Intel and Symantec: Improving performance, security, manageability and data protection

Size: px
Start display at page:

Download "Intel and Symantec: Improving performance, security, manageability and data protection"

Transcription

1 Intel and Symantec: Improving performance, security, manageability and data protection Terry Cutler Enterprise Solution Architect Omid Meshkin Strategic Business Development 1

2 Session Objectives By the end of this session you will be: Educated on the value of Intel silicon combined with Symantec Promoting the improved performance, security, manageability, and data protection enable via Intel and Symantec collaboration Eager to see the Intel showcase demonstrations 2

3 Where were Intel and Symantec Collaborating 2-3 years ago? Security Manageability Symantec Client Management Suite + Intel vpro Technology Information Management Consumer Other Programs This presentation will summarize many of the futures that now exist 3 3

4 Who is currently using or considering Symantec appliances? 4

5 Symantec Appliances Powered by Intel A new and fast growing generation of industry leading appliances for backup and security NetBackup BackupExec SSIM Strong collaboration for hardware & software differentiation Scalable architecture to meet customer needs Optimized for energy efficiency Business-critical Reliability, Availability, and Serviceability (RAS) Flexibility and scalability through Intel Integrated RAID and Intel SSDs

6 BackupExec 3600 R2 Appliance SAS Disk TB RAID 5 (Data Store) SSD Disk 2 x 80 GB RAID 1 (Windows ) CPU - Quad core Intel Xeon 2.4 GHz, 8MB cache Memory - 16 GB DDR3 1333, ECC USB - 4x USB 2.0 Ports Ethernet - 3x 1GB Ports Tape Out - SAS Port Software - Backup Exec 2012, Critical System Protection, Windows 2008 R2 Backup Exec 3600 R2 Appliance 6

7 Intel AppUp SM Small Business Service Built on the Intel Hybrid Cloud Platform SMB Intel AppUp SM Small Business Service Catalog Service Provider Break Fix Help Desk Cloud Backup Intel Hybrid Cloud Server Manager Secure Usage Monitoring Remote Mgmt Web Portal Intel Hybrid Cloud Server Reference Design Multiple Xeon based hardware options with Intel VT, TXT, AMT technologies SMB Benefits: Pay-as-you-go Software Cloud access to Software Catalog Data onsite, no capex MSP/ISV Benefits: Convert to subscription model Immediate On-Line Software Catalog Create your own offers Pre-configured, remotely managed OEM Benefits: Grow SMB sales with Hybrid Cloud appliance

8 How is Symantec integrating Intel Client Computing Technologies? 8

9 Announcing Ultrabook Ultrabook for Business extends current content creation capabilities with optimized mobile experiences without compromising security and manageability Ultra-Light. Ultra-Sleek. Ultra-Powerful. Business User Requirements Responsiveness User Interface(s) Mobility Form Factor Device Like Experience Ultrabook for Business IT Decision Maker Requirements Reliability Stability Security Manageability Business-Level Performance Intel vpro and Intel Small Business Advantage Full PC Functionality and Enterprise-Class Security in an Ultra-mobile Package only from Intel Ultrabook is a trademark of Intel Corporation in the U.S. and/or other countries

10 2012 Intel vpro Technology Platform Security Focus Points Threat Management Identity and Access Data Protection Security Monitoring Remediation Reporting Defending you against hidden Trojans and more Access to your systems and services is more secure Protect your valuable data and assets from theft or loss Quickly recover from an attack Only Intel Core vpro Processor offers these Unique Security Capabilities

11 Intel and Symantec product collaborations available today Holistic Approach to Securing and Managing the Client Threat Management Identity & Access Data Protection Intel Trusted Execution Technology (Intel TXT) Intel Virtualization Technology (Intel VT) Intel Operating System Guard (Intel OS Guard) Intel Identity Protection Technology (Intel IPT) with Public Key Infrastructure (PKI) Intel Identity Protection Technology with protected transaction display Intel Identity Protection Technology with Onetime Password Remote Encryption Management Intel Anti-Theft Technology (Intel AT) Intel Advanced Encryption Standard New Instructions (Intel AES-NI) Intel Secure Key Security Monitoring / Remediation/ Reporting Intel Active Management Technology (Intel AMT) Enhanced KVM

12 Who is using drive encryption today? 12

13 Intel AES-NI Technology Keep Data Safer and End-users More Productive Intel AES-NI Helps Speed Data Protection Accelerate Encryption Operations Whole-disk Encryption Internet Security File Storage Encryption Sample of Enabled Vendors i (desktop) i5-2520m (laptop) Up to 4x faster encryption E6550 (desktop) T7250 (laptop) PGP Whole Disk Encryption Enabled with AES-NI Today 13

14 Introducing Intel Secure Key in 2012 Platforms Digital Random Number Generator for more robust encryption High Quality With a high-quality, high-volume Entropy Source, resulting random numbers are at its highest quality (i.e. highly unpredictable). Standards compliant (NIST SP ) and NIST FIPS Level 2 certified. High Performance Faster than any other entropy source today. Easy Access RdRand instruction available to all applications and at any privilege level. Secure HW module implementation isolates Entropy Source and DRBG from attacks. To be included in future Symantec products High Performance, High Availability, and High Quality Cryptography 14

