Computer Associates International etrust Antivirus

Size: px
Start display at page:

Download "Computer Associates International etrust Antivirus"

Transcription

1 Kristen Noakes-Fry Product Report 29 August 2003 Computer Associates International etrust Antivirus Summary etrust Antivirus from Computer Associates employs signature scanning and heuristics across several platforms to detect and cure malicious code on desktops, servers and personal digital assistants (PDAs). Note In March 2003, the InoculateIT brand name was discontinued. etrust Antivirus v7 includes technologies formerly available as etrust InoculateIT, etrust Content Inspection, etrust InoculateIT Groupware (Microsoft Exchange and Lotus Notes/Domino Options), InoculateIT Enterprise Edition and Unicenter TNG Advanced Antivirus Option. Table of Contents Overview Analysis Pricing Competitors Strengths Limitations Insight List Of Tables Table 1: Enhancements: Computer Associates etrust Antivirus v7 Table 2: Enhancements: Computer Associates etrust Antivirus v7 for the Gateway Table 3: Overview: Computer Associates etrust Antivirus Table 4: Features and Functions: CA Antivirus Technology Table 5: Security Features Table 6: Price List: etrust Antivirus Table 7: Competitors Gartner Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice.

2 Corporate Headquarters Computer Associates International, Inc. One Computer Associates Plaza Islandia, NY 11749, U.S.A. Tel: ; Fax: Internet: Overview Computer Associates (CA s) etrust Antivirus v7 accommodates the whole range of antivirus protection across several platforms, including Windows NT/2000/2003 servers; NetWare servers; Windows 9x/Me, 2000 and XP desktops; Microsoft Pocket PC 2002 and PalmOS (free download) on the PDA; and Solaris and Linux platforms. Features include: Protects against in-the-wild viruses, including boot sector, multipartite, macro, script and polymorphic viruses. Protects against malicious Java and ActiveX, including viruses transmitted through and databases on GroupWare systems, such as Microsoft Exchange and Lotus Notes. Adds Zombie scanning to protect Windows machines against denial-of-service attacks. etrust Antivirus etrust Antivirus v7 is part of the Threat Management solution area within the wider etrust brand, which includes: etrust Identity Management etrust Access Management etrust Threat Management etrust Security Command Center The Threat Management solution area protects networks against all forms of malicious attacks, addressing all potential points of entry from Internet gateways to user desktops to PDAs; it covers intrusion detection/prevention, access control, administration, authentication, auditing, certificate validation and PKI: etrust Antivirus etrust Intrusion Detection etrust Policy Compliance etrust Vulnerability Manager 29 August

3 Table 1: Enhancements: Computer Associates etrust Antivirus v7 Web-Based Administration Support for Roaming Users Enhanced Lotus Note/Domino Support Enhanced Microsoft Exchange Support New Gateway Protocol New Platforms on the PDA Web-based administration available from the Windows platform. etrust Antivirus allows the client to configure itself automatically based on location. With the etrust Antivirus console, administrators can create different threat zones for different groups, such as specific departments and dial-up users. Once placed into a pre-defined threat zone, the etrust Antivirus client determines automatically: The preferred signature download server How often to check and download new signatures Which virus engine would be most appropriate etrust Antivirus v7 for Lotus Notes/Domino scans all inbound and outbound messages in real time for malicious attachments, protecting GroupWare server from -borne viruses. Enhancements include customizable warning messages, integration with the etrust Antivirus Log Viewer and support for clusters. Provides additional flexibility and ease of administration. etrust Antivirus v7 for Microsoft Exchange scans all inbound and outbound messages in real time for malicious attachments, protecting the GroupWare server from -borne viruses. Enhancements include integration with the etrust Antivirus Log Viewer and VS API 2.0 support for Exchange 2000 SP1+. Provides ease of administration and the benefits associated with the latest API from Microsoft. Post Office Protocol 3 (POP3) stores and serves s for various client machines not connected to the Internet, holding the s until the user logs in. New PDA support for Microsoft Pocket PC 2002, in addition to the PalmOS free download. New Apache Linux Server edition as part of etrust Antivirus v7 for the Gateway. Table 2: Enhancements: Computer Associates etrust Antivirus v7 for the Gateway Integrates With etrust Audit Improves Mail Delivery Blocks Attachments Quarantines Infected s Improves Signature Updates Through Message Forwarding, provides greater flexibility in enterprisewide antivirus reporting. Multithreaded delivery of enables to be delivered in parallel instead of being queued. Use of key words provides the administrator greater flexibility and control as to what traffic enters the network. When used for perimeter protection, etrust Antivirus enables the intended recipients to follow up on blocked attachments. Can now pull signature updates from the etrust Antivirus Admin Server, ensuring that antivirus protection is current on the gateway. Table 3: Overview: Computer Associates etrust Antivirus Version v7 Date Announced March 2003 Date First Installed 1996 as InocuLAN, 1998 as CA InoculateIT Types of Antivirus Scanning, heuristics, policy-based (behavioral) Technologies Used 29 August

