VALUE AND COST ANALYSIS of Microsoft Endpoint Protection Versus Best of Breed Solutions

Size: px
Start display at page:

Download "VALUE AND COST ANALYSIS of Microsoft Endpoint Protection Versus Best of Breed Solutions"

Transcription

1 VALUE AND COST ANALYSIS of Microsoft Endpoint Protection Versus Best of Breed Solutions Richard Stiennon Chief Research Analyst IT-Harvest 2013 IT-Harvest 1

2 VALUE AND COST ANALYSIS of Microsoft Endpoint Protection Versus Best of Breed Solutions Value and Cost Analysis This white paper investigates the hidden costs in Microsoft s End Point Protection (formerly Forefront Security Suite). Four primary arguments are presented to demonstrate that the total cost of ownership of Microsoft End Point Protection is higher than using best of breed products from a third party vendors. 1. That there are additional investments in supporting Microsoft services that are not included in ECAL; most importantly, Software Assurance subscription. 2. That deployment, management and maintenance of End Point Protection requires additional investment in Microsoft infrastructure. 3. Microsoft s lack of protection for non-microsoft products means continued investment in security for Unix platforms and does not address the consumerization of IT. 4. Microsoft has begun to de-emphasize ForeFront security. Introduction Microsoft has recently announced (September, 2012) the end of life (EOL) of many of its Forefront security products. It is evident that Microsoft is de-emphasizing its security offerings. The Forefront protection suite has long been a loss-leader as Microsoft bundled it in ecal licensing and offered it for free as long as customers subscribed to Software Assurance. This EOL is an acknowledgement that Forefront, in particular the anti-malware components, are not of significant value to Microsoft, let alone the market. Microsoft s message to current customers with Enterprise Client Access Licenses (ecal) is that System Center 2012 Endpoint Protection (previously known as Forefront Endpoint Protection 2010) is FREE. From Microsoft s documentation: The convergence of client management and security eliminates the expense of purchasing and maintaining separate solutions by allowing you to remove existing endpoint protection solutions and repurpose those resources elsewhere. Is Microsoft s endpoint protection truly free or are there hidden costs? This white paper evaluates that free claim by examining the additional costs associated with deploying Endpoint Protection and abandoning third party anti-malware solutions. Direct costs include the additional licenses for server products, very high costs for support, and the hidden cost of Software Assurance licenses. We also look at the holes in Microsoft s protection strategy represented by the proliferation of devices (consumerization of IT), multiple OS platforms in most data centers, and the lack of cloud leverage for just-in-time protection IT-Harvest 2

3 Microsoft has successfully leveraged its dominance in enterprise desktop operating system and productivity tools to make deeper gains in the data center through its server offerings including: Windows Server, Forefront Threat Management Gateway 2010 Server, MSQL, Exchange, Certificate Server, and SharePoint Server. But, as of September, 2012, Microsoft no longer offers the Forefront TMG, or Forefront for Exchange and Sharepoint. One aspect of computing infrastructures that can be decoupled from network, desktop and server platforms is security. Ironically, the argument has been well made that the very security problems plaguing most organizations rapid spread of malware, targeted attacks, and drive-by downloads from malicious web sites, is attributable to Microsoft s domination of so many computers worldwide. This mono-culture of computing platforms means that malware created to infect home users with Trojans meant to steal their banking credentials also infects enterprise desktops, servers, and infrastructure. In other words, by successfully dominating both consumer and enterprise platforms, Microsoft has created a world wide security problem that entails investment, lost time, management, compliance and reporting requirements to control. Microsoft s Forefront product suite was acquired in an attempt to address these security issues and protect their dominant position in the enterprise. The EOL of much of the Forefront product suite is an indication that Microsoft is de-emphasizing stand-alone security products IT-Harvest 3

4 Enterprise Client Access Licensing Microsoft s Client Access License (CAL) is a blanket end user license agreement that is purchased on a per-server/per-end user basis. It is separate from desktop licensing for Windows, Office or other applications. The Core CAL agreement grants access to Windows Server 2008, Exchange Server 2010, Office SharePoint Server 2010 and Systems Center Configuration (formerly Systems Management Server). Access to additional services is available piecemeal, for either an ala carte pricing or bundled in the Enterprise CAL license (ECAL). These additional services were, until the recent EOL of much of the Forefront product line: Server CAL Core CAL Suite Enterprise CAL Suite Windows Server Exchange Server SharePoint Server Lync Server System Center Forefront Windows Server Standard Active Directory Rights Management Services Exchange server Standard Exchange Server Enterprise SharePoint Server Standard SharePoint Server Enterprise Lync Server Standard Lync Server Enterprise System Center Configuration Manager System Center Client Management Suite Forefront Protection Suite Forefront Endpoint Protection Forefront Unified Access Gateway These Enterprise additions to the Core CAL if purchased separately can cost $256.00/year (System Center Operations Manager Client OML is $32 per license for instance) but if purchased as an ECAL bundle cost $86 on top of the Core CAL pricing. Many Microsoft customers purchase the ECAL bundle to get the additional functionality of one or two services but do not use the full suite. Note that ECAL does not include MSQL or Terminal Services CAL, and that this would be an additional purchase if the customer is not currently licensed for these at a cost ranging from $ $187 per user license IT-Harvest 4

