Computer Associates International etrust Antivirus
|
|
- Alaina Stephens
- 6 years ago
- Views:
Transcription
1 Kristen Noakes-Fry Product Report 29 August 2003 Computer Associates International etrust Antivirus Summary etrust Antivirus from Computer Associates employs signature scanning and heuristics across several platforms to detect and cure malicious code on desktops, servers and personal digital assistants (PDAs). Note In March 2003, the InoculateIT brand name was discontinued. etrust Antivirus v7 includes technologies formerly available as etrust InoculateIT, etrust Content Inspection, etrust InoculateIT Groupware (Microsoft Exchange and Lotus Notes/Domino Options), InoculateIT Enterprise Edition and Unicenter TNG Advanced Antivirus Option. Table of Contents Overview Analysis Pricing Competitors Strengths Limitations Insight List Of Tables Table 1: Enhancements: Computer Associates etrust Antivirus v7 Table 2: Enhancements: Computer Associates etrust Antivirus v7 for the Gateway Table 3: Overview: Computer Associates etrust Antivirus Table 4: Features and Functions: CA Antivirus Technology Table 5: Security Features Table 6: Price List: etrust Antivirus Table 7: Competitors Gartner Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice.
2 Corporate Headquarters Computer Associates International, Inc. One Computer Associates Plaza Islandia, NY 11749, U.S.A. Tel: ; Fax: Internet: Overview Computer Associates (CA s) etrust Antivirus v7 accommodates the whole range of antivirus protection across several platforms, including Windows NT/2000/2003 servers; NetWare servers; Windows 9x/Me, 2000 and XP desktops; Microsoft Pocket PC 2002 and PalmOS (free download) on the PDA; and Solaris and Linux platforms. Features include: Protects against in-the-wild viruses, including boot sector, multipartite, macro, script and polymorphic viruses. Protects against malicious Java and ActiveX, including viruses transmitted through and databases on GroupWare systems, such as Microsoft Exchange and Lotus Notes. Adds Zombie scanning to protect Windows machines against denial-of-service attacks. etrust Antivirus etrust Antivirus v7 is part of the Threat Management solution area within the wider etrust brand, which includes: etrust Identity Management etrust Access Management etrust Threat Management etrust Security Command Center The Threat Management solution area protects networks against all forms of malicious attacks, addressing all potential points of entry from Internet gateways to user desktops to PDAs; it covers intrusion detection/prevention, access control, administration, authentication, auditing, certificate validation and PKI: etrust Antivirus etrust Intrusion Detection etrust Policy Compliance etrust Vulnerability Manager 29 August
3 Table 1: Enhancements: Computer Associates etrust Antivirus v7 Web-Based Administration Support for Roaming Users Enhanced Lotus Note/Domino Support Enhanced Microsoft Exchange Support New Gateway Protocol New Platforms on the PDA Web-based administration available from the Windows platform. etrust Antivirus allows the client to configure itself automatically based on location. With the etrust Antivirus console, administrators can create different threat zones for different groups, such as specific departments and dial-up users. Once placed into a pre-defined threat zone, the etrust Antivirus client determines automatically: The preferred signature download server How often to check and download new signatures Which virus engine would be most appropriate etrust Antivirus v7 for Lotus Notes/Domino scans all inbound and outbound messages in real time for malicious attachments, protecting GroupWare server from -borne viruses. Enhancements include customizable warning messages, integration with the etrust Antivirus Log Viewer and support for clusters. Provides additional flexibility and ease of administration. etrust Antivirus v7 for Microsoft Exchange scans all inbound and outbound messages in real time for malicious attachments, protecting the GroupWare server from -borne viruses. Enhancements include integration with the etrust Antivirus Log Viewer and VS API 2.0 support for Exchange 2000 SP1+. Provides ease of administration and the benefits associated with the latest API from Microsoft. Post Office Protocol 3 (POP3) stores and serves s for various client machines not connected to the Internet, holding the s until the user logs in. New PDA support for Microsoft Pocket PC 2002, in addition to the PalmOS free download. New Apache Linux Server edition as part of etrust Antivirus v7 for the Gateway. Table 2: Enhancements: Computer Associates etrust Antivirus v7 for the Gateway Integrates With etrust Audit Improves Mail Delivery Blocks Attachments Quarantines Infected s Improves Signature Updates Through Message Forwarding, provides greater flexibility in enterprisewide antivirus reporting. Multithreaded delivery of enables to be delivered in parallel instead of being queued. Use of key words provides the administrator greater flexibility and control as to what traffic enters the network. When used for perimeter protection, etrust Antivirus enables the intended recipients to follow up on blocked attachments. Can now pull signature updates from the etrust Antivirus Admin Server, ensuring that antivirus protection is current on the gateway. Table 3: Overview: Computer Associates etrust Antivirus Version v7 Date Announced March 2003 Date First Installed 1996 as InocuLAN, 1998 as CA InoculateIT Types of Antivirus Scanning, heuristics, policy-based (behavioral) Technologies Used 29 August
