Symantec Discovery. Track hardware/software assets and monitor license compliance throughout a multiplatform IT infrastructure
|
|
- Juniper Hensley
- 5 years ago
- Views:
Transcription
1 Symantec Discovery Track hardware/software assets and monitor license compliance throughout a multiplatform IT infrastructure OVERVIEW Symantec Discovery helps ensure Client Resilience by identifying and tracking all of your organization's hardware and software assets. The more knowledge an organization has about its IT assets, the more control it has over associated costs, purchases, helpdesk support and overall client management. This control then helps organizations keep their IT infrastructures secure, available, and compliant with corporate standards. Effective control of assets includes starting with a comprehensive baseline inventory that includes information about each computer or other network device, a list of all installed software, and the physical location of each device. In order to maintain continued control of network assets, it is also necessary to perform ongoing audits and generate comprehensive reports to understand the state of the infrastructure at any given time. Using Symantec Discovery, an IT organization can fully understand where devices are located and how they re configured, as well as track a complete history of when any changes have taken place. Integrated LANProbe technology uncovers and locates every IP-addressable device on the network, providing a complete and accurate audit every time. Symantec Discovery can be used as an integral piece of many IT related projects including managing an OS upgrade or rollout, enforcing software licensing compliance, negotiating license renewals or equipment contracts, benchmarking existing equipment prior to a hardware refresh, investigating unauthorized or restricted application use, and reporting on IT assets for mergers & acquisitions or bankruptcies. Symantec Discovery works easily with existing lifecycle management processes and tools, helping minimize the total cost of owning and maintaining devices and software licenses. As an essential component of the Symantec LiveState Client Management Suite, it also provides the integral information needed to manage and track client devices wherever they may reside in a production environment. BENEFITS Help Ensure Client Resilience Keep machines secure and available by scanning and identifying malicious applications and file-types that are suspect. Fast, non-invasive auditing of hardware (CPU, memory, disk, etc.) and software (OS with version/service-pack information, commercial products and/or in-house applications) provides accurate information regarding the state of each device. Scheduled and on-demand auditing provides the ability to keep track of ongoing changes throughout an IT infrastructure and helps ensure devices stay compliant with corporate standards. Page 1 of 5
2 Reduce Cost and Effort Decrease software licensing costs by reclaiming or reallocating unused or redundant software licenses based on installation and usage reports. Mitigate the risk of licensing non-compliance, including fines and legal action due to oversubscribing software licenses. Automate manual inventory audits to maintain a more effective and accurate assessment of your IT assets. Simplify & accurately estimate upgrades using a web based costing tool. Stay in Control of Your IT Environment Easily find and track all devices across all network segments to identify all assets including desktops, notebooks, servers, routers, and printers, regardless of how they are connected to the network. Ensure the client agent is reliably delivered to users regardless of operating system, network topology, or connection type leveraging a comprehensive range of agent deployment methods such as automatic delivery over the network, via , or web installation. Eliminate impact to user productivity or network service when performing hardware/software audits. Simple and optimized IP communication enables reliable audits to be performed over highly utilized WANs or low bandwidth connections. FEATURES Auto-discovery Complete discovery of all network devices across multiple locations or operating systems, including desktops, notebooks, servers, routers, and printers. Small client and delta-based reporting provides faster analysis across different connections and enables identification of hardware, without the need to push an agent to every device. Drag-and-drop functionality makes it easy to inventory and track IT assets by geographical location and functional grouping. Location detection Patented LANProbe identifies physical device locations by interrogating all switching and routing devices on the network, VLAN, and subnet environments. Robust asset tracking allows for accurate inventory of mobile computers and assets at remote sites. Page 2 of 5
3 Agent-based inventory management Mirroring of Active Directory user groups and organizational units allows deployment of agents and reporting of audits using a common view of the network. Provides detailed reports of all hardware and software information on network devices, such as processor types, BIOS dates, MAC addresses, disk capacities, available memory slots, software versions and installation dates, file types, data from custom fields and more. Audits defined per device, scheduled or on-demand. Multiplatform Supports a heterogeneous environment including Windows, Linux, UNIX, IBM AIX, and Mac platforms. Asset tracking Easily track and manage leased IT equipment by tracking the serial numbers of VDU monitors ensuring that the right kit is accounted for at all times and returned at the end of the lease. Maintains a comprehensive audit trail by tracking all installations, moves, additions, and changes. Hardware changes are dynamically recognized and reported, allowing IT to have near real-time asset inventory information Alerts can automatically notify administrators when specific changes occur, such as removal of memory or unauthorized software installation. Software license and usage monitoring Software usage auditing provides details regarding which users within your organization use a particular application and how often they use it. Software license compliance reports provide a quick and comprehensive overview of the state of licensing compliance for each device throughout an organization. Comprehensive data analysis, reporting, and graphing Performs PC & network inventory across distributed heterogeneous networks rapidly, silently & continuously to provide a complete, accurate & up-to-date audit. Easily customize audit queries and histories Web access Compliance with US Rehabilitation Act Section 508 legislation, provides web reporting that is designed to help ensure ease of use for those with accessibility needs. Web-based interface offers powerful what if tools & helps managers plan and budget to network changes. By specifying hardware and software pre-requisites, component cost & labor time, Symantec Discovery can display a breakdown of computer age by department or globally, allowing you to examine the skew of manufacturer or device type across the organization and analyze asset usage by manufacturer or product. Easily configure various levels of security access, allow complete anonymous access to any member of staff, or to control by country, department or other organizational unit. Page 3 of 5
