Everyone is talking about “Digital Transformation” and the journey that organizations and individuals are taking as we all cope with the instantaneous move to conducting business digitally in a Covid world. Organizations are migrating more of their business operations to digital. People are working remotely using a range of digital tools. Digital Transformation has gone into overdrive.
Digital Transformation is complex and can be very costly. Enter SASE (pronounced “Sassy”) or Secure Access Service Edge. In a previous blog post, Rees Johnson explains what SASE is and why it’s important in any digital transformation. With a SASE architecture, companies can:
- Optimize user experiences
- Migrate to the cloud without complication
- Enable a productive remove workforce
Sounds easy, right? Not always. To achieve SASE, organizations need to integrate their security stack which allows:
- Enabling the sharing of threat data
- Closing protection gaps across vendor and product silos
- Deploying end-to-end security orchestration, automation, and remediation
Who Does the Heavy Lifting?
Integrating and streamlining your security stack is a tall order, but it has a lot of benefits, including better security, lower operational costs, and fewer vendors to manage. Yet, the work involved in integrating various products, so they all work together seamlessly, is a heavy lift. That’s why Symantec follows a strategy of Integrated Cyber Defense (ICD). We integrate security products—Symantec’s and third-party products—so you don’t have to.
By “integrations” we mean integrating capabilities across the security stack so the integrated solutions can have deeper context and streamlined processes. These capabilities run under native APIs and are tested together as a single solution. The value you get from these integrated capabilities is not just feature-rich security but speed, simplicity, streamlined operations, and ultimately lower costs.
The Whole is Greater
As Aristotle once said, “The whole is greater than the sum of its parts”. That’s the idea behind Integrated Cyber Defense. Not only do we integrate products, so they work seamlessly, but the integration brings new value—new features or extension of features—to your security posture.
Symantec has integrated a lot of security products that bring incredible value to our customers. In this blog, we’ll focus on the capabilities of the Symantec ICD platform that help your digital transformation—specifically those that help manage remote workers.
We integrate security products—Symantec’s and third-party products—so you don’t have to.
Imagine this scenario: your employees are working remotely, and they are using their devices to access your network and its connected resources and services like:
- Internal corporate resources and company applications
- Cloud applications—both sanctioned and unsanctioned
- Navigating to key websites (and some non-business, possibly uncategorized ones too)
- Sending and receiving email from corporate accounts, and personal accounts
All of these activities are potential attack vectors that could be exploited by malicious actors. Below are the top 5 integrations that help protect users and the corporate data they are accessing while performing these kinds of daily activities.
Top 5 Symantec Integrated Capabilities that Accelerate Digital Transformation
#5: Secure Access Cloud with VIP
Your remote employees are increasingly accessing your organization’s applications from their home networks. You can set up multi-factor authentication in Symantec’s Secure Access Cloud product, which leverages Symantec VIP. This allows you to authenticate users before providing access to any of those applications. No coding or maintenance is required on your end.
#4: Cloud Access Security Broker (CASB) with Secure Access Cloud
As your employees work from home, they are using multiple hosted applications (either in public or private data centers), and they could be working from just about anywhere in the world. The integration of CASB with Secure Access Cloud gives Secure Access Cloud the ability to enforce DLP policies for managed devices, regardless of the user, application or location of either.
#3: Cloud Access Security Broker (CASB) with Endpoint Security
Remote employees are accessing your organization’s network through a variety of devices and operating systems. They are also accessing whatever apps they need to get the job done—whether you have sanctioned them or not. The integration of CASB with Symantec Endpoint Security gives you visibility into unsanctioned apps being used on all workstations, tablets, and mobile phones across a variety of operating systems. This integration comes alive whether you’ve deployed our on-premises Endpoint Protection (SEP) or our latest release of Symantec Endpoint Security Complete.
#2: Data Loss Prevention (DLP) with Email Security.cloud
With so many employees accessing company email through Office 365, Gmail, and Exchange, it’s crucial for organizations to protect sensitive data in the cloud against breaches, spear phishing, malware, and spam. The integration of Symantec DLP with Email Security.cloud stops data loss through email—whether it’s accidental, negligent, or malicious. The combination of Symantec’s peerless data loss prevention and email security technologies gives you powerful security and compliance controls. The solution extends full, content-aware DLP capabilities to Office 365, Gmail, and Exchange, inspecting outbound email traffic for sensitive content such as personally identifiable information (PII) and intellectual property.
#1: Data Loss Prevention (DLP) with Web Security Service (WSS)
Unsanctioned apps are only the beginning of “Shadow IT” especially when employees, whether well-meaning or not, try to transfer confidential data to the web. Sometimes it’s impossible to know whether data is confidential or not, because it's encrypted. The integration of DLP with WSS stops data transfer to the web, even when traffic is encrypted. This is an important element in keeping your organization’s data protected.
Only a Small Slice of What's Possible
Symantec Integrated Cyber Defense has over 70 integrations across the portfolio that bring you added value as you tackle digital transformation, attempt to discover evolving threats, and adhere to privacy and compliance regulations. We do the heavy lifting so you don’t have to.
We’ll continue this series on key integrations and the value they deliver for you. Next up: Top 5 Integrations that help you uncover evolving threats.
We encourage you to share your thoughts on your favorite social platform.