4 Table 3: Overview: Computer Associates etrust Antivirus Operating System Platforms Supported Gateways Supported Certifications Languages Supported Documentation etrust Antivirus v7 PDAs: Microsoft Pocket PC 2002; PalmOS. Desktops: Windows 95, 98, ME, NT 4.0, 2000, XP; Linux; Sun Solaris; and Macintosh. Servers: Windows NT 4.0 Server, Windows 2000 Server, Windows Server 2003, Linux, Sun Solaris and Novell NetWare. Lotus Notes/Domino, Microsoft Exchange. Gateways: Stand-Alone Gateway Simple Mail Transfer Protocol (SMTP) POP3/FTP/HTTP MS-Proxy Server MS-ISA Server Apache Linux Server Check Point FireWall-1 via Content Vectoring Protocol (CVP) Open Platform for Security (OPSEC) ICSA Labs, West Coast Labs Check Mark, Virus Bulletin (VB100 percent), OPSEC, Novell Tested and Approved English, French, German, Spanish, Japanese Table 4: Features and Functions: CA Antivirus Technology Viruses Detected Antivirus Engine Heuristic Engine Scanning Engine Types of Files Scanned Macro Virus Detection Actions Taken When VirusIsDetected Updates for Signatures or Patterns Detects virtually all viruses in the wild, including boot sector, master boot sector, memory resident, file multipartite, macro, stealth and polymorphic viruses. Employs two scanning engines (InoculateIT and Vet). Heuristic virus detection engine employs an advanced rules-based detection method to detect unknown viruses. Remotely configures and scans any etrust Antivirus server or workstation. Scans compressed file archives and Internet downloads, including.zip,.arj and Microsoft compressed files. A Macro Virus Analyzer is CA s proprietary technology to detect and cure macro viruses in Microsoft Office files. etrust Antivirus servers can automatically log off client workstations that attempt to upload an infected file: An Alert Manager notifies security administrators of all critical virus incidents from any server. Software automatically isolates users who attempt to move, copy or save infected files over the network. Free virus signature updates are downloaded automatically from the Internet and distributed to etrust Antivirus servers and clients: Updates are released twice a week or immediately when a new virus alert is issued. An update-holding interval lets the software test downloaded software and signature file updates on specified computers before fully implementing them across the network. 29 August
5 Table 4: Features and Functions: CA Antivirus Technology Technology Used for Updates (for example, push technology and so on) Management Features Logging and Reporting Protection for Clients Protection for Servers Protection for Internet Gateways Protection for Networks and Desktops Protection for PDAs Updated signatures are distributed automatically across the network to all potential points of entry. All systems in the enterprise or workgroup that are protected can be grouped and managed from a central console: Software options can be pre-configured before deployment to multiple machines. Software can be installed remotely on servers and workstations throughout the network. Support for roaming users. Web-based administration. Software lets administrators select from a variety of methods to handle viruses, including copy cure, rename, move, report, delete or purge. Software allows for centralized, policy-based administration of antivirus clients, including the ability to lock down settings. Automatic installation is provided. Virus Scanning Logs identify users associated with each virus event: Centralized log of all virus events, including files checked, viruses found and responses, is stored in a Central Activity Log. Logs may be forwarded to etrust Audit for greater flexibility in antivirus reporting and for integration into etrust Security Command Center. Software extends virus protection to Windows NT/2000, XP, 95/98/ME and Linux: The clients automatically update themselves from the server. Virus protection is also available for Apple Macintosh and PDAs running Pocket PC 2002, and for PalmOS. Software allows scheduled scanning and real-time protection against infection from diskettes, downloaded files and documents. Servers: Windows NT 4.0 Server, Windows 2000 Server, Windows XP Server, Windows 2003 Server, Linux, Sun Solaris and Novell NetWare. Stand-Alone Gateway (SMTP/POP3/FTP/HTTP) MS-Proxy Server (FTP/HTTP) MS-ISA Server (FTP/HTTP/SMTP) Apache Linux Server (FTP/HTTP) Check Point FireWall-1 (via CVP) (FTP/HTTP/SMTP) Windows 95, 98, ME, NT 4.0, 2000, XP, 2003; Linux; Sun Solaris; and Macintosh. Protection for PDAs running Microsoft Pocket PC 2002 and Palm OS (free download). Table 5: Security Features Policy Enforcement Virus Quarantine Prevents the disabling or altering of antivirus settings by locking down client configurations. etrust Antivirus servers can automatically log off client workstations that attempt to upload an infected file. 29 August
6 Table 5: Security Features Virus Source Tracking Digitally Signed Signatures and Binaries Support for Intrusion Detection Systems Integration With etrust Audit Through Message Forwarding Protection Against Malicious Code Virus Protection for Installation and Support Virus-scanning log includes a reference to the client workstation where the infected file originated. Using CA s private key, etrust Antivirus signature updates and runtime models are checked for tampering and spoofing. etrust Intrusion Detection, a complementary product to etrust Antivirus, delivers surveillance, detection of intrusions and attacks, URL blocking, alerting, logging and real-time response. Enables accountability and flexibility in antivirus reporting. etrust Antivirus v7 for the Gateway Protects against viruses of malicious Java Applets and ActiveX controls at the Internet gateway. It scans SMTP, POP3, FTP and HTTP traffic for potential viruses. Lotus Notes/Domino, Microsoft Exchange Provides protection against viruses transmitted through on groupware systems. Provides real-time detection and cure for all attachments. Software lets administrators choose to protect incrementally and to centrally manage the options from any server in the network. Novell Groupwise virus protection is provided by a partner, Beginfinite. Installation The CA Technical Support department has support teams around the world, which includes native speakers of both English and the local-language. Technical support is available by , telephone, online documentation, product release notes and FAQs. Support Both Support and upgrade protection are included in the cost of maintenance. One free year of maintenance is included with the product with a charge for an additional one or two years. Support includes all of the following: 7 24 phone support Free signature updates Guaranteed response within 24 hours of a new virus attack 24 7 support by CA s etrust Threat Analysis and Response Global Emergency Team (TARGET). esupport over the Web is free. System Requirements: Hardware Windows 9x/ME etrust Antivirus has different minimum requirements on each platform. While etrust Antivirus may run on systems with lower specification, the following are recommended minimums. At least 32MB RAM At least 20MB hard drive space Can run effectively on a 133MHz PC No coverage for Macintosh 29 August