4 Dashboard View Provides administrators and other executive stakeholders with a clear graphical view of key systems intelligence. Each Dashboard user can choose from 15 pre-configured reports covering such areas as license compliance, asset availability, project planning and risk management. LAN, WAN, and Internet auditing LANProbe requirements LANProbe operates over an IP network on Ethernet and Token Ring. Physical location is supported on Ethernet networks utilizing managed SNMP-enabled switches only. Network environments TCP/IPv4 A range of deployment methods helps ensure the client agent is reliably delivered to users regardless of operating system, network topology, or connection type. Supported Environments: Symantec Discovery Administration Control Center Microsoft Windows 2000/XP/2003 Server Web Control Center requires Microsoft IE 5.0 or higher Server Operating Systems Microsoft Windows 2000 (Server Versions) Microsoft Windows 2003 (Server Versions) IIS 5 or 6 required for Web Server and secure data transfer Client Operating Systems Windows Platforms Microsoft Windows 95, 98, 2000, 2003, NT and XP Red Hat Linux (Version 7 and above) on Intel Sun Solaris on SPARC (Sun OS version 5.6 and above) HP-UX on PA-RISC (version 11 and above) MAC OSX 10.1, 10.2, 10.3 SUSE Linux 8.0 and above on Intel IBM AIX 5.1 and 5.2 Page 4 of 5
5 More information Visit our Web site To speak with a Product Specialist in the US Call toll-free 1 (800) To speak with a Product Specialist outside the U.S. Symantec has operations in more than 40 countries. For specific country offices and contact numbers, visit our Web site. About Symantec Symantec is the world leader in providing solutions to help individuals and enterprises assure the security, availability, and integrity of their information. Headquartered in Cupertino, Calif., Symantec has operations in more than 40 countries. More information is available at Symantec Corporation World Headquarters Stevens Creek Boulevard Cupertino, CA USA Symantec and the Symantec logo are registered trademarks of Symantec Corporation and/or its subsidiaries in the United States and elsewhere. LiveState and Symantec Discovery are trademarks of Symantec Corporation and/or its subsidiaries in the United States and elsewhere. All other brands and products are trademarks of their respective holder(s) 2005 Symantec Corporation. All rights reserved. 12/ Page 5 of 5
Veritas Volume Replicator Option by Symantec
Veritas Volume Replicator Option by Symantec Data replication for disaster recovery The provides organizations with a world-class foundation for continuous data replication, enabling rapid and reliable
More informationData Sheet: Archiving Altiris Server Management Suite 7.0 Essential server management: Discover, provision, manage, and monitor
Essential server management: Discover, provision, manage, and monitor Overview Complexity with physical and virtual machine proliferation increases the challenges involved in managing servers. Server administrators
More informationVeritas Provisioning Manager
Veritas Provisioning Manager Automated server provisioning, part of the Veritas Server Foundation suite, automates server provisioning and management from physical bare metal discovery and OS installation
More informationSymantec Network Access Control Starter Edition
Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationSymantec Network Access Control Starter Edition
Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access
More informationSymantec Network Access Control Starter Edition
Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationData Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement
Simplified endpoint enforcement Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationVeritas NetBackup 6.5 Clients and Agents
Veritas NetBackup 6.5 Clients and Agents The Veritas NetBackup Platform Next-Generation Data Protection Overview Veritas NetBackup provides a simple yet comprehensive selection of innovative clients and
More informationAltiris Client Management Suite 7.1 from Symantec User Guide
Altiris Client Management Suite 7.1 from Symantec User Guide Altiris Client Management Suite 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and
More informationSymantec Endpoint Protection
The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,
More informationSymantec Multi-tier Protection
Trusted protection from malware and email-bourne threats for multiplatform environments Overview Symantec Multi-tier Protection is designed to safeguard enterprise assets and lower risk by providing unmatched
More informationServer Management Delivering business value from complex application and server environments
Server Management Delivering business value from complex application and server environments Data center complexity multiple operating systems, server and storage platforms, applications, databases, and
More informationData Sheet: Storage Management Veritas Storage Foundation by Symantec Heterogeneous online storage management
Heterogeneous online storage management Overview Veritas Storage Foundation provides a complete solution for heterogeneous online storage management. Based on the industry-leading Veritas Volume Manager
More informationSymantec Business Continuity Solutions for Operational Risk Management
Symantec Business Continuity Solutions for Operational Risk Management Manage key elements of operational risk across your enterprise to keep critical processes running and your business moving forward.