15 Using hardware tokens, smart cards, VeriSign VIP, or VeriSign MPKI? 15

16 Intel Identity Protection Technology One Time Password (OTP) Intel IPT provides a simple way for Web-sites and enterprises to validate that a user is logging in from a trusted PC. Embedded tokens work with all Symantec VIP Protected websites Who does this help? End users by adding security that is easy to use Web Sites, to protect their users accounts, and limit losses Enterprises who want more secure methods for employees to remotely log in, but don t want the hassles of tracking physical tokens or lowered security due to software tokens Traditional hardware token Supported Platforms? Introduced in 2011 with 2nd generation Intel Core processor-based PCs Intel IPT is embedded in the Intel Management Engine (ME) isolated from the OS The one time code is validated by a third party security ISV used by the websites or enterprises Now embedded into your PC 16

17 OTP Enterprise Deployment Use Case Enterprise OTP Generated by Intel IPT 17

18 Introducing Intel Identity Protection Technology with Public Key Infrastructure (PKI) in Validate legitimate user Digital Signature Embedded Public Key Infrastructure (PKI) Private key generated and secured locally Used for authentication and encryption Lower cost versus smart cards Easier usability More secure than software-only solution Integrated with secure I/O Available on the Intel Core vpro processor family in 2012

19 Intel Identity Protection Technology with PKI and Protected Transaction Display in 2012 In addition to the embedded private key, a secure PIN pad entry required for two-factor authentication. Protected Transaction Display window, not visible to SW Now embedded into your PC Come See the Demonstration in the Intel Showcase Attend Session SS B03, 1pm, Room 112 IPT-PKI= Platform Embedded Asymmetrical Token.

20 Intel Identity Protection Technologies OTP Ultrabook or vpro OTP: Username Password Protected Transaction Display (PTD) Ultrabook or vpro Password Entry Token Server One-Time Password token built in to chipset enabling frictionless 2-factor user authentication for website and secure VPN access. Server Protects PC display from malware scraping and proves human presence at PC. PKI - vpro only Digital Certificate Server IPT with PKI* uses PKI certificates to authenticate User and Server to each other and to encrypt and sign documents. Symantec Enabled on IPT-OTP, IPT-PKI, and IPT-PTD Ultrabook is a trademark of Intel Corporation in the U.S. and/or other countries

21 Using Symantec s Altiris Client Management Suite (CMS) today? 21

22 Managing In-Band and Out-of-Band A Well Managed Client is a Secure Client In-Band Management Operating System Deployment Software Updates and Fixes Inventory and Data Collection Remote Desktop and Diagnostics Out-of-Band Management Control of system power state Integrated IP-KVM Control boot source Hardware based alerts 22

23 How does Intel AMT Work? Resides between the network interface and the OS Out-of-band Management traffic is handled directly by Intel AMT itself Intel AMT communications below OS Intel vpro Technology Client Management Engine Intel AMT Operating System Network Interface Network Chipset Come See the Demonstration in the Intel Showcase * A component of Intel vpro Technology, Intel Active Management Technology (AMT) enables Out-of-Band Management

24 Intel Active Management Technology Recovery and Enhanced Patching IT Help Desk Beyond the operating system management Intel Core vpro Processor Intel Chipset Beyond the operating system event New Features since 2010 Enhanced KVM Remote Control Host Based Configuration Intel Setup and Config Software v8 vpro PowerShell Module Intel Use Case Reference Designs Business Employees Intel Network Adapter Remote diagnose, isolate, and repair PCs even if they are unresponsive

25 What Intel Client platform has all of these features? 25

26 Intel Security Capabilities by Platform Entry-level computing Smart performance Built for Business, Engineered for Security Intel IPT with OTP Intel IPT with protected transaction Display* Only on Ultrabook or vpro Intel IPT with PKI* Intel AES-NI Intel Secure Key* Intel Anti-Theft Technology Remote KVM Intel AMT Intel vpro Technology platforms include all security and management technologies *Requires 3 rd Generation Intel Core platform Ultrabook is a trademark of Intel Corporation in the U.S. and/or other countries

27 Ready to learn more about Intel and Symantec collaborations? 27

28 Today: Symantec & Intel Collaboration Security Intel IPT & UserAuth (VIP) Intel PKI & Managed PKI Intel Protected Transaction Display & Managed PKI Intel AES-NI + Encryption Intel Secure Key + Encryption SSIM Appliance Hybrid Cloud Appliance (SEP) Manageability Symantec Client Management Suite + Intel vpro Technology Intel Small Business Advantage and Norton Suite Information Management NetBackup Appliances BackupExec Appliance BackupExec Channel Program Hybrid Cloud Appliance (BE) Consumer Intel Anti-Theft + Norton Intel AppUp + Norton PC Tools Norton AV Channel Bundle Other Programs Healthcare Initiative Medical Device (Altiris, CSP) Server Innovations Storage Innovations Growing Portfolio for Enhance Solution Value

29 Have the Session Objectives been met? By the end of this session you will be: Educated on the value of Intel silicon combined with Symantec Promoting the improved performance, security, manageability, and data protection enable via Intel and Symantec collaboration Eager to see the Intel showcase demonstrations 29

30 Thank you! Copyright 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 30

31 Intel Core vpro Processors with Intel Anti-Theft Technology¹ Protects PCs 1 Local intelligence on PC detects potential theft and triggers action or PC is disabled via poison pill sent over Internet IT Help Desk 3 PC can be easily reactivated via a local password or servergenerated code 2 PC shows customized message and remains disabled even if OS is re-installed Hardware-based Security to Help Protect Your PC and Data When it is Lost of Stolen 1 Intel Anti-Theft Technology requires the computer system to have an Intel AT-enabled chipset, BIOS, firmware release, software, and an Intel AT-capable Service Provider/ISV application and service subscription. 31

Lenovo ThinkCentre M90z with Intel vpro Technology. Stefan Richards Intel Corporation Business Client Platform Division