7 Table 5: Security Features NetWare NetWare versions (3x, 4x or 5.0) At least 16MB RAM At least 15MB free disk space Windows NT/2000 Windows 2000 with Service Pack 1.; however, Service Pack 6a (NT Service Pack 5minimum). 32MB free disk space (Intel) 133MHz PC System Requirements: Software Desktop (minimum Windows 95/98/Me operating system Windows NT 4.0/2000/XP [OS]) Server (minimum Windows NT 4.0 x86 OS) Windows 2000 Windows Server 2003 NetWare 3.12 Linux (Red Hat, SuSE, Turbo and Caldera) Sun Solaris/SPARC 2.6 and higher Groupware Lotus Notes/Domino R5, releases 4.x, 5.x and 6.0 Microsoft Exchange 2000 SP1+ and Exchange 5.5 service pack 3+. Analysis With the purchase of Cheyenne Software in 1996, CA benefited from Cheyenne s years of experience as a provider of one of the first antivirus solutions as well as one of the first providers of solutions for the LAN environment. Cheyenne s InocuLAN eventually became InoculateIT and, finally, etrust Antivirus. In 2001, CA rebranded the antivirus product as etrust InoculateIT for CA s indirect channel partners and etrust Antivirus for CA s direct sales force. Meanwhile, in 1999, CA acquired Vet Anti-Virus from Cybec, re-packaging the product as the Personal Edition of InoculateIT and, until June 2001, making it available free on the Internet. Streamlining the Antivirus Offerings In March 2003, etrust Antivirus v7 was released for both CA s direct sales force and CA s channel partners and the InoculateIT name was discontinued. etrust Antivirus v7 includes etrust Antivirus Groupware (Microsoft Exchange and Lotus Notes/Domino Options) and etrust Content Inspection, previously sold as separate products. Other technologies included in etrust Antivirus v7 were formerly available as InoculateIT Enterprise Edition, Unicenter TNG Advanced Antivirus Option, etrust Antivirus Groupware, etrust Content Inspection, etrust InoculateIT, InoculateIT, etrust InoculateIT for Linux, etrust InoculateIT for NetWare, etrust InoculateIT for Windows, InoculateIT for Windows Workgroup Edition, etrust InoculateIT Lotus Notes/Domino Option, etrust InoculateIT Microsoft Exchange Option, InoculateIT Advanced Edition, InoculateIT for Palm OS, Inoculan AntiVirus for Windows 95, Inoculan AntiVirus Suite for Microsoft BackOffice, InoculateIT Workgroup Edition, InoculateIT, InoculateIT for Windows Advanced Edition. Two Scanning Engines etrust Antivirus has one brand name, but provides two different scanning engines stemming from two different product acquisitions: 29 August
8 InoculateIT, originally developed by Cheyenne Vet, originally developed by Cybec Although the two scanning engines have two separate development groups within CA, they can be managed together from a single management console. Single-Console Updating etrust Antivirus offers a flexible signature update procedure. The updates are free and are automatically downloaded from the Internet to the corporate server based on an update frequency defined by the network administrator. The network administrator also has the option to choose to examine the updated signature file on a local machine to ensure there are no conflicts with network software. When the signature file is approved, it is automatically disseminated to all other systems on the network down to the desktop. Real-Time Virus Scanning etrust Antivirus uses two primary scanning methods to scan for viruses in real time: The first is a proprietary signature-scanning method which scans for known types of viruses, including polymorphic, multipartite, stealth, script and macro viruses, in addition to worms and Trojans. The second is a heuristics-based scanning to detect unknown viruses. With its use of positive and negative rules, the heuristics engine attempts to keep the number of false positive results to a minimum. The organization can to choose up to three levels at which to scan, with each level varying on the type of scan and the speed at which the scan is performed. These levels can vary from desktop to desktop based on the parameters defined by the network administrator. Fast Scan is the fastest because it scans only the header of the file, determines what the checksum is and opens the file only if it is determined to be virus-free. The Secure Scan level scans every part of the file to detect for viruses. The Reviewer Scan, which is the slowest, adds the entire heuristics rule base to the scanning process before tagging the file virus-free. CA treats etrust Antivirus as an integral part of its entire security strategy and has implemented that philosophy in two ways: First, each of its security products can be managed from a central console; signature file updates can be distributed from a single console. Second, it made the antivirus functionality part of the etrust offering, which includes an integrated portfolio of software to enable security in an e-business environment. Primary Markets CA s primary target for etrust Antivirus is the enterprise market. For these customers, central administration is an important element of CA s etrust strategy. etrust Antivirus provides central administration of your antivirus implementation. In addition, etrust Antivirus also integrates into etrust Security Command Center, which can manage all the security products in an enterprise. 29 August
