Good morning Mister Mario and Mister Luigi, I want to appreciate you for joining the discussion for today. As we had agreed previously, I would like we take thirty minutes together as my colleague Engineer Marco, and I take you through a high-level Integrated Cyber Defense (ICD) pitch from Symantec. Personally, I will start with the ICD platform from Symantec for about ten minutes from where my colleague will take over to complete the rest of the parts. My colleague, a sales engineer, will take you through the Stickiness Report, about your current deployment of endpoint protection. He will further guide you through the best practices on how to maximize your investment in this critical termination point. Throughout my discussion, I will be asking for questions to understand your environment better. Kindly feel free to stop me at any time if you have any doubt or need to make any clarifications.
The purpose of my call is that we help sales managers to improve the performance of every person on their team. However, please let me start from the kind of challenges, that I, as a Symantec representative, find to be shared and are affecting the operation of most organizations. I have been currently consulting concerning these challenges with leaders in the vertical protocol of the manufacturing industry consultants. Most of your colleagues are worried about the internet getting darker, as shown by statistics. About 50% of internet traffic is encrypted already, and this portion will get bigger over the next years. This trend is making it more difficult for your Security Staff to detect malicious files entering the network or sensitive data leaving the organization. Your colleagues among the IT Leaders in manufacturing are asking for artificial intelligence as a solution to this challenge. The artificial intelligence system essentially translates in requests to help to manage the IT security, in a faster and easier way.
IT Leaders in manufacturing are now refocusing on prevention against sophisticated attacks, their endpoints, cloud, as well as the infrastructure. The discovery of advanced attacks such as Wanna Cry or Petya at an advanced stage can bring down the operation of a business. This is because interference has already taken place, and the damage is beyond the detection level for prevention. It is, therefore, critical for the organization technicians to learn defense mechanisms to fix the problem at that later stage. The point your colleague IT leaders are driving home is about users in their organizations that are having access to plenty of cloud applications. This is the access of public, private corporate, legitimate, and non-legitimate, companies' or private applications.
The IT leaders are facing challenges in monitoring and governance of these cloud applications. The challenges include the ability to detect the number of users that connect to the cloud proxy as well as authentication of the connections. The process of users' validation as they access the cloud application is complicated and requires to be analyzed to make the validation process clear and straight forward. The inspection of uploaded documents exercise is complicated and hence, a challenge to the system as it helps in checking for sensitive materials. The encryption of documents is a critical challenge depending on the sensitivity of the document being processed. The classification of content in the cloud applications and emails sent to the users confirming the reception of documents is among the complications facing the adoption of cloud applications. Other complications in cloud applications adoption include the telemetry of endpoint activities and threat inspection performed on email content, among others.
Businesses such as that of your nature can protect themselves from these sophisticated threats through four ways to remain secure about cloud applications and services. These steps include the discovery of rogue web use and analyzing the threat. The security teams, in this case, will require tools that enable them to view and understand the risk of employees' use of cloud applications. They should then the users that pose a threat to the system as well as identify the unknown users. The security team should get access to cloud applications under control. The access to the cloud applications must be managed and user permissions restricted to the job rules to maximize control of the access to the system. The team should decide on whether to prevent all the attacks or to detect as they respond concurrently. Your organization should choose between identifying unknown malware or monitoring and detecting of all security breaches. By gathering and analyzing a wide range of cloud activity enables the organization to find activities that pose the greatest harm to the system and quickly act in response. Leveraging the cloud applications develops an array of risks anew as a result of good old-fashioned diligence. Organizations should analyze these risks and determine possible actions to be taken when starting from scratch or migrating to the cloud.
In this regard, our approach to offer solutions to these challenges as the Symantec is practical. We intend to deliver protection in the cloud generation by connecting the links between complications surrounding the cloud applications. We are to adopt and use these relationships and the termination points to recommend and apply the relevant solutions to the discovered challenges. We have been doing this for the last couple of years already via API, and I can give you a practical example to demonstrate our work. Think about a platform that is providing you with a lightweight, single agent, next-generation endpoint protection. The platform being triggered by artificial intelligence can stop unknown malware. While defending, this platform also informs the network about what it missed as well as extends this protection to mobile devices (protection not configuration). Our approach is to provide you with a platform where the backbone is the Integrated Cyber Defense system (ICD).
ICD is a standalone lightweight platform gateway that is unifying product actions. The system gives the best breed protection across networks, endpoints, as well as applications and clouds. If these Security products that you are using are from Symantec or other vendors we don't care, the ICD platform will work irrespective of the source of purchase. However, if you decide to apply a multivendor strategy, it might not work as efficiently as purchasing from a single source. We allow you to be flexible but considerate not to mix incompatible devices. You can still switch to the single point technology but still have all the advantage of the platform in terms of deeper visibility into your infrastructure. It's not only providing product actions but also solutions via the ICDX structures. It unifies telemetry from all the Security Vendors, from all the point products that you are using because you are not using only Symantec, right?
Think about providing unified telemetry to your Security Operations or Analytics or Incident Response Team. This should help you to find out what is going on in your infrastructure using an automated system. With ICD, we can provide technical services that enable you to combine all these control points as well as make things better than in the past. We deliver services such as advanced threat prevention, information protection, as well as data analytics. The Cyber Defense Platform that we offer connects all the dots irrespective of the source of the products being used. This gives you as our customers the freedom to buy products from Symantec or other Vendors who can also take part in advancing the development of the platform. Using this integrated platform that brings together all the telemetry from endpoints, email, network, or a cloud in your infrastructure, it will enhance your time management. The platform will simplify your Splunk or Service compared to doing all the correlation manually and enables you to allocate the available IT resources to other projects. This will enhance visibility and security across your working environment.
This is the way we are solving these challenges, hearing you, and understanding you. The ICD platform is what we have built for you. Find all of your solutions using the ICD platform. Leave the manual correlation of data, and digitize your systems by the use of our ICD platform. By listening to the instances of IT Leaders working in the manufacturing space, we have gathered significant information on the challenges as well as governance of the cloud applications. Now let me ask you if those challenges are relevant to you as well? If this is reasoning to you, what would be a right slot for you when setting up a dedicated session with one of my colleague's engineer to discuss further? What topics are you willing to look into a closer? What should other people in your organization you think being involved in the conversation? How does your calendar look next Tuesday or Thursday morning for us to schedule a face-to-face meeting to discuss your goals and challenges and share any value and insight that we have to offer?
Cite this page
Good Morning, Mr. Mario & Luigi-30min. ICD Pitch from Symantec. (2023, Jan 18). Retrieved from https://proessays.net/essays/good-morning-mr-mario-luigi-30min-icd-pitch-from-symantec
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Relationships of Feedback Loops and Information Systems Essay
- Should the Use Of Drones Be Banned? Essay Example
- Digital Culture Transformation Paper Example
- Paper Example on Essential Role of Information in Clarifying Existing Problems
- NMR Spectroscopy: Introduction to Spin, Energy Levels and Radiation Absorption - Essay Sample
- Strategies and Steps in Database Security - Paper Example
- US Iran Tensions - Report Sample