Lenovo ThinkCentre M90z with Intel vpro Technology. Stefan Richards Intel Corporation Business Client Platform Division Lenovo ThinkCentre M90z with Intel vpro Technology Stefan Richards Intel Corporation Business Client Platform Division stefan.n.richards@intel.com 1 Legal Information 1. INFORMATION IN THIS DOCUMENT IS

More information

A Peek at the Future Intel s Technology Roadmap. Jesse Treger Datacenter Strategic Planning October/November 2012

A Peek at the Future Intel s Technology Roadmap. Jesse Treger Datacenter Strategic Planning October/November 2012 A Peek at the Future Intel s Technology Roadmap Jesse Treger Datacenter Strategic Planning October/November 2012 Intel's Vision This decade we will create and extend computing technology to connect and

More information

Backup Appliances. Geir Aasarmoen og Kåre Juvkam

Backup Appliances. Geir Aasarmoen og Kåre Juvkam Backup Appliances Geir Aasarmoen og Kåre Juvkam Agenda 1 Why Backup Appliance 2 Backup Exec 3600 Appliance 3 NetBackup Appliances Technology Days 2013 2 Traditional Backup Solutions: Complexity Bare Metal

More information

EM L01 Introduction to Mobile

EM L01 Introduction to Mobile EM L01 Introduction to Scott Jareo Principal Field Enablement Mgr. 1 Agenda 1 Welcome and Introduction 2 Overview 3 Lab Exercises 4 Resources and Conclusion 2 Leading Concerns In Enterprise Mobility Discussions

More information

The Business Case to deploy NetBackup Appliances and Deduplication

The Business Case to deploy NetBackup Appliances and Deduplication The Business Case to deploy NetBackup Appliances and Deduplication Noel Winter Appliance Product Lead EMEA Alex Lowe Regional Product Manager EMEA 1 Industry Leading Appliances Powered by Intel Intel Xeon

More information

Mobile Field Worker Security Advocate Series: Customer Conversation Guide. Research by IDC, 2015

Mobile Field Worker Security Advocate Series: Customer Conversation Guide. Research by IDC, 2015 Mobile Field Worker Security Advocate Series: Customer Conversation Guide Research by IDC, 2015 Agenda 1. Security Requirements for Mobile Field Workers 2. Key Mobile Security Challenges Companies Face

More information

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION HID ActivOne USER FRIENDLY STRONG AUTHENTICATION We understand IT security is one of the TOUGHEST business challenges today. HID Global is your trusted partner in the fight against data breach due to misused

More information

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure AXIAD IDS CLOUD SOLUTION Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure Logical Access Use Cases ONE BADGE FOR CONVERGED PHYSICAL AND IT ACCESS Corporate ID badge for physical

More information

Roving Reporter: Ringing Up POS System Sales with Intel vpro Technology

Roving Reporter: Ringing Up POS System Sales with Intel vpro Technology Roving Reporter: Ringing Up POS System Sales with Intel vpro Technology By Mark Scantlebury The market for point-of-sale (POS) machines is extremely competitive, but POS machine designers can get an edge

More information

Fencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1

Fencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1 Fencing the Cloud with Identity Roger Casals Senior Director Product Management Shared vision for the Identity: Fencing the Cloud 1 Disclaimer Copyright 2014 Symantec Corporation. All rights reserved.

More information

PKI is Alive and Well: The Symantec Managed PKI Service

PKI is Alive and Well: The Symantec Managed PKI Service PKI is Alive and Well: The Symantec Managed PKI Service Marty Jost Product Marketing, User Authentication Lance Handorf Technical Enablement, PKI Solutions 1 Agenda 1 2 3 PKI Background: Problems and Solutions

More information

HPE ProLiant ML110 Gen10 Server

HPE ProLiant ML110 Gen10 Server Digital data sheet HPE ProLiant ML110 Gen10 Server ProLiant ML Servers What's new New SMB focused offers regionally released as Smart Buy Express in the U.S. and Canada, Top Value in Europe, and Intelligent

More information

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management June 29, 2011 1 Forward-Looking Statements This presentation

More information

Who s Protecting Your Keys? August 2018

Who s Protecting Your Keys? August 2018 Who s Protecting Your Keys? August 2018 Protecting the most vital data from the core to the cloud to the field Trusted, U.S. based source for cyber security solutions We develop, manufacture, sell and

More information

Data Protection for Cisco HyperFlex with Veeam Availability Suite. Solution Overview Cisco Public

Data Protection for Cisco HyperFlex with Veeam Availability Suite. Solution Overview Cisco Public Data Protection for Cisco HyperFlex with Veeam Availability Suite 1 2017 2017 Cisco Cisco and/or and/or its affiliates. its affiliates. All rights All rights reserved. reserved. Highlights Is Cisco compatible

More information

HPE ProLiant ML350 Gen P 16GB-R E208i-a 8SFF 1x800W RPS Solution Server (P04674-S01)

HPE ProLiant ML350 Gen P 16GB-R E208i-a 8SFF 1x800W RPS Solution Server (P04674-S01) Digital data sheet HPE ProLiant ML350 Gen10 4110 1P 16GB-R E208i-a 8SFF 1x800W RPS Solution Server (P04674-S01) ProLiant ML Servers What's new Support for Intel Xeon Scalable processors full stack. 2600

More information

HPE ProLiant ML110 Gen P 8GB-R S100i 4LFF NHP SATA 350W PS DVD Entry Server/TV (P )