4 Table 3: Overview: Computer Associates etrust Antivirus Operating System Platforms Supported Gateways Supported Certifications Languages Supported Documentation etrust Antivirus v7 PDAs: Microsoft Pocket PC 2002; PalmOS. Desktops: Windows 95, 98, ME, NT 4.0, 2000, XP; Linux; Sun Solaris; and Macintosh. Servers: Windows NT 4.0 Server, Windows 2000 Server, Windows Server 2003, Linux, Sun Solaris and Novell NetWare. Lotus Notes/Domino, Microsoft Exchange. Gateways: Stand-Alone Gateway Simple Mail Transfer Protocol (SMTP) POP3/FTP/HTTP MS-Proxy Server MS-ISA Server Apache Linux Server Check Point FireWall-1 via Content Vectoring Protocol (CVP) Open Platform for Security (OPSEC) ICSA Labs, West Coast Labs Check Mark, Virus Bulletin (VB100 percent), OPSEC, Novell Tested and Approved English, French, German, Spanish, Japanese Table 4: Features and Functions: CA Antivirus Technology Viruses Detected Antivirus Engine Heuristic Engine Scanning Engine Types of Files Scanned Macro Virus Detection Actions Taken When VirusIsDetected Updates for Signatures or Patterns Detects virtually all viruses in the wild, including boot sector, master boot sector, memory resident, file multipartite, macro, stealth and polymorphic viruses. Employs two scanning engines (InoculateIT and Vet). Heuristic virus detection engine employs an advanced rules-based detection method to detect unknown viruses. Remotely configures and scans any etrust Antivirus server or workstation. Scans compressed file archives and Internet downloads, including.zip,.arj and Microsoft compressed files. A Macro Virus Analyzer is CA s proprietary technology to detect and cure macro viruses in Microsoft Office files. etrust Antivirus servers can automatically log off client workstations that attempt to upload an infected file: An Alert Manager notifies security administrators of all critical virus incidents from any server. Software automatically isolates users who attempt to move, copy or save infected files over the network. Free virus signature updates are downloaded automatically from the Internet and distributed to etrust Antivirus servers and clients: Updates are released twice a week or immediately when a new virus alert is issued. An update-holding interval lets the software test downloaded software and signature file updates on specified computers before fully implementing them across the network. 29 August

5 Table 4: Features and Functions: CA Antivirus Technology Technology Used for Updates (for example, push technology and so on) Management Features Logging and Reporting Protection for Clients Protection for Servers Protection for Internet Gateways Protection for Networks and Desktops Protection for PDAs Updated signatures are distributed automatically across the network to all potential points of entry. All systems in the enterprise or workgroup that are protected can be grouped and managed from a central console: Software options can be pre-configured before deployment to multiple machines. Software can be installed remotely on servers and workstations throughout the network. Support for roaming users. Web-based administration. Software lets administrators select from a variety of methods to handle viruses, including copy cure, rename, move, report, delete or purge. Software allows for centralized, policy-based administration of antivirus clients, including the ability to lock down settings. Automatic installation is provided. Virus Scanning Logs identify users associated with each virus event: Centralized log of all virus events, including files checked, viruses found and responses, is stored in a Central Activity Log. Logs may be forwarded to etrust Audit for greater flexibility in antivirus reporting and for integration into etrust Security Command Center. Software extends virus protection to Windows NT/2000, XP, 95/98/ME and Linux: The clients automatically update themselves from the server. Virus protection is also available for Apple Macintosh and PDAs running Pocket PC 2002, and for PalmOS. Software allows scheduled scanning and real-time protection against infection from diskettes, downloaded files and documents. Servers: Windows NT 4.0 Server, Windows 2000 Server, Windows XP Server, Windows 2003 Server, Linux, Sun Solaris and Novell NetWare. Stand-Alone Gateway (SMTP/POP3/FTP/HTTP) MS-Proxy Server (FTP/HTTP) MS-ISA Server (FTP/HTTP/SMTP) Apache Linux Server (FTP/HTTP) Check Point FireWall-1 (via CVP) (FTP/HTTP/SMTP) Windows 95, 98, ME, NT 4.0, 2000, XP, 2003; Linux; Sun Solaris; and Macintosh. Protection for PDAs running Microsoft Pocket PC 2002 and Palm OS (free download). Table 5: Security Features Policy Enforcement Virus Quarantine Prevents the disabling or altering of antivirus settings by locking down client configurations. etrust Antivirus servers can automatically log off client workstations that attempt to upload an infected file. 29 August

6 Table 5: Security Features Virus Source Tracking Digitally Signed Signatures and Binaries Support for Intrusion Detection Systems Integration With etrust Audit Through Message Forwarding Protection Against Malicious Code Virus Protection for Installation and Support Virus-scanning log includes a reference to the client workstation where the infected file originated. Using CA s private key, etrust Antivirus signature updates and runtime models are checked for tampering and spoofing. etrust Intrusion Detection, a complementary product to etrust Antivirus, delivers surveillance, detection of intrusions and attacks, URL blocking, alerting, logging and real-time response. Enables accountability and flexibility in antivirus reporting. etrust Antivirus v7 for the Gateway Protects against viruses of malicious Java Applets and ActiveX controls at the Internet gateway. It scans SMTP, POP3, FTP and HTTP traffic for potential viruses. Lotus Notes/Domino, Microsoft Exchange Provides protection against viruses transmitted through on groupware systems. Provides real-time detection and cure for all attachments. Software lets administrators choose to protect incrementally and to centrally manage the options from any server in the network. Novell Groupwise virus protection is provided by a partner, Beginfinite. Installation The CA Technical Support department has support teams around the world, which includes native speakers of both English and the local-language. Technical support is available by , telephone, online documentation, product release notes and FAQs. Support Both Support and upgrade protection are included in the cost of maintenance. One free year of maintenance is included with the product with a charge for an additional one or two years. Support includes all of the following: 7 24 phone support Free signature updates Guaranteed response within 24 hours of a new virus attack 24 7 support by CA s etrust Threat Analysis and Response Global Emergency Team (TARGET). esupport over the Web is free. System Requirements: Hardware Windows 9x/ME etrust Antivirus has different minimum requirements on each platform. While etrust Antivirus may run on systems with lower specification, the following are recommended minimums. At least 32MB RAM At least 20MB hard drive space Can run effectively on a 133MHz PC No coverage for Macintosh 29 August