More informationVeritas Storage Foundation for Windows by Symantec
Veritas Storage Foundation for Windows by Symantec Advanced online storage management Veritas Storage Foundation 5.0 for Windows brings advanced online storage management to Microsoft Windows Server environments.
More informationSymantec Network Security 7100 Series
Symantec Network Security 7100 Series Proactive intrusion prevention device protects against known and unknown attacks to secure critical networks transition can be accomplished transparent to any network
More informationVeritas Storage Foundation for Windows by Symantec
Veritas Storage Foundation for Windows by Symantec Advanced online storage management Veritas Storage Foundation 5.1 for Windows brings advanced online storage management to Microsoft Windows Server environments,
More informationSecuring Your Environment with Dell Client Manager and Symantec Endpoint Protection
Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection Altiris, Now Part of Symantec Copyright 2007 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,
More informationData Sheet: High Availability Veritas Cluster Server from Symantec Reduce Application Downtime
Reduce Application Downtime Overview is an industry-leading high availability solution for reducing both planned and unplanned downtime. By monitoring the status of applications and automatically moving
More informationEnabling Cross-Platform File Replication with Data Integrity
Enabling Cross-Platform File Replication with Data Integrity Cross Platform Support Computers on your Local Area Network are discovered automatically, thereby streamlining your installation process. Network
More informationZENworks: Meeting the Top Requirements for Automated Patch Management
Technical White Paper ZENworks ZENworks: Meeting the Top Requirements for Automated Patch Management Table of Contents page Simplifying Patch Management...2 Key Enterprise Patch and Vulnerability Management
More informationVeritas Cluster Server from Symantec
Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overviewview protects your most important applications from planned and unplanned downtime.
More informationVeritas Storage Foundation from Symantec
Simplified, Scalable and Cost-Effective Storage Management Overviewview provides a complete solution for heterogeneous online storage management. Based on the industry-leading Veritas Volume Manager from
More informationVeritas NetBackup and Veritas Enterprise Vault Integration. Now from Symantec
WHITE PAPER: ENTERPRISE SOLUTIONS Veritas NetBackup and Veritas Enterprise Vault Integration Now from Symantec White Paper: Symantec Enterprise Solutions Veritas NetBackup and Veritas Enterprise Vault
More informationAltiris Software Management Solution 7.1 from Symantec User Guide
Altiris Software Management Solution 7.1 from Symantec User Guide Altiris Software Management Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement
More informationIBM Tivoli Directory Server
Build a powerful, security-rich data foundation for enterprise identity management IBM Tivoli Directory Server Highlights Support hundreds of millions of entries by leveraging advanced reliability and
More informationVeritas Enterprise Vault 6.0 What s New
WHITE PAPER: ENTERPRISE SOLUTIONS Veritas Enterprise Vault 6.0 What s New A Review of the Latest Release of Veritas Enterprise Vault Software Now from Symantec White Paper: Symantec Enterprise Solutions
More informationSymantec Client Security. Integrated protection for network and remote clients.