9 Pricing The list price for etrust Antivirus v7 is the same for direct and channel sales. Table 6: Price List: etrust Antivirus Product Description Price (US$) etrust Antivirus v7 Signature File Updates Sold directly by CA s sales force and by CA s channel partners for the same list price. Automatically downloaded to the corporate servers based on update frequency defined by network administrators. Boxed Product for 5, 10 and 25 users is available. Tiers Licensing prices start at $35 a node for users. Free. Note: For two years ( ), CA offered InoculateIT Personal Edition free of charge. Since that program ended, users may log in to my-etrust.com and pay a nominal charge for etrust EZ Antivirus, which includes software upgrades, virus definition updates and technical support via . GSA Pricing No. Competitors Table 7: Competitors Network Associates McAfee Active Virus Defense McAfeeVirusScan Norton Sophos Anti-Virus Solution Symantec Symantec AntiVirus Trend Micro InterScan VirusWall Protects desktops, servers, GroupWare, Internet servers, wireless and PDA, Internet gateway, and file server. Push channel disseminates virus information, updates and upgrades to the network administrator. Auto update function pre-schedules updates, hourly updates via an Internet download and also CD-ROM and diskette distribution. See Symantec. Sophos focuses solely on the antivirus requirements of networked organizations. The architecture employs a combination of virus scanning and checksumming. Since the architecture is operating system-independent, the product may be delivered on a wide range of networks. Protection for Windows or NetWare environments; plus options for gateway, firewall and groupware antivirus protection. Symantec offers a variety of antivirus products for all layers of the enterprise, from the desktop to file servers, groupware servers and gateways. Symantec has discontinued active use of the brand name Norton. Top-down, server-based approach intercepts viruses and malicious code at the Internet gateway. Optionally supports spam blocking, content filtering and mail traffic management. Other products protect groupware and servers, application servers and desktops. Strengths Wide Range of Protection 29 August
10 Protects against malicious Java and ActiveX code, in addition to antivirus protection support for gateways, and groupware/ servers. Central Security Management Within etrust Products etrust Security Command Center provides event aggregation and correlation, as well as command and control, from a central console for etrust and non-ca products. Worldwide Research and Support To monitor new virus threats around the clock, and to deliver up-to-date virus signature files to the etrust Antivirus installations, CA s etrust TARGET has resources in North America, Europe, the Middle East and Australia. Technical support is available 24 hours a day, 7 days a week, 365 days a year. Limitations Late Market Entry While etrust Antivirus is in version 7 of the product life cycle, the actual product line was a late entry into the antivirus market. By the time CA entered the antivirus market in 1996, products from Symantec and McAfee products from Network Associates were already firmly established. Part of Very Broad Product Portfolio From years of acquisitions, CA has a broad product offering, often including seemingly redundant products. As result, customers are overwhelmed with product options, and a specific tool can be lost in the shuffle. Product quality issues and substandard product support are frequently mentioned by users and may well be symptomatic of CA s broad product portfolio. Insight CA s etrust Antivirus provides antivirus protection for PDAs, desktops, servers, groupware and the gateway, in one product, for one price, and one license, with a very low, long-term total cost of ownership (TCO), making it very attractive to enterprises. Key features are its dual virus scanning engines; superior centralized, policy-based management; a stellar record of detection of virtually all known viruses, macro virus threats, malicious Java, ActiveX and other malicious code; and etrust TARGET (for an immediate response to any new virus or blended threat). 29 August
etrust Antivirus Release 7.1
D A T A S H E E T etrust Antivirus Release 7.1 etrust Antivirus provides superior protection from the perimeter to the PDA against today s most prevalent security threat viruses. It eliminates virus infections,
More informationINSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic
Virus Protection & Content Filtering TECHNOLOGY BRIEF Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server Enhanced virus protection for Web and SMTP traffic INSIDE The need
More informationCIO Update: Security Platforms Will Transform the Network Security Arena
IGG-11202002-02 J. Pescatore, M. Easley, R. Stiennon Article 20 November 2002 CIO Update: Security Platforms Will Transform the Network Security Arena An integrated network security platform approach will
More informationSymantec Endpoint Protection Integration Component User's Guide. Version 7.0
Symantec Endpoint Protection Integration Component User's Guide Version 7.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms
More informationComputer Associates etrust Antivirus v 7.1
Product Advisor Charlotte Dunlap Analyst, Information Security Andrew Braunberg Senior Analyst, Information Security Contents Product Assessment Summary Current Perspective Product Strengths & Weaknesses
More informationSymantec Multi-tier Protection
Trusted protection from malware and email-bourne threats for multiplatform environments Overview Symantec Multi-tier Protection is designed to safeguard enterprise assets and lower risk by providing unmatched
More informationExam : Title : symantec small Business security. Version : DEMO
Exam : 250-101 Title : symantec small Business security Version : DEMO 1. Which heuristic technology does Symantec AntiVirus use? A. Q-Factor B. Bloodhound C. pattern matching D. regular expression 2.
More informationIBM Tivoli Risk Manager Provides Protection for the Enterprise through Intrusion and Protection Management
Software Announcement October 15, 2002 Provides Protection for the Enterprise through Intrusion and Protection Management Overview IBM Tivoli Risk Manager is an enterprise risk management solution that
More informationNortel Networks Optivity Policy Services
Sharon Fisher Product Report 7 January 2004 Nortel Networks Optivity Policy Services Summary Optivity Policy Services is system-level software for managing the traffic prioritization and network access
More informationCERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES
CERT-In Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES Department of Information Technology Ministry of Communications and Information Technology Government of India Anti Virus
More informationSymantec Client Security. Integrated protection for network and remote clients.