HPE ProLiant ML110 Gen P 8GB-R S100i 4LFF NHP SATA 350W PS DVD Entry Server/TV (P ) Digital data sheet HPE ProLiant ML110 Gen10 3104 1P 8GB-R S100i 4LFF NHP SATA 350W PS DVD Entry Server/TV (P03684-425) ProLiant ML Servers What's new New SMB focused offers regionally released as Smart

More information

HPE ProLiant ML350 Gen10 Server

HPE ProLiant ML350 Gen10 Server Digital data sheet HPE ProLiant ML350 Gen10 Server ProLiant ML Servers What's new Support for Intel Xeon Scalable processors full stack. 2600 MT/s HPE DDR4 SmartMemory RDIMM/LRDIMM offering 8, 16, 32,

More information

Inside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1

Inside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1 Inside Symantec O 3 Sergi Isasi Senior Manager, Product Management SR B30 - Inside Symantec O3 1 Agenda 2 Cloud: Opportunity And Challenge Cloud Private Cloud We should embrace the Cloud to respond to

More information

SnapServer Family (XSD & XSR)

SnapServer Family (XSD & XSR) SnapServer Family (XSD & XSR) Simple, expandable enterprise storage for high-performing resilient environments SnapServer family offers enterprise class unified block and file storage that is workload

More information

white paper SMS Authentication: 10 Things to Know Before You Buy

white paper SMS Authentication: 10 Things to Know Before You Buy white paper SMS Authentication: 10 Things to Know Before You Buy SMS Authentication white paper Introduction Delivering instant remote access is no longer just about remote employees. It s about enabling

More information

Symantec To Acquire VeriSign s Identity and Authentication Business. May 19, 2010

Symantec To Acquire VeriSign s Identity and Authentication Business. May 19, 2010 Symantec To Acquire VeriSign s Identity and Authentication Business May 19, 2010 Forward-Looking Statements This presentation contains forward-looking statements within the meaning of U.S. federal securities

More information

IM-B23: What s New with NetBackup Appliances

IM-B23: What s New with NetBackup Appliances IM-B23: What s New with NetBackup Appliances Scott Anderson, Greg Nuss, Peter Elliman NetBackup Product Management Symantec NetBackup Appliances 1 Disclaimer: This presentations contains information about

More information

Make security part of your client systems refresh

Make security part of your client systems refresh Make security part of your client systems refresh Safeguard your information with Dell Data Security Solutions while boosting productivity and reducing costs Your organization might have many reasons for

More information

Intel, OpenStack, & Trust in the Open Cloud. Intel Introduction

Intel, OpenStack, & Trust in the Open Cloud. Intel Introduction Intel, OpenStack, & Trust in the Open Cloud Intel Introduction 1 Intel enables OpenStack Cloud Deployments 2 Intel Contributions to OpenStack Telemetry (Ceilometer) Object Store (Swift) Erasure Code Metrics

More information

Intel s Architecture for NFV

Intel s Architecture for NFV Intel s Architecture for NFV Evolution from specialized technology to mainstream programming Net Futures 2015 Network applications Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION

More information

MySQL CLOUD SERVICE. Propel Innovation and Time-to-Market

MySQL CLOUD SERVICE. Propel Innovation and Time-to-Market MySQL CLOUD SERVICE Propel Innovation and Time-to-Market The #1 open source database in Oracle. Looking to drive digital transformation initiatives and deliver new modern applications? Oracle MySQL Service

More information

Solution Recipe: Increase Data Protection Using Intel vpro Technology

Solution Recipe: Increase Data Protection Using Intel vpro Technology Solution Recipe: Increase Data Protection Using Intel vpro Technology Preface Intel has developed a series of unique Solution Recipes designed for channel members interested in providing complete solutions

More information

Dissecting NIST Digital Identity Guidelines

Dissecting NIST Digital Identity Guidelines Dissecting NIST 800-63 Digital Identity Guidelines KEY CONSIDERATIONS FOR SELECTING THE RIGHT MULTIFACTOR AUTHENTICATION Embracing Compliance More and more business is being conducted digitally whether

More information

HPE ProLiant DL360 Gen P 16GB-R P408i-a 8SFF 500W PS Performance Server (P06453-B21)

HPE ProLiant DL360 Gen P 16GB-R P408i-a 8SFF 500W PS Performance Server (P06453-B21) Digital data sheet HPE ProLiant DL360 Gen10 4110 1P 16GB-R P408i-a 8SFF 500W PS Performance Server (P06453-B21) ProLiant DL Servers What's new Innovative design with greater flexibility to mix and match

More information

9 GENERATION INTEL CORE DESKTOP PROCESSORS

9 GENERATION INTEL CORE DESKTOP PROCESSORS PRODUCT BRIEF 9 GENERATION INTEL CORE DESKTOP PROCESSORS TH The Most Powerful Generation of Intel Core Processors Introducing the NEW 9th Gen Intel Core desktop processors - the most powerful generation

More information

Mobile Data Security Essentials for Your Changing, Growing Workforce

Mobile Data Security Essentials for Your Changing, Growing Workforce Mobile Data Security Essentials for Your Changing, Growing Workforce White Paper February 2007 CREDANT Technologies Security Solutions White Paper YOUR DYNAMIC MOBILE ENVIRONMENT As the number and diversity

More information

How Symantec Backup solution helps you to recover from disasters?