7 Table 5: Security Features NetWare NetWare versions (3x, 4x or 5.0) At least 16MB RAM At least 15MB free disk space Windows NT/2000 Windows 2000 with Service Pack 1.; however, Service Pack 6a (NT Service Pack 5minimum). 32MB free disk space (Intel) 133MHz PC System Requirements: Software Desktop (minimum Windows 95/98/Me operating system Windows NT 4.0/2000/XP [OS]) Server (minimum Windows NT 4.0 x86 OS) Windows 2000 Windows Server 2003 NetWare 3.12 Linux (Red Hat, SuSE, Turbo and Caldera) Sun Solaris/SPARC 2.6 and higher Groupware Lotus Notes/Domino R5, releases 4.x, 5.x and 6.0 Microsoft Exchange 2000 SP1+ and Exchange 5.5 service pack 3+. Analysis With the purchase of Cheyenne Software in 1996, CA benefited from Cheyenne s years of experience as a provider of one of the first antivirus solutions as well as one of the first providers of solutions for the LAN environment. Cheyenne s InocuLAN eventually became InoculateIT and, finally, etrust Antivirus. In 2001, CA rebranded the antivirus product as etrust InoculateIT for CA s indirect channel partners and etrust Antivirus for CA s direct sales force. Meanwhile, in 1999, CA acquired Vet Anti-Virus from Cybec, re-packaging the product as the Personal Edition of InoculateIT and, until June 2001, making it available free on the Internet. Streamlining the Antivirus Offerings In March 2003, etrust Antivirus v7 was released for both CA s direct sales force and CA s channel partners and the InoculateIT name was discontinued. etrust Antivirus v7 includes etrust Antivirus Groupware (Microsoft Exchange and Lotus Notes/Domino Options) and etrust Content Inspection, previously sold as separate products. Other technologies included in etrust Antivirus v7 were formerly available as InoculateIT Enterprise Edition, Unicenter TNG Advanced Antivirus Option, etrust Antivirus Groupware, etrust Content Inspection, etrust InoculateIT, InoculateIT, etrust InoculateIT for Linux, etrust InoculateIT for NetWare, etrust InoculateIT for Windows, InoculateIT for Windows Workgroup Edition, etrust InoculateIT Lotus Notes/Domino Option, etrust InoculateIT Microsoft Exchange Option, InoculateIT Advanced Edition, InoculateIT for Palm OS, Inoculan AntiVirus for Windows 95, Inoculan AntiVirus Suite for Microsoft BackOffice, InoculateIT Workgroup Edition, InoculateIT, InoculateIT for Windows Advanced Edition. Two Scanning Engines etrust Antivirus has one brand name, but provides two different scanning engines stemming from two different product acquisitions: 29 August

8 InoculateIT, originally developed by Cheyenne Vet, originally developed by Cybec Although the two scanning engines have two separate development groups within CA, they can be managed together from a single management console. Single-Console Updating etrust Antivirus offers a flexible signature update procedure. The updates are free and are automatically downloaded from the Internet to the corporate server based on an update frequency defined by the network administrator. The network administrator also has the option to choose to examine the updated signature file on a local machine to ensure there are no conflicts with network software. When the signature file is approved, it is automatically disseminated to all other systems on the network down to the desktop. Real-Time Virus Scanning etrust Antivirus uses two primary scanning methods to scan for viruses in real time: The first is a proprietary signature-scanning method which scans for known types of viruses, including polymorphic, multipartite, stealth, script and macro viruses, in addition to worms and Trojans. The second is a heuristics-based scanning to detect unknown viruses. With its use of positive and negative rules, the heuristics engine attempts to keep the number of false positive results to a minimum. The organization can to choose up to three levels at which to scan, with each level varying on the type of scan and the speed at which the scan is performed. These levels can vary from desktop to desktop based on the parameters defined by the network administrator. Fast Scan is the fastest because it scans only the header of the file, determines what the checksum is and opens the file only if it is determined to be virus-free. The Secure Scan level scans every part of the file to detect for viruses. The Reviewer Scan, which is the slowest, adds the entire heuristics rule base to the scanning process before tagging the file virus-free. CA treats etrust Antivirus as an integral part of its entire security strategy and has implemented that philosophy in two ways: First, each of its security products can be managed from a central console; signature file updates can be distributed from a single console. Second, it made the antivirus functionality part of the etrust offering, which includes an integrated portfolio of software to enable security in an e-business environment. Primary Markets CA s primary target for etrust Antivirus is the enterprise market. For these customers, central administration is an important element of CA s etrust strategy. etrust Antivirus provides central administration of your antivirus implementation. In addition, etrust Antivirus also integrates into etrust Security Command Center, which can manage all the security products in an enterprise. 29 August

9 Pricing The list price for etrust Antivirus v7 is the same for direct and channel sales. Table 6: Price List: etrust Antivirus Product Description Price (US$) etrust Antivirus v7 Signature File Updates Sold directly by CA s sales force and by CA s channel partners for the same list price. Automatically downloaded to the corporate servers based on update frequency defined by network administrators. Boxed Product for 5, 10 and 25 users is available. Tiers Licensing prices start at $35 a node for users. Free. Note: For two years ( ), CA offered InoculateIT Personal Edition free of charge. Since that program ended, users may log in to my-etrust.com and pay a nominal charge for etrust EZ Antivirus, which includes software upgrades, virus definition updates and technical support via . GSA Pricing No. Competitors Table 7: Competitors Network Associates McAfee Active Virus Defense McAfeeVirusScan Norton Sophos Anti-Virus Solution Symantec Symantec AntiVirus Trend Micro InterScan VirusWall Protects desktops, servers, GroupWare, Internet servers, wireless and PDA, Internet gateway, and file server. Push channel disseminates virus information, updates and upgrades to the network administrator. Auto update function pre-schedules updates, hourly updates via an Internet download and also CD-ROM and diskette distribution. See Symantec. Sophos focuses solely on the antivirus requirements of networked organizations. The architecture employs a combination of virus scanning and checksumming. Since the architecture is operating system-independent, the product may be delivered on a wide range of networks. Protection for Windows or NetWare environments; plus options for gateway, firewall and groupware antivirus protection. Symantec offers a variety of antivirus products for all layers of the enterprise, from the desktop to file servers, groupware servers and gateways. Symantec has discontinued active use of the brand name Norton. Top-down, server-based approach intercepts viruses and malicious code at the Internet gateway. Optionally supports spam blocking, content filtering and mail traffic management. Other products protect groupware and servers, application servers and desktops. Strengths Wide Range of Protection 29 August