Symantec Client Security Integrated protection for network and remote clients. Complex Internet threats require comprehensive security. Today's complex threats require comprehensive security solutions
More informationSymantec Multi-tier Protection
Trusted protection from malware and email-borne threats for multiplatform environments Overview safeguards enterprise assets and lowers risk by providing unmatched protection against threats for laptops,
More informationLANDesk for ThinkVantage Technologies ecosystem now expanded to include enhanced offerings
Lenovo United States Announcement 107-556, dated September 18, 2007 LANDesk for ThinkVantage Technologies ecosystem now expanded to include enhanced offerings Description...2 Prices...7 At a glance New
More informationHow to Test Outbreak Commander
TREND MICRO CONTROL MANAGER TREND MICRO, INC. 10101 N. DE ANZA BLVD. CUPERTINO, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 WWW.TRENDMICRO.COM How to Test Outbreak Commander 2 TREND MICRO CORPORATE
More informationKaspersky Anti-Virus 8.0 for Lotus Domino Administrator s Guide
Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator s Guide APPLICATION VERSION: 8.0 Dear User! Thank you for choosing our product. We hope that this document will help you in your work and will provide
More informationPineApp Mail Secure SOLUTION OVERVIEW. David Feldman, CEO
PineApp Mail Secure SOLUTION OVERVIEW David Feldman, CEO PineApp Mail Secure INTRODUCTION ABOUT CYBONET CORE EXPERIENCE PRODUCT LINES FACTS & FIGURES Leader Product Company Servicing Multiple Vertical
More informationMessaging and Collaboration Security Antigen 6.5 for Exchange Miguel Canales Regional Engineering Manager CEUR
Messaging and Collaboration Security Antigen 6.5 for Exchange Miguel Canales Regional Engineering Manager CEUR Please visit us at www.sybari.com Sybari Software Sybari s mission is to deliver superior
More informationWHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group
WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.2 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The
More informationSelect Q&A, QA A. Hallawell, M. Grey. Anti-spam Architecture Choices. Firewall. Appliance or Licensed Software. SMTP Relay
Select Q&A, A. Hallawell, M. Grey Research Note 22 September 2003 How to Select Spam-Filtering Products and Services Choose a spam-filtering solution by evaluating anti-spam providers' management, research
More informationIntroducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection. Bernard Laroche Endpoint security Product marketing
Introducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection Bernard Laroche Endpoint security Product marketing Agenda 1 Organizational Risk and Endpoint Challenges 32 Symantec Endpoint
More informationChapter 8 Operating Systems and Utility Programs
Chapter 8 Operating Systems and Utility Programs Chapter 8 Objectives Identify the types of system software Summarize the startup process on a personal computer Summarize the features of several stand-alone
More informationChapter 9. Firewalls
Chapter 9 Firewalls The Need For Firewalls Internet connectivity is essential Effective means of protecting LANs Inserted between the premises network and the Internet to establish a controlled link however
More informationSecuring Your Business Against the Diversifying Targeted Attacks Leonard Sim
Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim Manager, Client & Partner Services, Asia 1 Agenda 2010 Threats Targeted Attacks Defense Against Targeted Attacks Questions 2
More informationNetDefend Firewall UTM Services
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860/1660/2560/2560G) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content
More informationConfiguring Symantec. device
Configuring Symantec AntiVirus for Hitachi File OS device Configuring Symantec AntiVirus for Hitachi File OS device The software described in this book is furnished under a license agreement and may be
More informationReviewer s guide. PureMessage for Windows/Exchange Product tour
Reviewer s guide PureMessage for Windows/Exchange Product tour reviewer s guide: sophos nac advanced 2 welcome WELCOME Welcome to the reviewer s guide for NAC Advanced. The guide provides a review of the
More informationDiscount Bitdefender Security for SharePoint website for free software ]
Discount Bitdefender Security for SharePoint website for free software ] Description: BitDefender Security for SharePoint provides antivirus and antispyware protection for your Microsoft SharePoint Server.
More informationSOLUTION MANAGEMENT GROUP
InterScan Messaging Security Virtual Appliance 8.0 Reviewer s Guide February 2011 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 www.trendmicro.com
More informationConfiguring Symantec Protection Engine for Network Attached Storage for Hitachi Unified and NAS Platforms
Configuring Symantec Protection Engine for Network Attached Storage 7.0.1 for Hitachi Unified and NAS Platforms Configuring Symantec Protection Engine for Network Attached Storage 7.0.1 for Hitachi Unified
More informationLANDesk and Lenovo ThinkVantage Technologies Bundle available for commercial, government, and education customers
Lenovo United States Announcement 106-815, dated November 7, 2006 LANDesk and Lenovo ThinkVantage Technologies Bundle available for commercial, government, and education customers Additional information...