How Symantec Backup solution helps you to recover from disasters? How Symantec Backup solution helps you to recover from disasters? Finn Henningsen Presales Specialist Technology Days 2011 1 Thank you to our sponsors Technology Days 2011 2 Agenda Why do we bother? Infrastructure

More information

SECURE CLOUD BACKUP AND RECOVERY

SECURE CLOUD BACKUP AND RECOVERY SECURE CLOUD BACKUP AND RECOVERY Learn more about how KeepItSafe can help to reduce costs, save time, and provide compliance for online backup, disaster recovery-as-a-service, mobile data protection, and

More information

The Time Is Now. for Platform Refresh

The Time Is Now. for Platform Refresh The Time Is Now for Platform Refresh The synchronized release of Windows 10 Enterprise and 6th gen Intel Core vpro processors offers a huge opportunity for a better together refresh strategy. There s Never

More information

EM L05 Symantec Mobile Management Managing ios and Android Devices

EM L05 Symantec Mobile Management Managing ios and Android Devices EM L05 Symantec Mobile Managing ios and Android Devices Scott Jareo Principal Field Enablement Mgr. EM L05 SMM Managing ios and Android Devices 1 Kindle Introduction Touch the power button on the bottom

More information

CeBIT Preview January Make the cloud a safer place

CeBIT Preview January Make the cloud a safer place CeBIT Preview 2011 January 2011 Make the cloud a safer place 0 There were times when people thought there was nothing more important than gold Security depends on what you have to protect 1 information

More information

Symantec Reference Architecture for Business Critical Virtualization

Symantec Reference Architecture for Business Critical Virtualization Symantec Reference Architecture for Business Critical Virtualization David Troutt Senior Principal Program Manager 11/6/2012 Symantec Reference Architecture 1 Mission Critical Applications Virtualization

More information

Cisco HyperFlex HX220c Edge M5

Cisco HyperFlex HX220c Edge M5 Data Sheet Cisco HyperFlex HX220c Edge M5 Hyperconvergence engineered on the fifth-generation Cisco UCS platform Rich digital experiences need always-on, local, high-performance computing that is close

More information

IT Boosting Employee & Business Productivity with Innovative Technologies and Solutions Refresh Now

IT Boosting Employee & Business Productivity with Innovative Technologies and Solutions Refresh Now IT Boosting Employee & Business Productivity with Innovative Technologies and Solutions Refresh Now Lawson Lu Site Manager Vietnam August 20, 2013 Legal Notices This presentation is for informational purposes

More information

The Device Has Left the Building

The Device Has Left the Building The Device Has Left the Building Mobile Security Made Easy With Managed PKI Christian Brindley Principal Systems Engineer, Symantec Identity and Information Protection Agenda 1 2 3 Mobile Trends and Use

More information

Symantec Managed PKI. Integration Guide for AirWatch MDM Solution

Symantec Managed PKI. Integration Guide for AirWatch MDM Solution Symantec Managed PKI Integration Guide for AirWatch MDM Solution ii Symantec Managed PKI Integration Guide for AirWatch MDM Solution The software described in this book is furnished under a license agreement

More information

Symantec VIP Quick Start Guide. Helping your users. Version 1.0. Author Maren Peasley Symantec. All rights reserved.

Symantec VIP Quick Start Guide. Helping your users. Version 1.0. Author Maren Peasley Symantec. All rights reserved. Version 1.0 Author Maren Peasley 2017 Symantec. All rights reserved. Table of Contents Introduction... 2 Design and topology considerations... 3 VIP Self-Service Portal: Internal only... 4 VIP Self-Service

More information

Security Enhancements

Security Enhancements OVERVIEW Security Enhancements February 9, 2009 Abstract This paper provides an introduction to the security enhancements in Microsoft Windows 7. Built upon the security foundations of Windows Vista, Windows

More information

Intel vpro Technology: Proven Value in Four Use Cases

Intel vpro Technology: Proven Value in Four Use Cases IT@Intel White Paper Intel IT IT Best Practices Intel vpro Technology March 2013 Intel vpro Technology: Proven Value in Four Use Cases Executive Overview In each use case, Intel vpro technology reduces

More information

Välkommen. Intel Anders Huge

Välkommen. Intel Anders Huge Välkommen Intel Anders Huge Transformative Technology from Intel A n d e r s H u g e I n t e l Why intel INTEL CORPORATION 5 TRANSFORMING BUSINESS MODERN BUSINESS DEMANDS Intel VISION Accelerate workplace

More information

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK KEY BENEFITS AT A GLANCE Ensure your journey to the cloud is secure and convenient, without compromising either. Drive business agility

More information

Altos T310 F3 Specifications

Altos T310 F3 Specifications Product overview The Altos T310 F3 delivers proactive management tools matched by best priceperformance technology ideal for SMB and branch office operations. This singlesocket tower server features an

More information

Authentication Technology for a Smart eid Infrastructure.

Authentication Technology for a Smart eid Infrastructure. Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts

More information

SCHOOL OF PHYSICAL, CHEMICAL AND APPLIED SCIENCES

SCHOOL OF PHYSICAL, CHEMICAL AND APPLIED SCIENCES PONDICHERRY DEPARTMENT UNIVERSITY OF PHYSICS SCHOOL OF PHYSICAL, CHEMICAL AND APPLIED SCIENCES QUOTATION INVITATION FOR THE PURCHASE OF PROCESSOR SERVER Ref: DST Project "Solitons and Modulational Systems"

More information

2008 Intel Core 2 Processor with vpro Technology Launch Keynote

2008 Intel Core 2 Processor with vpro Technology Launch Keynote 2008 Intel Core 2 Processor with vpro Technology Launch Keynote Gregory Bryant Vice President Digital Office Platform Division September 22, 2008 Legal and Trademark Disclaimers 1. Performance based upon