10 Protects against malicious Java and ActiveX code, in addition to antivirus protection support for gateways, and groupware/ servers. Central Security Management Within etrust Products etrust Security Command Center provides event aggregation and correlation, as well as command and control, from a central console for etrust and non-ca products. Worldwide Research and Support To monitor new virus threats around the clock, and to deliver up-to-date virus signature files to the etrust Antivirus installations, CA s etrust TARGET has resources in North America, Europe, the Middle East and Australia. Technical support is available 24 hours a day, 7 days a week, 365 days a year. Limitations Late Market Entry While etrust Antivirus is in version 7 of the product life cycle, the actual product line was a late entry into the antivirus market. By the time CA entered the antivirus market in 1996, products from Symantec and McAfee products from Network Associates were already firmly established. Part of Very Broad Product Portfolio From years of acquisitions, CA has a broad product offering, often including seemingly redundant products. As result, customers are overwhelmed with product options, and a specific tool can be lost in the shuffle. Product quality issues and substandard product support are frequently mentioned by users and may well be symptomatic of CA s broad product portfolio. Insight CA s etrust Antivirus provides antivirus protection for PDAs, desktops, servers, groupware and the gateway, in one product, for one price, and one license, with a very low, long-term total cost of ownership (TCO), making it very attractive to enterprises. Key features are its dual virus scanning engines; superior centralized, policy-based management; a stellar record of detection of virtually all known viruses, macro virus threats, malicious Java, ActiveX and other malicious code; and etrust TARGET (for an immediate response to any new virus or blended threat). 29 August

etrust Antivirus Release 7.1

etrust Antivirus Release 7.1 D A T A S H E E T etrust Antivirus Release 7.1 etrust Antivirus provides superior protection from the perimeter to the PDA against today s most prevalent security threat viruses. It eliminates virus infections,

More information

INSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic

INSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic Virus Protection & Content Filtering TECHNOLOGY BRIEF Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server Enhanced virus protection for Web and SMTP traffic INSIDE The need

More information

CIO Update: Security Platforms Will Transform the Network Security Arena

CIO Update: Security Platforms Will Transform the Network Security Arena IGG-11202002-02 J. Pescatore, M. Easley, R. Stiennon Article 20 November 2002 CIO Update: Security Platforms Will Transform the Network Security Arena An integrated network security platform approach will

More information

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0 Symantec Endpoint Protection Integration Component User's Guide Version 7.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

Computer Associates etrust Antivirus v 7.1

Computer Associates etrust Antivirus v 7.1 Product Advisor Charlotte Dunlap Analyst, Information Security Andrew Braunberg Senior Analyst, Information Security Contents Product Assessment Summary Current Perspective Product Strengths & Weaknesses

More information

Symantec Multi-tier Protection

Symantec Multi-tier Protection Trusted protection from malware and email-bourne threats for multiplatform environments Overview Symantec Multi-tier Protection is designed to safeguard enterprise assets and lower risk by providing unmatched

More information

Exam : Title : symantec small Business security. Version : DEMO

Exam : Title : symantec small Business security. Version : DEMO Exam : 250-101 Title : symantec small Business security Version : DEMO 1. Which heuristic technology does Symantec AntiVirus use? A. Q-Factor B. Bloodhound C. pattern matching D. regular expression 2.

More information

IBM Tivoli Risk Manager Provides Protection for the Enterprise through Intrusion and Protection Management

IBM Tivoli Risk Manager Provides Protection for the Enterprise through Intrusion and Protection Management Software Announcement October 15, 2002 Provides Protection for the Enterprise through Intrusion and Protection Management Overview IBM Tivoli Risk Manager is an enterprise risk management solution that

More information

Nortel Networks Optivity Policy Services

Nortel Networks Optivity Policy Services Sharon Fisher Product Report 7 January 2004 Nortel Networks Optivity Policy Services Summary Optivity Policy Services is system-level software for managing the traffic prioritization and network access

More information

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES CERT-In Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES Department of Information Technology Ministry of Communications and Information Technology Government of India Anti Virus

More information

Symantec Client Security. Integrated protection for network and remote clients.

Symantec Client Security. Integrated protection for network and remote clients. Symantec Client Security Integrated protection for network and remote clients. Complex Internet threats require comprehensive security. Today's complex threats require comprehensive security solutions

More information

Symantec Multi-tier Protection

Symantec Multi-tier Protection Trusted protection from malware and email-borne threats for multiplatform environments Overview safeguards enterprise assets and lowers risk by providing unmatched protection against threats for laptops,

More information

LANDesk for ThinkVantage Technologies ecosystem now expanded to include enhanced offerings

LANDesk for ThinkVantage Technologies ecosystem now expanded to include enhanced offerings Lenovo United States Announcement 107-556, dated September 18, 2007 LANDesk for ThinkVantage Technologies ecosystem now expanded to include enhanced offerings Description...2 Prices...7 At a glance New

More information

How to Test Outbreak Commander

How to Test Outbreak Commander TREND MICRO CONTROL MANAGER TREND MICRO, INC. 10101 N. DE ANZA BLVD. CUPERTINO, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 WWW.TRENDMICRO.COM How to Test Outbreak Commander 2 TREND MICRO CORPORATE

More information

Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator s Guide

Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator s Guide Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator s Guide APPLICATION VERSION: 8.0 Dear User! Thank you for choosing our product. We hope that this document will help you in your work and will provide

More information

PineApp Mail Secure SOLUTION OVERVIEW. David Feldman, CEO

PineApp Mail Secure SOLUTION OVERVIEW. David Feldman, CEO PineApp Mail Secure SOLUTION OVERVIEW David Feldman, CEO PineApp Mail Secure INTRODUCTION ABOUT CYBONET CORE EXPERIENCE PRODUCT LINES FACTS & FIGURES Leader Product Company Servicing Multiple Vertical

More information

Messaging and Collaboration Security Antigen 6.5 for Exchange Miguel Canales Regional Engineering Manager CEUR