Symantec Client Security Integrated protection for network and remote clients. Complex Internet threats require comprehensive security. Today's complex threats require comprehensive security solutions
More informationSymantec Security Monitoring Services
24x7 real-time security monitoring and protection Protect corporate assets from malicious global threat activity before it impacts your network. Partnering with Symantec skilled and experienced analysts
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationCimTrak Product Brief. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred
DETECT All changes across your IT environment With coverage for your servers, network devices, critical workstations, point of sale systems, and more, CimTrak has your infrastructure covered. CimTrak provides
More informationWHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group
WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.2 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The
More informationEvaluation Program for Symantec Mail Security Appliances
Evaluation Program for Symantec Mail Security Appliances It s never been easier to evaluate industry-leading solutions for securing and optimizing your email and instant messaging services. Now featuring
More informationSymantec Enterprise Support Services Manage IT Risk. Maximize IT Performance.
Symantec Enterprise Support Services Manage IT Risk. Maximize IT Performance. Symantec Global Services Confidence in a connected world. The demands on your IT environment continue to reach new levels.
More informationVeritas CommandCentral Supporting the Virtual Enterprise. April 2009
Veritas CommandCentral Supporting the Virtual Enterprise April 2009 White Paper: Storage Management Veritas CommandCentral Supporting the Virtual Enterprise Contents Executive summary......................................................................................
More informationIT Analytics 7.1 for Altiris IT Management Suite from Symantec
SOLUTION BRIEF: ENDPOINT MANAGEMENT........................................ IT Analytics 7.1 for Altiris IT Management Suite from Symantec Who should read this paper Altiris IT Management Suite from Symantec
More informationIBM Tivoli Network Manager Entry Edition
Increase network performance with real-time discovery, topology visualization and root-cause analysis IBM Highlights Leverage a product tailor-made to manage even the most complex, heterogeneous enterprise
More informationORACLE DATABASE LIFECYCLE MANAGEMENT PACK
ORACLE DATABASE LIFECYCLE MANAGEMENT PACK ORACLE DATABASE LIFECYCLE MANAGEMENT PACK KEY FEATURES Auto Discovery of hosts Inventory tracking and reporting Database provisioning Schema and data change management
More informationData Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview creates a protected endpoint and messaging environment that is secure against today s complex data loss, malware, and spam threats controlling
More informationORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES
ORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES SERVICE, SUPPORT AND EXPERT GUIDANCE FOR THE MIGRATION AND IMPLEMENTATION OF YOUR ORACLE APPLICATIONS ON ORACLE INFRASTRUCTURE
More informationTable Of Contents INTRODUCTION... 6 USER GUIDE Software Installation Installing MSI-based Applications for Users...9
Table Of Contents INTRODUCTION... 6 USER GUIDE... 8 Software Installation... 8 Installing MSI-based Applications for Users...9 Installing EXE-based Applications for Users...10 Installing MSI-based Applications
More informationW H I T E P A P E R : T E C H N I C A L. Enterprise Vault 8.0 Security Model for Microsoft SharePoint Archiving
W H I T E P A P E R : T E C H N I C A L Enterprise Vault 8.0 Security Model for Microsoft SharePoint Archiving Rob Forgione Technical Field Enablement March 2009 White Paper: Symantec Technical Contents
More informationINSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic
Virus Protection & Content Filtering TECHNOLOGY BRIEF Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server Enhanced virus protection for Web and SMTP traffic INSIDE The need
More informationTable of Contents Release Notes 2013/03/25. Introduction in OS Deployment Manager. in Security Manager System Requirements
Release Notes Release Notes 2013/03/25 Table of Contents Introduction... 3 Deployment Manager... 3 New Features in Deployment Manager... 3 Security Manager... 6 New Features in Security Manager... 6 OS
More informationWHITE PAPER: ENTERPRISE SOLUTIONS. Veritas Storage Foundation for Windows Dynamic Multi-pathing Option. Competitive Comparisons
WHITE PAPER: ENTERPRISE SOLUTIONS Veritas Storage Foundation for Windows Competitive Comparisons White Paper: Enterprise Solutions Veritas Storage Foundation for Windows Contents Introduction........................................................................4