More information

Achieving a FIPS Compliant Wireless Infrastructure using Intel Centrino Mobile Technology Clients

Achieving a FIPS Compliant Wireless Infrastructure using Intel Centrino Mobile Technology Clients Achieving a FIPS Compliant Wireless Infrastructure using Intel Centrino Mobile Technology Clients This document is provided as is with no warranties whatsoever, including any warranty of merchantability,

More information

DELIVERING TRUSTED CLOUDS How Intel and Red Hat integrated solutions for secure cloud computing

DELIVERING TRUSTED CLOUDS How Intel and Red Hat integrated solutions for secure cloud computing DELIVERING TRUSTED CLOUDS How Intel and Red Hat integrated solutions for secure cloud computing Steve Orrin - Federal Chief Technologist, Intel Steve Forage - Senior Director, Cloud Solutions, Red Hat

More information

Technical Session I: Managing Your Data in a Hybrid World

Technical Session I: Managing Your Data in a Hybrid World Technical Session I: Managing Your Data in a Hybrid World March 15, 2018 1 1:30 p.m. #PSVisionDay2018 Produced By: Featured Speakers: Jonathan Alboum Chief Technology Officer, Public Sector, Veritas Copyright

More information

Trusted Computing Today: Benefits and Solutions

Trusted Computing Today: Benefits and Solutions Trusted Computing Today: Benefits and Solutions Brian D. Berger EVP Marketing & Sales Wave Systems Corp. bberger@wavesys.com Copyright 2009 Trusted Computing Group Agenda TCG Vision TCG Benefits Solution

More information

Client virtualization secrets of a savvy IT director

Client virtualization secrets of a savvy IT director Client virtualization secrets of a savvy IT director 2 Your users both local and remote demand unhampered performance and usability, but you need control and security. Learn how one IT director discovered

More information

Cisco HyperFlex HX220c M4 and HX220c M4 All Flash Nodes

Cisco HyperFlex HX220c M4 and HX220c M4 All Flash Nodes Data Sheet Cisco HyperFlex HX220c M4 and HX220c M4 All Flash Nodes Fast and Flexible Hyperconverged Systems You need systems that can adapt to match the speed of your business. Cisco HyperFlex Systems

More information

Backup and Recovery Best Practices

Backup and Recovery Best Practices Backup and Recovery Best Practices Session: 3 Track: ELA Services Skip Farmer Symantec 1 Backup System Infrastructure 2 Isolating Performance Issues 3 Virtual Machine Backups 4 Reporting - Opscenter Analytics

More information

Introducing SUSE Enterprise Storage 5

Introducing SUSE Enterprise Storage 5 Introducing SUSE Enterprise Storage 5 1 SUSE Enterprise Storage 5 SUSE Enterprise Storage 5 is the ideal solution for Compliance, Archive, Backup and Large Data. Customers can simplify and scale the storage

More information

Corente Cloud Services Exchange

Corente Cloud Services Exchange Corente Cloud Services Exchange Oracle s Corente Cloud Services Exchange (Corente CSX) is a cloud-based service that enables distributed enterprises to deliver trusted IPSec VPN connectivity services to

More information

Dell EMC Ready Architectures for VDI

Dell EMC Ready Architectures for VDI Dell EMC Ready Architectures for VDI Designs for Citrix XenDesktop and XenApp for Dell EMC XC Family September 2018 H17388 Deployment Guide Abstract This deployment guide provides instructions for deploying

More information

The Convergence of Management and Security. Stephen Brown, Sr. Product Manager December 2008

The Convergence of Management and Security. Stephen Brown, Sr. Product Manager December 2008 The Convergence of Management and Security Stephen Brown, Sr. Product Manager December 2008 Agenda 1 A Robust Management Foundation 2 The Value of Security and Management Convergence 3 Symantec Endpoint

More information

HUAWEI UMA Full Product Datasheet

HUAWEI UMA Full Product Datasheet HUAWEI UMA Full Product Datasheet HUAWEI UMA Brief Product Datasheet Product Overview HUAWEI Unified Maintenance Audit (UMA) system centrally manages, monitors, and audits operations of all operation and

More information

Intel Active Management Technology Platform Details. Jon Downey Applications Engineering Manager

Intel Active Management Technology Platform Details. Jon Downey Applications Engineering Manager Intel Active Management Technology Platform Details Jon Downey Applications Engineering Manager Objectives This course is intended to meet the following objectives: 1. Provide an overview of the manageability

More information

FIS Global Partners with Asigra To Provide Financial Services Clients with Enhanced Secure Data Protection that Meets Compliance Mandates

FIS Global Partners with Asigra To Provide Financial Services Clients with Enhanced Secure Data Protection that Meets Compliance Mandates Case Study FIS Global Partners with Asigra To Provide Financial Services Clients with Enhanced Secure Data Protection that Meets Compliance Mandates World s largest global provider dedicated to banking

More information

Busting the top 5 myths of cloud-based authentication

Busting the top 5 myths of cloud-based authentication Busting the top 5 myths of cloud-based authentication Insert Your Name Jason Hart CISSP CISM Vice President, Cloud Solutions SafeNet, Inc. Insert Your Title Insert Date Overview Cloud benefits Agility

More information

Achieve Easier Device Management at Scale in the Smart World

Achieve Easier Device Management at Scale in the Smart World ImplementatIon GuIde Business Client Client Security & Manageability Achieve Easier Device Management at Scale in the Smart World Discover how you can improve the security and manageability of your estate