Messaging and Collaboration Security Antigen 6.5 for Exchange Miguel Canales Regional Engineering Manager CEUR Messaging and Collaboration Security Antigen 6.5 for Exchange Miguel Canales Regional Engineering Manager CEUR Please visit us at www.sybari.com Sybari Software Sybari s mission is to deliver superior

More information

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.2 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The

More information

Select Q&A, QA A. Hallawell, M. Grey. Anti-spam Architecture Choices. Firewall. Appliance or Licensed Software. SMTP Relay

Select Q&A, QA A. Hallawell, M. Grey. Anti-spam Architecture Choices. Firewall. Appliance or Licensed Software. SMTP Relay Select Q&A, A. Hallawell, M. Grey Research Note 22 September 2003 How to Select Spam-Filtering Products and Services Choose a spam-filtering solution by evaluating anti-spam providers' management, research

More information

Introducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection. Bernard Laroche Endpoint security Product marketing

Introducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection. Bernard Laroche Endpoint security Product marketing Introducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection Bernard Laroche Endpoint security Product marketing Agenda 1 Organizational Risk and Endpoint Challenges 32 Symantec Endpoint

More information

Chapter 8 Operating Systems and Utility Programs

Chapter 8 Operating Systems and Utility Programs Chapter 8 Operating Systems and Utility Programs Chapter 8 Objectives Identify the types of system software Summarize the startup process on a personal computer Summarize the features of several stand-alone

More information

Chapter 9. Firewalls

Chapter 9. Firewalls Chapter 9 Firewalls The Need For Firewalls Internet connectivity is essential Effective means of protecting LANs Inserted between the premises network and the Internet to establish a controlled link however

More information

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim Manager, Client & Partner Services, Asia 1 Agenda 2010 Threats Targeted Attacks Defense Against Targeted Attacks Questions 2

More information

NetDefend Firewall UTM Services

NetDefend Firewall UTM Services NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860/1660/2560/2560G) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content

More information

Configuring Symantec. device

Configuring Symantec. device Configuring Symantec AntiVirus for Hitachi File OS device Configuring Symantec AntiVirus for Hitachi File OS device The software described in this book is furnished under a license agreement and may be

More information

Reviewer s guide. PureMessage for Windows/Exchange Product tour

Reviewer s guide. PureMessage for Windows/Exchange Product tour Reviewer s guide PureMessage for Windows/Exchange Product tour reviewer s guide: sophos nac advanced 2 welcome WELCOME Welcome to the reviewer s guide for NAC Advanced. The guide provides a review of the

More information

Discount Bitdefender Security for SharePoint website for free software ]

Discount Bitdefender Security for SharePoint website for free software ] Discount Bitdefender Security for SharePoint website for free software ] Description: BitDefender Security for SharePoint provides antivirus and antispyware protection for your Microsoft SharePoint Server.

More information

SOLUTION MANAGEMENT GROUP

SOLUTION MANAGEMENT GROUP InterScan Messaging Security Virtual Appliance 8.0 Reviewer s Guide February 2011 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 www.trendmicro.com

More information

Configuring Symantec Protection Engine for Network Attached Storage for Hitachi Unified and NAS Platforms

Configuring Symantec Protection Engine for Network Attached Storage for Hitachi Unified and NAS Platforms Configuring Symantec Protection Engine for Network Attached Storage 7.0.1 for Hitachi Unified and NAS Platforms Configuring Symantec Protection Engine for Network Attached Storage 7.0.1 for Hitachi Unified

More information

LANDesk and Lenovo ThinkVantage Technologies Bundle available for commercial, government, and education customers

LANDesk and Lenovo ThinkVantage Technologies Bundle available for commercial, government, and education customers Lenovo United States Announcement 106-815, dated November 7, 2006 LANDesk and Lenovo ThinkVantage Technologies Bundle available for commercial, government, and education customers Additional information...

More information

Key Features. DATA SHEET

Key Features.  DATA SHEET DATA SHEET Total Defense THREAT MANAGER r12 Overview: Total Defense Threat Manager r12 integrates anti-malware, groupware protection and network access control in one easy-touse solution, providing comprehensive

More information

Worldwide 2002 Security Software Market and Vendor Shares (Executive Summary) Executive Summary

Worldwide 2002 Security Software Market and Vendor Shares (Executive Summary) Executive Summary Worldwide Security Software Market and Vendor Shares (Executive Summary) Executive Summary Publication Date: 21 July 2003 Author Norma Schroder This document has been published to the following Marketplace

More information

NGN: Carriers and Vendors Must Take Security Seriously

NGN: Carriers and Vendors Must Take Security Seriously Research Brief NGN: Carriers and Vendors Must Take Security Seriously Abstract: The next-generation network will need to provide security on many levels. A comprehensive set of standards should be in place

More information

OpenService NerveCenter Event Correlation Network Management

OpenService NerveCenter Event Correlation Network Management John Inverso Product Report 31 July 2003 OpenService NerveCenter Event Correlation Network Management Summary NerveCenter provides network-event correlation and root-cause analysis abilities which its

More information

Symantec Encryption Management Server and Symantec Data Loss Prevention. Integration Guide

Symantec Encryption Management Server and Symantec Data Loss Prevention. Integration Guide Symantec Encryption Management Server and Symantec Data Loss Prevention Integration Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Product Line Guide Corporate Antimalware PLUS Network Visibility PLUS Systems Management

Product Line Guide Corporate Antimalware PLUS Network Visibility PLUS Systems Management Product Line Guide 2011 Corporate Antimalware PLUS Network Visibility PLUS Systems Management IT S YOUR BUSINESS. DEFEND IT. Today s business security solutions need to go beyond basic virus detection

More information

Trend Micro Deep Security

Trend Micro Deep Security Trend Micro Deep Security Endpoint Security Similarities and Differences with Cisco CSA A Trend Micro White Paper May 2010 I. INTRODUCTION Your enterprise invested in Cisco Security Agent (CSA) because

