 5.
Mobile Technology and Cyber Threats Deon Woods Bell Office of International Affairs The Fifth Annual African Consumer Protection Dialogue Conference Livingstone,
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Exploring the Network.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Managing Technology and Information Chapter 15. Distinguish between data and information and explain the role of management information systems in business.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Protecting Your Business Against the Unthinkable SBA Houston, August 2, 2006 Mark Piening Sr. Director Worldwide SMB Marketing.
Service Overview CA- IROD- Instant Recovery on Demand CRITICAL SERVER CONTINUITY, NON-STOP OPERATIONS, TOTAL DATA PROTECTION Turnkey solution that provides.
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
Using Technology to Manage Information
Internet Security Breach & Its Impact on Business Operations Kim Nguyen Manish Shirke Wa Mo Saravanan Velrajan.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
What is Spam? d min.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Microsoft and Symantec
Safe’n’Sec IT security solutions for enterprises of any size.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
Chapter 11 Implementing Social Commerce Systems. Learning Objectives 1.Describe the major issues in the social commerce implementation landscape. 2.Discuss.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
Small Business Solutions Copyright 2014 Trend Micro Inc.
Devices 10 billion Internet- connected devices by 2016 People 1 billion+ people use social media services today Cloud 30 % of data will live in or pass.
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
OFFICE 365 APP BUILDER PROFILE: Druva
Securing Information Systems
Broadband Challenges 2017 Christopher Tamarin
Securing Information Systems
Chapter 1: Exploring the Network
Office 365 is cloud-based productivity, hosted by Microsoft.
Secure Hyperconnectivity with TeamViewer and Windows technologies
Computer Virus and Antivirus
Securing Information Systems
File Manager for Microsoft Office 365, SharePoint, and OneDrive: Extensible Via Custom Connectors in Enterprise Deployments, Ideal for End Users OFFICE.
Cyber Trends and Market Update
Protecting Your Information Assets
Presentation transcript:

Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing

Protecting your business 2 – 2005 Symantec Corporation. All rights reserved. Symantec Today ► 4th largest independent software company in the world ► More than 200 million+ systems protected worldwide ► Diverse customer base: consumer, business, government and education ► Global 24x7 operations: 14,000 employees in 39 countries ► 23 years of industry experience ► Over $700M annual investment in R&D ► Over 80% of business with you, our channel partners

Protecting your business 3 – 2005 Symantec Corporation. All rights reserved. Small Businesses Are Interacting In New Ways

Protecting your business 4 – 2005 Symantec Corporation. All rights reserved. Your Business Is Changing ► Technology surrounds our work and private lives ► The Internet has redefined business dynamics ► anytime, anywhere ► Instant messages at a blink of an eye ► Wireless everything – mobile phones, wireless networks ► Access to work from home, hotel, airport ► Huge amounts of data stored on computers and servers

Protecting your business 5 – 2005 Symantec Corporation. All rights reserved. IM threats grew by 1,693% in 2005 With Opportunities Come Risks 35% of Small Businesses Use Instant Messaging (IM) In 2005, US consumers lodged more than 196,503 internet related fraud complaints with the FTC 57% of SMBs with websites generate significant revenue online One in five organizations said they have sustained financial losses due to attack on mobile data platforms Usage of converged mobile devices grew 50% worldwide Sources: IMlogic Threat Center report, Jan 2006; Interland Small and Medium-sized Business Barometer, September 2005; Federal trade commission, 2006; IDC, 2005; PC World, April 2006;

Protecting your business 6 – 2005 Symantec Corporation. All rights reserved. The Problem… Environmental Impacts  Power Outages  Floods  Tornadoes  Etc. User Mishaps  End User Error  Theft  Fat Finger Malicious Attacks  Viruses  Worms  Trojan Horses  Phishing  SpyWare Hardware/Software  Hard Drive  Motherboard/Power  System Corruption  Failed Patch or Update Common Denominator: Loss of System and/or Important Information

Protecting your business 7 – 2005 Symantec Corporation. All rights reserved. months days hrs mins secs Program Viruses Macro Viruses Worms Network Worms Flash Worms Contagion Period Evolution of Virus/Worm Threats ► The latest threats now spread orders of magnitude faster than years ago, from months to nearly seconds 1990 Time 2006 Contagion Period

Protecting your business 8 – 2005 Symantec Corporation. All rights reserved. Threat Impact On Small Businesses Direct Losses Theft, Money, Digital Assets Computer Resources Trade Secrets Consumer Information Indirect Losses Loss of Potential Sales Negative Brand Impact Loss of Competitive Advantage Loss of Goodwill Productivity Losses Diversion of Funds Continuity Expenses Corruption of Data Recovery Expenses Failure to Meet Contracts Failure to Meet Privacy Regulations Illegal User Activity Director Liability Legal Exposure

Protecting your business 9 – 2005 Symantec Corporation. All rights reserved. But Symantec Can Help….. Security Data Center Management Services Data Protection For all network tiers: the gateway, the server, the desktop, including PCs, laptops, handhelds Backup and recovery of data and systems Simplifies administration of heterogeneous environments and provides continuous availability of mission critical data and applications Full range of services to assist our customers manage and mitigate IT risk Plan Design Build Manage

Protecting your business 10 – 2005 Symantec Corporation. All rights reserved. A Simple Blueprint For Windows Security And Availability Policy ► Proactive alerts ► Endpoint compliance ► discovery/compliance Application ► Mail security ► Exchange archiving Data ► Data backup and recovery ► Client and server security System ► Server management & recovery ► Desktop management & recovery

Protecting your business 11 – 2005 Symantec Corporation. All rights reserved. Resources For Small Business Internet Threat Report Product Collateral Whitepapers Security Tips Webcasts Flash Demos Featured Articles Newsletters

Thank You