More informationOverview: Data Protection Symantec Backup Exec 2010 Agents and Options
Overview Symantec Backup Exec 2010 Agents and Options enhance and extend platform and feature support for Backup Exec environments. Whether you need to protect critical applications, databases, or heterogeneous
More informationDS Series Solutions Integrated Solutions for Secure, Centralized Data Center Management
DS Series Solutions Integrated Solutions for Secure, Centralized Data Center Management DS Series Solutions IT Infrastructure Management Tools to Reduce IT Operational Costs and Increase IT Productivity
More informationSymantec Data Center Transformation
Symantec Data Center Transformation A holistic framework for IT evolution As enterprises become increasingly dependent on information technology, the complexity, cost, and performance of IT environments
More information10.4 infinity Release Notes
10.4 infinity Release Notes 02.06.2014 Copyright Raynet GmbH (Germany, Paderborn HRB 3524). All rights reserved. Complete or partial reproduction, adaptation, or translation without prior written permission
More informationSymantec Multi-tier Protection
Trusted protection from malware and email-borne threats for multiplatform environments Overview safeguards enterprise assets and lowers risk by providing unmatched protection against threats for laptops,
More informationSymantec Data Center Migration Service
Avoid unplanned downtime to critical business applications while controlling your costs and schedule The Symantec Data Center Migration Service helps you manage the risks and complexity of a migration
More informationTivoli Inventory 4.0 Provides A Cross-Platform Automated Solution For Inventory Management
Software Announcement May 1, 2001 Tivoli Inventory 4.0 Provides A Cross-Platform Automated Solution For Inventory Management Overview Challenged by the need to efficiently maintain accurate IT asset information
More informationSymantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX. Version 4.2
Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX Version 4.2 Symantec Enterprise Security Manager IBM DB2 Modules User Guide The software described in this book is furnished
More informationSymantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX. Version 4.6
Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX Version 4.6 Symantec Enterprise Security Manager IBM DB2 Modules User Guide The software described in this book is furnished
More informationSymantec NetBackup PureDisk Compatibility Matrix Created August 26, 2010
Symantec NetBackup PureDisk 6.6.1 Compatibility Matrix Created August 26, 2010 Copyright 2010 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Backup Exec are trademarks or registered
More informationIBM United States Software Announcement , dated November 15, 2011
IBM United States Software Announcement 211-449, dated November 15, 2011 IBM Tivoli Endpoint Manager V8.2, built on BigFix technology, extends operating system platform support and upgrades its capabilities
More informationHuawei Agile Controller. Agile Controller 1
Huawei Agile Controller Agile Controller 1 Agile Controller 1 Product Overview Agile Controller is the latest user- and application-based network resource auto control system offered by Huawei. Following
More informationMcAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks
McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks Key Advantages Stay ahead of zero-day threats, ransomware, and greyware with machine learning and dynamic
More informationOverview: Compliance and Security Management PCI-DSS Control Compliance Suite Overview
PCI DSS stands for Payment Card Industry Data Security Standard. It was developed by the major credit card companies as a guideline to help organizations that process card payments prevent credit card
More informationIBM BigFix Compliance
IBM BigFix Compliance A single solution for managing endpoint security across the organization Highlights Ensure configuration compliance using thousands of out-of-the-box bestpractice policies with automated
More informationIBM Tivoli Risk Manager Provides Protection for the Enterprise through Intrusion and Protection Management
Software Announcement October 15, 2002 Provides Protection for the Enterprise through Intrusion and Protection Management Overview IBM Tivoli Risk Manager is an enterprise risk management solution that
More informationIBM Security. Endpoint Manager- BigFix. Daniel Joksch Security Sales IBM Corporation
IBM Security Endpoint Manager- BigFix Daniel Joksch Security Sales Establish security as an immune system Malware protection Incident and threat management Identity management Device management Data monitoring
More informationSymantec Enterprise Security Manager Modules for IBM DB2 Databases (Windows) User s Guide 3.0. Release for Symantec ESM 6.5.x and 9.