More information

Venusense UTM Introduction

Venusense UTM Introduction Venusense UTM Introduction Featuring comprehensive security capabilities, Venusense Unified Threat Management (UTM) products adopt the industry's most advanced multi-core, multi-thread computing architecture,

More information

Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator's Guide

Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator's Guide Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator's Guide APPLICATION VERSION: 8.0 MAINTENANCE PACK 2 Dear User, Thank you for choosing our product. We hope that this documentation will help you

More information

Configuring Symantec AntiVirus for BlueArc Storage System

Configuring Symantec AntiVirus for BlueArc Storage System Configuring Symantec AntiVirus for BlueArc Storage System Configuring Symantec AntiVirus for BlueArc Storage System The software described in this book is furnished under a license agreement and may be

More information

HP Data Protector Express Backup Server Upgrade from Data Protector Express Single editions of Data Protector

HP Data Protector Express Backup Server Upgrade from Data Protector Express Single editions of Data Protector Overview is backup and recovery software that is easy to install, easy to use, easy to manage and requires no specialist training. It robustly, yet simply, protects single machines or small networks in

More information

GFI product comparison: GFI MailEssentials vs. Barracuda Spam Firewall

GFI product comparison: GFI MailEssentials vs. Barracuda Spam Firewall GFI product comparison: GFI MailEssentials vs. Barracuda Spam Firewall Features GFI MailEssentials Barracuda Spam Firewall Integrates with Microsoft Exchange Server 2007/2010/2013 Scans incoming and outgoing

More information

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview creates a protected endpoint and messaging environment that is secure against today s complex data loss, malware, and spam threats controlling

More information

SaaS Flyer for Trend Micro

SaaS Flyer for Trend Micro SaaS Flyer for Trend Micro Prices Effective July 1, 2008 1 Internet Security 2008 Trend Micro Internet Security 2008 makes it easy to protect your home or small business network, personal identity, and

More information

Sun Mgt Bonus Lab 11: Auto-Tagging in PAN-OS 8.X

Sun Mgt Bonus Lab 11: Auto-Tagging in PAN-OS 8.X 1 Overview Introduced first in PAN-OS 8.0, the Dynamic IP Address and Tag Registration feature makes a significant step forward in the automation of operational, administrative, and, most importantly,

More information

Securing the Modern Data Center with Trend Micro Deep Security

Securing the Modern Data Center with Trend Micro Deep Security Advania Fall Conference Securing the Modern Data Center with Trend Micro Deep Security Okan Kalak, Senior Sales Engineer okan@trendmicro.no Infrastructure change Containers 1011 0100 0010 Serverless Public

More information

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Red Hat Enterprise Linux 5

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Red Hat Enterprise Linux 5 Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark For Red Hat Enterprise Linux 5 Symantec ESM Baseline Policy Manual for CIS Benchmark for Red Hat Enterprise Linux 5 The software

More information

KASPERSKY ENDPOINT SECURITY FOR BUSINESS

KASPERSKY ENDPOINT SECURITY FOR BUSINESS KASPERSKY ENDPOINT SECURITY FOR BUSINESS 1 WHAT WE SEE TODAY 325,000 New Endpoint Threats per day Targeted attacks and malware campaigns Threat reports Continued Exploitation of Vulnerabilities in 3rd

More information

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems ACS-3921/4921-001 Computer Security And Privacy Chapter 9 Firewalls and Intrusion Prevention Systems ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been

More information

Networks with Cisco NAC Appliance primarily benefit from:

Networks with Cisco NAC Appliance primarily benefit from: Cisco NAC Appliance Cisco NAC Appliance (formerly Cisco Clean Access) is an easily deployed Network Admission Control (NAC) product that allows network administrators to authenticate, authorize, evaluate,

More information

Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions

Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions Frequently Asked Questions Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions April 2005 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Internet Security Systems (ISS)

More information

Endpoint Security for DeltaV Systems

Endpoint Security for DeltaV Systems Endpoint Security for DeltaV Systems Decrease risk with intelligent, adaptive scanning Utilize advanced anti-malware protection Identify, remediate and secure your DeltaV system from cybersecurity risks

More information

SIMATIC. Process Control System PCS 7 Symantec Endpoint Protection 11.0 Configuration. Using virus scanners 1. Configuration 2. Commissioning Manual

SIMATIC. Process Control System PCS 7 Symantec Endpoint Protection 11.0 Configuration. Using virus scanners 1. Configuration 2. Commissioning Manual SIMATIC Process Control System PCS 7 Using virus scanners 1 Configuration 2 SIMATIC Process Control System PCS 7 Symantec Endpoint Protection 11.0 Configuration Commissioning Manual 08/2009 A5E02634984-01

More information

Chapter 8 Operating Systems and Utility Programs أ.أمل زهران

Chapter 8 Operating Systems and Utility Programs أ.أمل زهران Chapter 8 Operating Systems and Utility Programs Chapter 8 Objectives Identify the types of system software Summarize the startup process on a personal computer Summarize the features of several stand-alone

More information

Cracked BitDefender SBS Security 2 Years 2000 PCs downloads softwares for pc ]

Cracked BitDefender SBS Security 2 Years 2000 PCs downloads softwares for pc ] Cracked BitDefender SBS Security 2 Years 2000 PCs downloads softwares for pc ] Description: BitDefender SBS Security is a robust and easy to use business security and management solution which delivers

More information

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control. For Microsoft Windows

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control. For Microsoft Windows Client Guide for Symantec Endpoint Protection and Symantec Network Access Control For Microsoft Windows Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described

More information

QuickSpecs. Available Packs and Purchase Information. ProLiant Essentials Vulnerability and Patch Management Pack v2.1. Overview.