More information

Symantec Backup Exec 2012

Symantec Backup Exec 2012 Siedziba spółki: Perceptus sp. z o. o. Ul. Drzewna 30/2A 65-140 Zielona Góra Biuro handlowe ul. Chopina 14A 65-031 Zielona Góra Tel. 68 470 07 70 Fax 68 470 07 79 Email: perceptus@perceptus.pl NIP 929-180-85-78

More information

Enterprise Cloud Computing. Eddie Toh Platform Marketing Manager, APAC Data Centre Group Cisco Summit 2010, Kuala Lumpur

Enterprise Cloud Computing. Eddie Toh Platform Marketing Manager, APAC Data Centre Group Cisco Summit 2010, Kuala Lumpur 1 Enterprise Cloud Computing Eddie Toh Platform Marketing Manager, APAC Data Centre Group Cisco Summit 2010, Kuala Lumpur Agenda 2 Fundamentals of Enterprise Cloud Computing IT & Cloud Computing Requirements

More information

Are You Flirting with Risk?

Are You Flirting with Risk? Are You Flirting with Risk? A Review of RSA Authentication Manager 8.x Platform 1 2 3 RSA AUTHENTICATION Agenda MANAGER 8.0 Password Problem The Ultimate Authentication Engine Market overview {Speaker}

More information

Moser Baer Group 25 years of excellence

Moser Baer Group 25 years of excellence Moser Baer Group 25 years of excellence Introduction to the Moser Baer Group Established in 1983 25 years legacy as India s leading technology manufacturing company 8,000 Employees Rs11,000 Crores in Assets

More information

Symantec and VMWare why 1+1 makes 3

Symantec and VMWare why 1+1 makes 3 Symantec and VMWare why 1+1 makes 3 Finn Henningsen Principal Systems Engineer Peter Schjøtt Principal Systems Engineer Rasmus Rask Eilersen Principal Systems Engineer Symantec and VMWare 1 Tak til vores

More information

Dell EMC Ready System for VDI on XC Series

Dell EMC Ready System for VDI on XC Series Dell EMC Ready System for VDI on XC Series Citrix XenDesktop for Dell EMC XC Series Hyperconverged Appliance March 2018 H16969 Deployment Guide Abstract This deployment guide provides instructions for

More information

DataON and Intel Select Hyper-Converged Infrastructure (HCI) Maximizes IOPS Performance for Windows Server Software-Defined Storage

DataON and Intel Select Hyper-Converged Infrastructure (HCI) Maximizes IOPS Performance for Windows Server Software-Defined Storage Solution Brief DataON and Intel Select Hyper-Converged Infrastructure (HCI) Maximizes IOPS Performance for Windows Server Software-Defined Storage DataON Next-Generation All NVMe SSD Flash-Based Hyper-Converged

More information

Entry-level Intel RAID RS3 Controller Family

Entry-level Intel RAID RS3 Controller Family PRODUCT Brief Entry-Level Intel RAID RS3 Controller Portfolio Entry-level Intel RAID RS3 Controller Family 12Gb/s connectivity and basic data protection RAID matters. Rely on Intel RAID. Cost-effective

More information

GSE/Belux Enterprise Systems Security Meeting

GSE/Belux Enterprise Systems Security Meeting MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. 1 In the news Microsoft Exposes Scope of Botnet Threat By Tony Bradley, October 15, 2010 Microsoft's

More information

KASPERSKY ENDPOINT SECURITY FOR BUSINESS

KASPERSKY ENDPOINT SECURITY FOR BUSINESS KASPERSKY ENDPOINT SECURITY FOR BUSINESS 1 WHAT WE SEE TODAY 325,000 New Endpoint Threats per day Targeted attacks and malware campaigns Threat reports Continued Exploitation of Vulnerabilities in 3rd

More information

Backup and Restore Strategies

Backup and Restore Strategies Backup and Restore Strategies WHITE PAPER How to identify the appropriate life insurance for your data At home, you safeguard against any incident to protect your family, your life, your property everything

More information

Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise

Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise SQL 2008 R2 Enterprise Restrictions 8 CPU 2 TB Ram Use Limit 524 PB Database Size High Availability Options Database Mirroring,

More information

Cisco Network Admission Control (NAC) Solution

Cisco Network Admission Control (NAC) Solution Data Sheet Cisco Network Admission Control (NAC) Solution New: Updated to include the Cisco Secure Network Server (SNS) Cisco Network Admission Control (NAC) solutions allow you to authenticate wired,

More information

egov & PKI By: Alaa Eldin Mahmoud Aly YOUR LOGO

egov & PKI By: Alaa Eldin Mahmoud Aly YOUR LOGO egov & PKI By: Alaa Eldin Mahmoud Aly YOUR LOGO e-government Survey 2014 United Nations Page 2 EGDI: E-Government Development Index National ID & Digital Signature Estonian Prime Minister Andrus Ansip

More information

A Practical Step-by-Step Guide to Managing Cloud Access in your Organization

A Practical Step-by-Step Guide to Managing Cloud Access in your Organization GUIDE BOOK 4 Steps to Cloud Access Management A Practical Step-by-Step Guide to Managing Cloud Access in your Organization Cloud Access Challenges in the Enterprise Cloud apps in the enterprise have become

More information

Technical Brief Veritas Technical Education Services

Technical Brief Veritas Technical Education Services Veritas Desktop and Laptop Option 9.3 The Veritas Desktop and Laptop Option provides automated file protection for Desktops and laptops. Protection is provided regardless of whether the computer is connected