Symantec Enterprise Security Manager Modules for IBM DB2 Databases (Windows) User s Guide 3.0 Release for Symantec ESM 6.5.x and 9.0 for Windows Symantec Enterprise Security Manager Modules for IBM DB2
More informationSymantec Backup Exec 10d for Windows Servers AGENTS & OPTIONS MEDIA SERVER OPTIONS KEY BENEFITS AGENT AND OPTION GROUPS DATASHEET
DATASHEET Symantec Backup Exec 10d for Windows Servers AGENTS & OPTIONS Designed for disk, Symantec Backup Exec TM 10d for Windows Servers is the Gold Standard in Windows data protection. It provides comprehensive,
More informationWhat s New. New and Enhanced Features in NetSupport DNA v4. Welcome Dashboard. Auto Discovery. Platform Support
What s New New and Enhanced Features in NetSupport DNA v4 Welcome to NetSupport DNA version 4, the fresh approach to IT Asset Management. With any new release, the focus is not only on introducing innovative
More informationIBM Tivoli Monitoring for Databases. Release Notes. Version SC
IBM Tivoli Monitoring for Databases Release Notes Version 5.1.1 SC23-4851-00 IBM Tivoli Monitoring for Databases Release Notes Version 5.1.1 SC23-4851-00 Note Before using this information and the product
More informationMcAfee Policy Auditor 6.2.2
Release Notes McAfee Policy Auditor 6.2.2 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel
More informationCisco Network Admission Control (NAC) Solution
Data Sheet Cisco Network Admission Control (NAC) Solution New: Updated to include the Cisco Secure Network Server (SNS) Cisco Network Admission Control (NAC) solutions allow you to authenticate wired,
More informationDiscovering ZENworks 11
ZENworks Take Advantage of One Unified Management Console and Agent with ZENworks 11 Since ZENworks 7 launched in 2006, the Micro Focus ZENworks family of products has provided thousands of businesses
More informationTransforming your IT infrastructure Journey to the Cloud Mike Sladin
Transforming your IT infrastructure Journey to the Cloud Mike Sladin Director, Global Strategic Partners, APJ Symantec Corporation IT Infrastructure Transformation Journey Business Agility IT as a Service
More informationSYMANTEC DATA CENTER SECURITY
SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information
More informationArcExplorer -- Java Edition 9.0 System Requirements
ArcExplorer -- Java Edition 9.0 System Requirements This PDF contains system requirements information, including hardware requirements, best performance configurations, and limitations, for ArcExplorer
More informationCisco Data Center Network Manager 5.1
Cisco Data Center Network Manager 5.1 Product Overview Modern data centers are becoming increasingly large and complex. New technology architectures such as cloud computing and virtualization are adding
More informationSymantec Backup Exec 11d for Windows Servers Options/Agents
Symantec Backup Exec 11d for Windows Servers Options/Agents Overview Symantec Backup Exec 11d for Windows Servers is the trusted, proven and comprehensive Windows data protection and recovery solution,
More informationDell helps you simplify IT
Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending
More informationCompatibility matrix: HP Service Manager Software version 7.00
Compatibility matrix: HP Service Manager Software version 7.00 Click one of the following links to see more detailed information. Servers Windows Client Web Client Compatibility between Service Manager
More informationNovell ZENworks GETTING STARTED GUIDE. February 11, 2005
Novell ZENworks 6.5 February 11, 2005 GETTING STARTED GUIDE www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and
More informationLANDesk for ThinkVantage Technologies ecosystem now expanded to include enhanced offerings
Lenovo United States Announcement 107-556, dated September 18, 2007 LANDesk for ThinkVantage Technologies ecosystem now expanded to include enhanced offerings Description...2 Prices...7 At a glance New
More informationMcAfee Endpoint Threat Defense and Response Family
Defense and Family Detect zero-day malware, secure patient-zero, and combat advanced attacks The escalating sophistication of cyberthreats requires a new generation of protection for endpoints. Advancing
More informationUsing IBM Tivoli Storage Manager and IBM BRMS to create a comprehensive storage management strategy for your iseries environment
July 2002 Using IBM Tivoli Storage Manager and IBM BRMS to create a comprehensive storage management strategy for your iseries environment 2 Contents 2 Introduction 3 Defining roles 4 BRMS media management
More informationData Sheet: Storage Management Veritas Storage Foundation for Oracle RAC from Symantec Manageability and availability for Oracle RAC databases
Manageability and availability for Oracle RAC databases Overview Veritas Storage Foundation for Oracle RAC from Symantec offers a proven solution to help customers implement and manage highly available
More informationIndustry-leading solutions for transforming data centers into drivers of business value and innovation. Symantec in the Data Center
Industry-leading solutions for transforming data centers into drivers of business value and innovation Symantec in the Data Center 1 In today s wired world, all companies depend on enterprise applications
More informationFEATURES EASILY CREATE AND DEPLOY HIGH QUALITY TCL EXECUTABLES TO ANYONE, ANYWHERE
EASILY CREATE AND DEPLOY HIGH QUALITY TCL EXECUTABLES TO ANYONE, ANYWHERE TCL DEV KIT (TDK) INCLUDES EVERYTHING YOU NEED FOR FAST DEVELOPMENT OF SELF-CONTAINED, EASILY-DEPLOYABLE APPLICATIONS. TURN YOUR
More informationINSIDE. Overview of Intelligent Message Filter Integration. Symantec Enterprise Security
Symantec Enterprise Security WHITE PAPER Overview of Intelligent Message Filter Integration by David Scott Sr. Product Manager Symantec Mail Security Symantec Corporation INSIDE Overview of the IMF Increasing
More informationA Pragmatic Path to Compliance. Jaffa Law
A Pragmatic Path to Compliance Jaffa Law jaffalaw@hk1.ibm.com Introduction & Agenda What are the typical regulatory & corporate governance requirements? What do they imply in terms of adjusting the organization's
More informationSymantec Advanced Threat Protection: Endpoint
Symantec Advanced Threat Protection: Endpoint Data Sheet: Advanced Threat Protection The Problem Virtually all of today's advanced persistent threats leverage endpoint systems in order to infiltrate their
More informationDEPLOYMENT WHITE PAPER.