More informationKey Features. DATA SHEET
DATA SHEET Total Defense THREAT MANAGER r12 Overview: Total Defense Threat Manager r12 integrates anti-malware, groupware protection and network access control in one easy-touse solution, providing comprehensive
More informationWorldwide 2002 Security Software Market and Vendor Shares (Executive Summary) Executive Summary
Worldwide Security Software Market and Vendor Shares (Executive Summary) Executive Summary Publication Date: 21 July 2003 Author Norma Schroder This document has been published to the following Marketplace
More informationNGN: Carriers and Vendors Must Take Security Seriously
Research Brief NGN: Carriers and Vendors Must Take Security Seriously Abstract: The next-generation network will need to provide security on many levels. A comprehensive set of standards should be in place
More informationOpenService NerveCenter Event Correlation Network Management
John Inverso Product Report 31 July 2003 OpenService NerveCenter Event Correlation Network Management Summary NerveCenter provides network-event correlation and root-cause analysis abilities which its
More informationSymantec Encryption Management Server and Symantec Data Loss Prevention. Integration Guide
Symantec Encryption Management Server and Symantec Data Loss Prevention Integration Guide The software described in this book is furnished under a license agreement and may be used only in accordance
More informationProduct Line Guide Corporate Antimalware PLUS Network Visibility PLUS Systems Management
Product Line Guide 2011 Corporate Antimalware PLUS Network Visibility PLUS Systems Management IT S YOUR BUSINESS. DEFEND IT. Today s business security solutions need to go beyond basic virus detection
More informationTrend Micro Deep Security
Trend Micro Deep Security Endpoint Security Similarities and Differences with Cisco CSA A Trend Micro White Paper May 2010 I. INTRODUCTION Your enterprise invested in Cisco Security Agent (CSA) because
More informationVenusense UTM Introduction
Venusense UTM Introduction Featuring comprehensive security capabilities, Venusense Unified Threat Management (UTM) products adopt the industry's most advanced multi-core, multi-thread computing architecture,
More informationKaspersky Anti-Virus 8.0 for Lotus Domino Administrator's Guide
Kaspersky Anti-Virus 8.0 for Lotus Domino Administrator's Guide APPLICATION VERSION: 8.0 MAINTENANCE PACK 2 Dear User, Thank you for choosing our product. We hope that this documentation will help you
More informationConfiguring Symantec AntiVirus for BlueArc Storage System
Configuring Symantec AntiVirus for BlueArc Storage System Configuring Symantec AntiVirus for BlueArc Storage System The software described in this book is furnished under a license agreement and may be
More informationHP Data Protector Express Backup Server Upgrade from Data Protector Express Single editions of Data Protector
Overview is backup and recovery software that is easy to install, easy to use, easy to manage and requires no specialist training. It robustly, yet simply, protects single machines or small networks in
More informationGFI product comparison: GFI MailEssentials vs. Barracuda Spam Firewall
GFI product comparison: GFI MailEssentials vs. Barracuda Spam Firewall Features GFI MailEssentials Barracuda Spam Firewall Integrates with Microsoft Exchange Server 2007/2010/2013 Scans incoming and outgoing
More informationData Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview creates a protected endpoint and messaging environment that is secure against today s complex data loss, malware, and spam threats controlling
More informationSaaS Flyer for Trend Micro
SaaS Flyer for Trend Micro Prices Effective July 1, 2008 1 Internet Security 2008 Trend Micro Internet Security 2008 makes it easy to protect your home or small business network, personal identity, and
More informationSun Mgt Bonus Lab 11: Auto-Tagging in PAN-OS 8.X
1 Overview Introduced first in PAN-OS 8.0, the Dynamic IP Address and Tag Registration feature makes a significant step forward in the automation of operational, administrative, and, most importantly,
More informationSecuring the Modern Data Center with Trend Micro Deep Security
Advania Fall Conference Securing the Modern Data Center with Trend Micro Deep Security Okan Kalak, Senior Sales Engineer okan@trendmicro.no Infrastructure change Containers 1011 0100 0010 Serverless Public
More informationSymantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Red Hat Enterprise Linux 5
Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark For Red Hat Enterprise Linux 5 Symantec ESM Baseline Policy Manual for CIS Benchmark for Red Hat Enterprise Linux 5 The software
More informationKASPERSKY ENDPOINT SECURITY FOR BUSINESS
KASPERSKY ENDPOINT SECURITY FOR BUSINESS 1 WHAT WE SEE TODAY 325,000 New Endpoint Threats per day Targeted attacks and malware campaigns Threat reports Continued Exploitation of Vulnerabilities in 3rd
More informationACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems
ACS-3921/4921-001 Computer Security And Privacy Chapter 9 Firewalls and Intrusion Prevention Systems ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been
More informationNetworks with Cisco NAC Appliance primarily benefit from:
Cisco NAC Appliance Cisco NAC Appliance (formerly Cisco Clean Access) is an easily deployed Network Admission Control (NAC) product that allows network administrators to authenticate, authorize, evaluate,
More informationInternet Scanner 7.0 Service Pack 2 Frequently Asked Questions
Frequently Asked Questions Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions April 2005 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Internet Security Systems (ISS)
More informationEndpoint Security for DeltaV Systems
Endpoint Security for DeltaV Systems Decrease risk with intelligent, adaptive scanning Utilize advanced anti-malware protection Identify, remediate and secure your DeltaV system from cybersecurity risks
More informationSIMATIC. Process Control System PCS 7 Symantec Endpoint Protection 11.0 Configuration. Using virus scanners 1. Configuration 2. Commissioning Manual
SIMATIC Process Control System PCS 7 Using virus scanners 1 Configuration 2 SIMATIC Process Control System PCS 7 Symantec Endpoint Protection 11.0 Configuration Commissioning Manual 08/2009 A5E02634984-01
More informationChapter 8 Operating Systems and Utility Programs أ.أمل زهران
Chapter 8 Operating Systems and Utility Programs Chapter 8 Objectives Identify the types of system software Summarize the startup process on a personal computer Summarize the features of several stand-alone
More informationCracked BitDefender SBS Security 2 Years 2000 PCs downloads softwares for pc ]
Cracked BitDefender SBS Security 2 Years 2000 PCs downloads softwares for pc ] Description: BitDefender SBS Security is a robust and easy to use business security and management solution which delivers
More informationClient Guide for Symantec Endpoint Protection and Symantec Network Access Control. For Microsoft Windows
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control For Microsoft Windows Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described
More informationQuickSpecs. Available Packs and Purchase Information. ProLiant Essentials Vulnerability and Patch Management Pack v2.1. Overview.