More information

HPE ProLiant DL580 Gen10 Server

HPE ProLiant DL580 Gen10 Server Digital data sheet HPE ProLiant DL580 Gen10 Server ProLiant DL Servers What's new Support for the new Intel Xeon Scalable Gold 6143 and Intel Xeon Scalable Platinum 8165 processors which support core boosting

More information

Symantec NetBackup PureDisk Compatibility Matrix Created August 26, 2010

Symantec NetBackup PureDisk Compatibility Matrix Created August 26, 2010 Symantec NetBackup PureDisk 6.6.1 Compatibility Matrix Created August 26, 2010 Copyright 2010 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Backup Exec are trademarks or registered

More information

NetBackup Appliance Technical Deep Dive

NetBackup Appliance Technical Deep Dive NetBackup Appliance Technical Deep Dive Noel Winter Appliance Product Lead EMEA Alex Lowe Regional Product Manager Symantec Appliances Deep Dive 1 Aspects of the NetBackup appliance we will cover 1 NetBackup

More information

Cisco HyperFlex HX220c M4 and HX220c M4 All Flash Nodes

Cisco HyperFlex HX220c M4 and HX220c M4 All Flash Nodes Data Sheet Cisco HyperFlex HX220c M4 and HX220c M4 All Flash Nodes Fast and Flexible Hyperconverged Systems You need systems that can adapt to match the speed of your business. Cisco HyperFlex Systems

More information

Intel Cluster Ready Allowed Hardware Variances

Intel Cluster Ready Allowed Hardware Variances Intel Cluster Ready Allowed Hardware Variances Solution designs are certified as Intel Cluster Ready with an exact bill of materials for the hardware and the software stack. When instances of the certified

More information

Dell EMC Ready System for VDI on VxRail

Dell EMC Ready System for VDI on VxRail Dell EMC Ready System for VDI on VxRail Citrix XenDesktop for Dell EMC VxRail Hyperconverged Appliance April 2018 H16968.1 Deployment Guide Abstract This deployment guide provides instructions for deploying

More information

Change Log. 05/16/2014 Original release 2014 LENOVO. ALL RIGHTS RESERVED.

Change Log. 05/16/2014 Original release 2014 LENOVO. ALL RIGHTS RESERVED. Change Log Version Change 05/16/2014 Original release 2 Overview Product Features RS140 Technical Summary Operating System Support Mechanicals Front View Mechanicals / HDD Configurations Rear View Under

More information

Future-Proof Your Hardware Investment PRESENTED BY:

Future-Proof Your Hardware Investment PRESENTED BY: Future-Proof Your Hardware Investment PRESENTED BY: F5 Networks Cloud Challenges F5 is not in the business of selling boxes, but in reducing complexity for our customers. Maximum Performance High L4

More information

Cisco HyperFlex HX220c M4 Node

Cisco HyperFlex HX220c M4 Node Data Sheet Cisco HyperFlex HX220c M4 Node A New Generation of Hyperconverged Systems To keep pace with the market, you need systems that support rapid, agile development processes. Cisco HyperFlex Systems

More information

hidglobal.com Still Going Strong SECURITY TOKENS FROM HID GLOBAL

hidglobal.com Still Going Strong SECURITY TOKENS FROM HID GLOBAL Still Going Strong SECURITY TOKENS FROM HID GLOBAL Contents Protecting Identities and sensitive data 03 Defining the Right Approach 05 HID Global Authentication Devices 06 HID Global Authentication Ecosystem

More information

Once all of the features of Intel Active Management Technology (Intel

Once all of the features of Intel Active Management Technology (Intel Chapter11 Connecting and Communicating with Intel Active Management Technology Disconnecting from change does not recapture the past. It loses the future. Kathleen Norris, O Magazine, January 2004 Once

More information

Delivering Windows-based Client-Server Applications Anywhere, On Demand with Presentation Server 4.5

Delivering Windows-based Client-Server Applications Anywhere, On Demand with Presentation Server 4.5 Delivering Windows-based Client-Server Applications Anywhere, On Demand with Presentation Server 4.5 Conrad Lee Enterprise Sales Engineer Hong Kong & Taiwan Delivering Windows Applications (IT Infrastructure

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the

More information

Altos R320 F3 Specifications. Product overview. Product views. Internal view

Altos R320 F3 Specifications. Product overview. Product views. Internal view Product overview The Altos R320 F3 single-socket 1U rack server delivers great performance and enterprise-level scalability in a space-saving design. Proactive management utilities effectively handle SMB

More information

SUPERMICRO, VEXATA AND INTEL ENABLING NEW LEVELS PERFORMANCE AND EFFICIENCY FOR REAL-TIME DATA ANALYTICS FOR SQL DATA WAREHOUSE DEPLOYMENTS

SUPERMICRO, VEXATA AND INTEL ENABLING NEW LEVELS PERFORMANCE AND EFFICIENCY FOR REAL-TIME DATA ANALYTICS FOR SQL DATA WAREHOUSE DEPLOYMENTS TABLE OF CONTENTS 2 THE AGE OF INFORMATION ACCELERATION Vexata Provides the Missing Piece in The Information Acceleration Puzzle The Vexata - Supermicro Partnership 4 CREATING ULTRA HIGH-PERFORMANCE DATA

More information

Partner Information. Integration Overview. Remote Access Integration Architecture

Partner Information. Integration Overview. Remote Access Integration Architecture Partner Information Partner Name Product Name Integration Overview Authentication Methods Supported Client Integration OTP Barracuda Networks Barracuda SSL VPN User Name + Security Code VIP Enterprise

More information

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE OUR ORGANISATION AND SPECIALIST SKILLS Focused on delivery, integration and managed services around Identity and Access Management.

More information