QuickSpecs. Available Packs and Purchase Information. ProLiant Essentials Vulnerability and Patch Management Pack v2.1. Overview. Overview Pack (VPM) integrates comprehensive vulnerability assessment and advanced patch management functions for HP and non-hp servers running Windows or Red Hat Linux into HP Systems Insight Manager,

More information

Cisco s Appliance-based Content Security: IronPort and Web Security

Cisco s Appliance-based Content Security: IronPort  and Web Security Cisco s Appliance-based Content Security: IronPort E-mail and Web Security Hrvoje Dogan Consulting Systems Engineer, Security, Emerging Markets East 2010 Cisco and/or its affiliates. All rights reserved.

More information

COMPUTER NETWORK SECURITY

COMPUTER NETWORK SECURITY COMPUTER NETWORK SECURITY Prof. Dr. Hasan Hüseyin BALIK (9 th Week) 9. Firewalls and Intrusion Prevention Systems 9.Outline The Need for Firewalls Firewall Characterictics and Access Policy Type of Firewalls

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

GFI product comparison: GFI MailEssentials vs. McAfee Security for Servers

GFI product comparison: GFI MailEssentials vs. McAfee Security for  Servers GFI product comparison: GFI MailEssentials vs. McAfee Security for Email Servers Features GFI MailEssentials McAfee Integrates with Microsoft Exchange Server 2003/2007/2010/2013 Scans incoming and outgoing

More information

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Antivirus Market Trends

Antivirus Market Trends Markets, A. Hallawell Research Note 23 July 2003 Magic Quadrant for Enterprise Antivirus, 1H03 Enterprise antivirus vendors are being pressured to innovate, yet enterprises are still waiting for improvements.

More information

LOS ANGELES UNIFIED SCHOOL DISTRICT Office of the Chief Information Officer. DISTRIBUTION: All Schools and Offices ROUTING All Staff

LOS ANGELES UNIFIED SCHOOL DISTRICT Office of the Chief Information Officer. DISTRIBUTION: All Schools and Offices ROUTING All Staff ACTION, TO SHARE LOS ANGELES UNIFIED SCHOOL DISTRICT Office of the Chief Information Officer DISTRIBUTION: All Schools and Offices ROUTING All Staff SUBJECT: BULLETIN NO. K-23 ENTERPRISE LICENSE - NORTON

More information

IronPort C100 for Small and Medium Businesses

IronPort C100 for Small and Medium Businesses I R O N P O R T E M A I L S E C U R I T Y A P P L I A N C E S S I M P L E I N S TA L L AT I O N, E A S Y M A N A G E M E N T, A N D P O W E R F U L P R O T E C T I O N F O R Y O U R E M A I L I N F R A

More information

Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide

Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide 2 Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide The software described in this book is furnished under

More information

Lenovo Europe, Middle East, and Africa Hardware Announcement ZG , dated January 27, 2009

Lenovo Europe, Middle East, and Africa Hardware Announcement ZG , dated January 27, 2009 Hardware Announcement ZG09-0077, dated January 27, 2009 Utimaco SafeGuard Enterprise suite of offerings for ThinkVantage Technologies offers hard drive encryption and additional modules for complete PC

More information

IBM WebSphere Application Server V3.5, Advanced Edition Expands Platform Support and Leverages the Performance of the Java 2 Software Development Kit

IBM WebSphere Application Server V3.5, Advanced Edition Expands Platform Support and Leverages the Performance of the Java 2 Software Development Kit Software Announcement July 25, 2000 IBM V3.5, Expands Platform Support and Leverages the Performance of the Java 2 Software Development Kit Overview WebSphere Application Server V3.5, manages and integrates

More information

Pocket Guide. Products and Services. For Home Computing For Businesses

Pocket Guide. Products and Services. For Home Computing For Businesses Pocket Guide Products and Services For Home Computing For Businesses Table of contents About F-Secure 3-4 F-Secure Firsts 5 Award-Winning Software 6 F-Secure Anti-Virus Solutions Home Computing 8 Businesses

More information

Security Assessment Checklist

Security Assessment Checklist Security Assessment Checklist Westcon Security Checklist - Instructions The first step to protecting your business includes a careful and complete assessment of your security posture. Our Security Assessment

More information

Symantec Enterprise Security Manager Baseline Policy Manual for Security Essentials. Solaris 10

Symantec Enterprise Security Manager Baseline Policy Manual for Security Essentials. Solaris 10 Symantec Enterprise Security Manager Baseline Policy Manual for Security Essentials Solaris 10 Symantec ESM Baseline Policy Manual for Security Essentials for Solaris 10 The software described in this

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Hardening the Education. with NGFW. Narongveth Yutithammanurak Business Development Manager 23 Feb 2012

Hardening the Education. with NGFW. Narongveth Yutithammanurak Business Development Manager 23 Feb 2012 Hardening the Education IT Environment with NGFW Narongveth Yutithammanurak Business Development Manager 23 Feb 2012 Technology Trends Security Performance Bandwidth Efficiency Manageability Page 2 What

More information

: Administration of Symantec Endpoint Protection 14 Exam

: Administration of Symantec Endpoint Protection 14 Exam 250-428: of Symantec Endpoint Protection 14 Exam Study Guide v. 2.2 Copyright 2017 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Altiris are trademarks or registered trademarks

More information

Annexure E Technical Bid Format

Annexure E Technical Bid Format Annexure E Technical Bid Format ANTIVIRUS SOLUTION FOR MAIL SERVER SECURITY AND SERVER SECURITY FOR DESKTOP,LAPTOP Sr. No Description Compliance (Y/N) Remark 01 Must offer comprehensive client/server security

More information

SIMATIC. Process Control System PCS 7 V7.0 SP1 Security Information Note: Setting up antivirus software. Preface. Using virus scanners 2

SIMATIC. Process Control System PCS 7 V7.0 SP1 Security Information Note: Setting up antivirus software. Preface. Using virus scanners 2 SIMATIC Process Control System PCS 7 V7.0 SP1 SIMATIC Process Control System PCS 7 V7.0 SP1 Security Information Note: Setting up antivirus software Security Information Note Preface 1 Using virus scanners

More information

KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE

KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE (4/20/07) WHO IS KERIO? Kerio Technologies provides Internet messaging and firewall software solutions for small to medium sized networks,

