Professional Documents
Culture Documents
312
56 million credit cards stolen
348
MILLION
80 million medical records stolen
Medical records 10 times more valuable
than credit cards on black market
Understanding Where
Stopping Incoming Finding Incursions Containing & Restoring Operations
Important Data Is &
Attacks Remediating Problems
Who Can Access It
Understanding Where
Stopping Incoming Finding Incursions Containing & Restoring Operations
Important Data Is &
Attacks Remediating Problems
Who Can Access It
Symantec Advanced
Our Future: Threat Protection
Exported Data
Unparalleled Prevention
Consistent leader in endpoint & email protection
Endpoint Network Email 3rd party Delivered at the Lowest Security OpEx
Integrated with Endpoint Protection & Email Security
Cloud payload detonation
A single console, a partner ecosystem, and an API driven approach
ATP in Action
Suspicious File via Email
Email with
1 Suspicious File
or URL
3 Cynic convicts file
5 Admin drills down to
Cynic conviction
Internet
Endpoints
Internet
Internet
Email Security.cloud
Customer mail server
(or hosted mailbox
provider)
Core service ATP: Email
VirusTotal lookup
0/57 detection ratio
Pivot to endpoints
STAR analysts examine Look for zero-day malware Targeted attacks categorized
malicious emails and targeted content based on thresholds Customer Dashboard and
Detailed Report updated
Malware details
Email details
Malware name
Date, time, timezone
Copyright 2015 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be
trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by
law. The information in this document is subject to change without notice.