Overview Pack (VPM) integrates comprehensive vulnerability assessment and advanced patch management functions for HP and non-hp servers running Windows or Red Hat Linux into HP Systems Insight Manager,
More informationCisco s Appliance-based Content Security: IronPort and Web Security
Cisco s Appliance-based Content Security: IronPort E-mail and Web Security Hrvoje Dogan Consulting Systems Engineer, Security, Emerging Markets East 2010 Cisco and/or its affiliates. All rights reserved.
More informationCOMPUTER NETWORK SECURITY
COMPUTER NETWORK SECURITY Prof. Dr. Hasan Hüseyin BALIK (9 th Week) 9. Firewalls and Intrusion Prevention Systems 9.Outline The Need for Firewalls Firewall Characterictics and Access Policy Type of Firewalls
More informationAirtel PC Secure Trouble Shooting Guide
Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does
More informationGFI product comparison: GFI MailEssentials vs. McAfee Security for Servers
GFI product comparison: GFI MailEssentials vs. McAfee Security for Email Servers Features GFI MailEssentials McAfee Integrates with Microsoft Exchange Server 2003/2007/2010/2013 Scans incoming and outgoing
More informationEnterprise Cybersecurity Best Practices Part Number MAN Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
More informationAntivirus Market Trends
Markets, A. Hallawell Research Note 23 July 2003 Magic Quadrant for Enterprise Antivirus, 1H03 Enterprise antivirus vendors are being pressured to innovate, yet enterprises are still waiting for improvements.
More informationLOS ANGELES UNIFIED SCHOOL DISTRICT Office of the Chief Information Officer. DISTRIBUTION: All Schools and Offices ROUTING All Staff
ACTION, TO SHARE LOS ANGELES UNIFIED SCHOOL DISTRICT Office of the Chief Information Officer DISTRIBUTION: All Schools and Offices ROUTING All Staff SUBJECT: BULLETIN NO. K-23 ENTERPRISE LICENSE - NORTON
More informationIronPort C100 for Small and Medium Businesses
I R O N P O R T E M A I L S E C U R I T Y A P P L I A N C E S S I M P L E I N S TA L L AT I O N, E A S Y M A N A G E M E N T, A N D P O W E R F U L P R O T E C T I O N F O R Y O U R E M A I L I N F R A
More informationSymantec Enterprise Security Manager JRE Vulnerability Fix Update Guide
Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide 2 Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide The software described in this book is furnished under
More informationLenovo Europe, Middle East, and Africa Hardware Announcement ZG , dated January 27, 2009
Hardware Announcement ZG09-0077, dated January 27, 2009 Utimaco SafeGuard Enterprise suite of offerings for ThinkVantage Technologies offers hard drive encryption and additional modules for complete PC
More informationIBM WebSphere Application Server V3.5, Advanced Edition Expands Platform Support and Leverages the Performance of the Java 2 Software Development Kit
Software Announcement July 25, 2000 IBM V3.5, Expands Platform Support and Leverages the Performance of the Java 2 Software Development Kit Overview WebSphere Application Server V3.5, manages and integrates
More informationPocket Guide. Products and Services. For Home Computing For Businesses
Pocket Guide Products and Services For Home Computing For Businesses Table of contents About F-Secure 3-4 F-Secure Firsts 5 Award-Winning Software 6 F-Secure Anti-Virus Solutions Home Computing 8 Businesses
More informationSecurity Assessment Checklist
Security Assessment Checklist Westcon Security Checklist - Instructions The first step to protecting your business includes a careful and complete assessment of your security posture. Our Security Assessment
More informationSymantec Enterprise Security Manager Baseline Policy Manual for Security Essentials. Solaris 10
Symantec Enterprise Security Manager Baseline Policy Manual for Security Essentials Solaris 10 Symantec ESM Baseline Policy Manual for Security Essentials for Solaris 10 The software described in this
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationHardening the Education. with NGFW. Narongveth Yutithammanurak Business Development Manager 23 Feb 2012
Hardening the Education IT Environment with NGFW Narongveth Yutithammanurak Business Development Manager 23 Feb 2012 Technology Trends Security Performance Bandwidth Efficiency Manageability Page 2 What
More information: Administration of Symantec Endpoint Protection 14 Exam
250-428: of Symantec Endpoint Protection 14 Exam Study Guide v. 2.2 Copyright 2017 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Altiris are trademarks or registered trademarks
More informationAnnexure E Technical Bid Format
Annexure E Technical Bid Format ANTIVIRUS SOLUTION FOR MAIL SERVER SECURITY AND SERVER SECURITY FOR DESKTOP,LAPTOP Sr. No Description Compliance (Y/N) Remark 01 Must offer comprehensive client/server security
More informationSIMATIC. Process Control System PCS 7 V7.0 SP1 Security Information Note: Setting up antivirus software. Preface. Using virus scanners 2
SIMATIC Process Control System PCS 7 V7.0 SP1 SIMATIC Process Control System PCS 7 V7.0 SP1 Security Information Note: Setting up antivirus software Security Information Note Preface 1 Using virus scanners
More informationKERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE
KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE (4/20/07) WHO IS KERIO? Kerio Technologies provides Internet messaging and firewall software solutions for small to medium sized networks,
More informationTrend Micro s SMB Solutions
Press to Advance to Next Slide Copyright 2004 Trend Micro, Inc. Trend Micro s SMB Solutions Trend Micro Sales Training Module RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line COURSE OBJECTIVES