DEPLOYMENT WHITE PAPER www.seavusprojectviewer.com Deployment Options Seavus Project Viewer provides a wide variety of deployment options: Single User installation is a stand-alone, web downloadable configuration
More informationInventory File Data with Snap Enterprise Data Replicator (Snap EDR)
TECHNICAL OVERVIEW File Data with Snap Enterprise Data Replicator (Snap EDR) Contents 1. Abstract...1 2. Introduction to Snap EDR...1 2.1. Product Architecture...2 3. System Setup and Software Installation...3
More informationSymantec Endpoint Protection
Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec Insight and by SONAR, a single,
More informationSymantec Enterprise Security Manager Modules for Microsoft SQL Server Databases Release Notes. Release 2.1 for Symantec ESM 6.0, 6.1, and 6.5.
Symantec Enterprise Security Manager Modules for Microsoft SQL Server Databases Release Notes Release 2.1 for Symantec ESM 6.0, 6.1, and 6.5.x For Windows 2000, Windows Server 2003, and Windows XP SQL
More informationRemote Expert Installation Service for Symantec Mail Security 8300
Remote Expert Installation Service for Symantec Mail Security 8300 Symantec Mail Security 8300 appliance and Multi-Tier Protection bundle 1. What is REIS? Why should a small business be interested in this
More informationSymantec Backup Exec 2012
Siedziba spółki: Perceptus sp. z o. o. Ul. Drzewna 30/2A 65-140 Zielona Góra Biuro handlowe ul. Chopina 14A 65-031 Zielona Góra Tel. 68 470 07 70 Fax 68 470 07 79 Email: perceptus@perceptus.pl NIP 929-180-85-78
More informationCompatibility matrix: ServiceCenter 6.2
Compatibility matrix: ServiceCenter 6.2 Click one of the following links to see more detailed information. Architecture diagram Servers Windows Client Web Client Compatibility between ServiceCenter clients
More informationAudit Table of Contents:
Table of Contents: Collect Data View Group Data View Individual Data Protection 2 Chapter 3 - Sadjadi et al. Introduction Comprehensive accurate understanding of the configuration of every managed machine
More informationVeritas Storage Foundation for Windows by Symantec
Veritas Storage Foundation for Windows by Symantec Advanced online storage management Data Sheet: Storage Management Overview Veritas Storage Foundation 6.0 for Windows brings advanced online storage management
More informationForescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2
Forescout Version 1.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191
More informationEnterprise Vault 8.0 Security Model for Lotus Domino Archiving. Rob Forgione Technical Field Enablement March 2009
W H I T E P A P E R : T E C H N I C A L Enterprise Vault 8.0 Security Model for Lotus Domino Archiving Rob Forgione Technical Field Enablement March 2009 White Paper: Symantec Technical Contents Purpose...
More informationHP Storage Software Solutions
HP Storage Software Solutions SRM Focus: HP Storage Essentials Ali Mustakim Enterprise Storage Consultant 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change
More informationRational Performance Tester, Version 7.0
Rational Performance Tester, Version 7.0 Installation Guide GI11-6754-00 Rational Performance Tester, Version 7.0 Installation Guide GI11-6754-00 Note Before using this information and the product it
More informationN300 Wireless Router with USB
Performance & Use N300 WiFi speed Faster downloads & Internet gaming ReadySHARE USB Wirelessly access & share USB storage Parental Controls keep your Internet experience safe NETGEAR genie App Home networking
More information