More information

Trend Micro s SMB Solutions

Trend Micro s SMB Solutions Press to Advance to Next Slide Copyright 2004 Trend Micro, Inc. Trend Micro s SMB Solutions Trend Micro Sales Training Module RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line COURSE OBJECTIVES

More information

Seqrite Endpoint Security

Seqrite Endpoint Security Enterprise Security Solutions by Quick Heal Integrated enterprise security and unified endpoint management console Enterprise Suite Edition Product Highlights Innovative endpoint security that prevents

More information

Network Performance Test. Business Security Software. Language: English August Last Revision: 11 th October

Network Performance Test. Business Security Software. Language: English August Last Revision: 11 th October Network Performance Test Business Security Software Language: English August 2016 Last Revision: 11 th October 2016 Test commissioned by the vendor - 1 - Introduction This report, commissioned by ESET,

More information

McAfee Embedded Control

McAfee Embedded Control McAfee Embedded Control System integrity, change control, and policy compliance in one solution McAfee Embedded Control maintains the integrity of your system by only allowing authorized code to run and

More information

Coupon BitDefender Corporate Security 3 Years 10 PCs internet download software for pc ]

Coupon BitDefender Corporate Security 3 Years 10 PCs internet download software for pc ] Coupon BitDefender Corporate Security 3 Years 10 PCs internet download software for pc ] Description: BitDefender Corporate Security is a robust and easy to use business security and management solution

More information

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client

More information

Test Report April esafe Virtual Appliance

Test Report April esafe Virtual Appliance Test Report April 2008 esafe Virtual Appliance Vendor Details Name: Aladdin Knowledge Systems Address: HQ: 35 Efal St., Petah Tikva, 49511, ISRAEL UK Office: Fairacres House 2-3, Fairacres Industrial Estate,

More information

DBMS Software Market Forecast, (Executive Summary) Executive Summary

DBMS Software Market Forecast, (Executive Summary) Executive Summary DBMS Software Market Forecast, 2003-2007 (Executive Summary) Executive Summary Publication Date: 4 September 2003 Author Colleen Graham This document has been published to the following Marketplace codes:

More information

Client Guide for Symantec Endpoint Protection Small Business Edition

Client Guide for Symantec Endpoint Protection Small Business Edition Client Guide for Symantec Endpoint Protection Small Business Edition The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the

More information

External RAID-Based Storage System Analysis by Form Factor

External RAID-Based Storage System Analysis by Form Factor Research Brief External RAID-Based Storage System Analysis by Form Factor Abstract: Gartner Dataquest forecasts factory revenue for modular external RAID controllerbased storage systems will grow at a

More information

Future-ready security for small and mid-size enterprises

Future-ready security for small and mid-size enterprises First line of defense for your network Quick Heal Terminator (UTM) (Unified Threat Management Solution) Data Sheet Future-ready security for small and mid-size enterprises Quick Heal Terminator is a high-performance,

More information

Predicts 2004: The Future of Windows Server

Predicts 2004: The Future of Windows Server Strategic Planning, T. Bittman Research Note 19 November 2003 Predicts 2004: The Future of Windows Server In 2004, distributed manageability will emerge as the key to the future of Windows Server, especially

More information

Symantec Network Access Control Starter Edition

Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely

More information

IBM Managed Security Services for Security

IBM Managed Security Services for  Security Service Description 1. Scope of Services IBM Managed Security Services for E-mail Security IBM Managed Security Services for E-mail Security (called MSS for E-mail Security ) may include: a. E-mail Antivirus

More information

Symantec Network Access Control Starter Edition

Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely

More information

4Q02 Update: Disk Storage Forecast Scenarios,

4Q02 Update: Disk Storage Forecast Scenarios, Forecast Analysis 4Q02 Update: Disk Storage Forecast Scenarios, 2002-2003 Abstract: Clearly, the near-term fate of the disk storage system market is more tightly coupled with micro IT spending trends than

More information

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications GLOBALPROTECT Prevent Breaches and Secure the Mobile Workforce GlobalProtect extends the protection of Palo Alto Networks Next-Generation Security Platform to the members of your mobile workforce, no matter

More information

Symantec Endpoint Protection

Symantec Endpoint Protection Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec Insight and by SONAR, a single,

More information

SonicWALL Security Software

SonicWALL  Security Software Email Security SonicWALL Email Security 7.2.4 Software System Compatibility SonicWALL Email Security 7.2.4 Software is supported on systems with the following: Operating Systems Windows 2003, SP2 Windows

More information

escan Quick Reference and Installation Guide This document provides information to install escan and serves as a quick reference to run key tasks.

escan Quick Reference and Installation Guide This document provides information to install escan and serves as a quick reference to run key tasks. This document provides information to install escan and serves as a quick reference to run key tasks. escan Quick Reference and Installation Guide escan Quick Reference Guide 1 escan User Guide The software

More information

IBM Proventia Management SiteProtector. Scalability Guidelines Version 2.0, Service Pack 7.0

IBM Proventia Management SiteProtector. Scalability Guidelines Version 2.0, Service Pack 7.0 IBM Proventia Management SiteProtector Scalability Guidelines Version 2.0, Service Pack 7.0 Copyright Statement Copyright IBM Corporation 1994, 2008. IBM Global Services Route 100 Somers, NY 10589 U.S.A.

More information

Cisco NAC Network Module for Integrated Services Routers

Cisco NAC Network Module for Integrated Services Routers Cisco NAC Network Module for Integrated Services Routers The Cisco NAC Network Module for Integrated Services Routers (NME-NAC-K9) brings the feature-rich Cisco NAC Appliance Server capabilities to Cisco

More information

Antivirus Technology

Antivirus Technology Antivirus Technology CSH6 Chapter 41 Antivirus Technology Chey Cobb & Allysa Myers 1 Copyright 2015 M. E. Kabay. All rights reserved. Topics AV Terminology AV Issues History of Viral Changes Antivirus

More information