More informationSeqrite Endpoint Security
Enterprise Security Solutions by Quick Heal Integrated enterprise security and unified endpoint management console Enterprise Suite Edition Product Highlights Innovative endpoint security that prevents
More informationNetwork Performance Test. Business Security Software. Language: English August Last Revision: 11 th October
Network Performance Test Business Security Software Language: English August 2016 Last Revision: 11 th October 2016 Test commissioned by the vendor - 1 - Introduction This report, commissioned by ESET,
More informationMcAfee Embedded Control
McAfee Embedded Control System integrity, change control, and policy compliance in one solution McAfee Embedded Control maintains the integrity of your system by only allowing authorized code to run and
More informationCoupon BitDefender Corporate Security 3 Years 10 PCs internet download software for pc ]
Coupon BitDefender Corporate Security 3 Years 10 PCs internet download software for pc ] Description: BitDefender Corporate Security is a robust and easy to use business security and management solution
More informationDefense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation
Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client
More informationTest Report April esafe Virtual Appliance
Test Report April 2008 esafe Virtual Appliance Vendor Details Name: Aladdin Knowledge Systems Address: HQ: 35 Efal St., Petah Tikva, 49511, ISRAEL UK Office: Fairacres House 2-3, Fairacres Industrial Estate,
More informationDBMS Software Market Forecast, (Executive Summary) Executive Summary
DBMS Software Market Forecast, 2003-2007 (Executive Summary) Executive Summary Publication Date: 4 September 2003 Author Colleen Graham This document has been published to the following Marketplace codes:
More informationClient Guide for Symantec Endpoint Protection Small Business Edition
Client Guide for Symantec Endpoint Protection Small Business Edition The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the
More informationExternal RAID-Based Storage System Analysis by Form Factor
Research Brief External RAID-Based Storage System Analysis by Form Factor Abstract: Gartner Dataquest forecasts factory revenue for modular external RAID controllerbased storage systems will grow at a
More informationFuture-ready security for small and mid-size enterprises
First line of defense for your network Quick Heal Terminator (UTM) (Unified Threat Management Solution) Data Sheet Future-ready security for small and mid-size enterprises Quick Heal Terminator is a high-performance,
More informationPredicts 2004: The Future of Windows Server
Strategic Planning, T. Bittman Research Note 19 November 2003 Predicts 2004: The Future of Windows Server In 2004, distributed manageability will emerge as the key to the future of Windows Server, especially
More informationSymantec Network Access Control Starter Edition
Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationIBM Managed Security Services for Security
Service Description 1. Scope of Services IBM Managed Security Services for E-mail Security IBM Managed Security Services for E-mail Security (called MSS for E-mail Security ) may include: a. E-mail Antivirus
More informationSymantec Network Access Control Starter Edition
Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More information4Q02 Update: Disk Storage Forecast Scenarios,
Forecast Analysis 4Q02 Update: Disk Storage Forecast Scenarios, 2002-2003 Abstract: Clearly, the near-term fate of the disk storage system market is more tightly coupled with micro IT spending trends than
More informationGLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications
GLOBALPROTECT Prevent Breaches and Secure the Mobile Workforce GlobalProtect extends the protection of Palo Alto Networks Next-Generation Security Platform to the members of your mobile workforce, no matter
More informationSymantec Endpoint Protection
Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec Insight and by SONAR, a single,
More informationSonicWALL Security Software
Email Security SonicWALL Email Security 7.2.4 Software System Compatibility SonicWALL Email Security 7.2.4 Software is supported on systems with the following: Operating Systems Windows 2003, SP2 Windows
More informationescan Quick Reference and Installation Guide This document provides information to install escan and serves as a quick reference to run key tasks.
This document provides information to install escan and serves as a quick reference to run key tasks. escan Quick Reference and Installation Guide escan Quick Reference Guide 1 escan User Guide The software
More informationIBM Proventia Management SiteProtector. Scalability Guidelines Version 2.0, Service Pack 7.0
IBM Proventia Management SiteProtector Scalability Guidelines Version 2.0, Service Pack 7.0 Copyright Statement Copyright IBM Corporation 1994, 2008. IBM Global Services Route 100 Somers, NY 10589 U.S.A.
More informationCisco NAC Network Module for Integrated Services Routers
Cisco NAC Network Module for Integrated Services Routers The Cisco NAC Network Module for Integrated Services Routers (NME-NAC-K9) brings the feature-rich Cisco NAC Appliance Server capabilities to Cisco
More informationAntivirus Technology
Antivirus Technology CSH6 Chapter 41 Antivirus Technology Chey Cobb & Allysa Myers 1 Copyright 2015 M. E. Kabay. All rights reserved. Topics AV Terminology AV Issues History of Viral Changes Antivirus
More information