5 This gives rise to the question: Should an enterprise that has the full ECAL licensing drop their use of a third party anti-virus product because the ECAL suite incorporates End Point Protection? Enterprises considering this question should be aware that there are three reasons that using the marginally free security products entails additional costs. Sometimes free is not free. 1) Direct costs in additional Microsoft licensing requirements and support fees. Microsoft Endpoint Protection uses Microsoft System Center 2012 Configuration Manager which could require additional server acquisitions for most large enterprises. The management console is specified to support up to 10,000 clients. A large installment would involve multiple licenses for the management consoles along with the costs associated with maintaining the additional Microsoft servers. System Center 2012 Configuration Manager uses Microsoft SQL Server 2005 (Standard Edition or Enterprise Edition) for detailed report and log generation. SQL Server 2005 Enterprise Edition is needed to support more than 2,000 clients and can be purchased with the Server Subscription License (SSL) for Forefront Security. Microsoft customers interviewed for our research reported that getting premium support for the Forefront security solutions to resolve issues on a timely basis required them to upgrade their support contract for all of the products bundled in ECAL, it could not be broken out separately. This could be extremely expensive as Microsoft s top level of support. Premier Ultimate, can cost between $200K and $1 million annually based on the complexity of the deployment. Other levels of support; Premier Foundation, Premier Standard and Premier Plus, are available in hourly blocks whereas Premier Ultimate is a 24X7 service. Responding to virus outbreaks and security issues is one of the most critical services a vendor can supply and the support from most anti-malware vendors is one of the values that provides the most differentiation. A decision to switch to Forefront client and server security based on Microsoft claims that it is free should not be made until the support service costs have been accounted for as well as the server license costs for a large deployment. An anti-malware solution from a non- Microsoft source will have dedicated support options at lower total costs IT-Harvest 5

6 2) Hidden costs in expanding the Microsoft monoculture. Every business has to evaluate risks associated with vendor lock-in. Not only are there risks that the vendor could discontinue support for a particular offering (note the discontinuation of the Threat Management Gateway for instance) but it also creates a cycle of increased lockin as the vendor continues to offer more and more products inducing the customer to move to those new products, consolidate support contracts and billing, and ultimately lose the flexibility to choose optimal products or negotiate the best prices. In the particular case of buying security products from Microsoft some consideration is due the concept of diversification. Every Microsoft server product is a member of a community of end points that suffer from continuous cycles of attacks. Microsoft issues software fixes on a monthly schedule with emergency updates announced frequently outside that schedule. Not only do the desktops, web servers, file servers, communication servers, and data base servers have to be patched but the systems hosting the security products themselves have to be patched. This lends additional cost to the overall system maintenance task as well as introduces security issues because the security products are exposed to the same types of attacks that they are deployed to protect against. One IT security manager that we interviewed (prior to the integration of End Point Protection into the Configuration Manager) pointed out that Microsoft Forefront Security Suite had too many moving parts that required more resources to manage. Different skill sets and different people were involved in managing Forefront. Staff from security would handle the AV issues, a database specialist managed SQL Server, and another specialist was required for the server admin. Yet another group s services were required to administer WSUS on the Forefront Security Management server. Responsibility for managing a standalone security product resides with the AV team alone and is therefore less expensive. 3) Costs associated with not having a best of breed security solution. Microsoft has yet to demonstrate that its End Point Protection (same technology as Security Essentials for consumers) is a best of breed product. While there may be a cost tradeoff between the best products and good enough products in many areas, such as Certificate Servers, proxies, data base servers, and servers, that argument does not hold with security products where much of the value of those products resides in their ability to provide the best protection possible. For instance an anti-malware product that blocks 1% more malware than another provides more than 1% greater value. The additional costs of cleanup measured in lost productivity and direct IT support resources could be thousands of dollars a month for the typical midsize enterprise. A data breach resulting from a Trojan or Bot infection would lead to extraordinary costs from mandated disclosure and reparation requirements, 2013 IT-Harvest 6

7 damage to brand equity, and similar costs. According to the 5th Annual U.S. Cost of a Data Breach Study from the Ponemon Institute the average cost of a data breach is over $6 million. The current best practices for malware defense is to leverage the cloud to reduce the time to detection from first appearance of a new attack to when updated signatures are fully deployed. By default Microsoft End Point Protection reports malware infections to the cloud for retrieval of latest updates but does not leverage the cloud to detect and analyze new variants of malware. 4) ForeFront security is not a heterogeneous solution While Microsoft has recently added Endpoint Protection clients for OSX and Linux it has simultaneously discontinued support for Forefront Protection for Sharepoint, Exchange, and gateway. This means that enterprises will have to maintain products from a third party. In other words, most of the costs associated with best of breed AV solutions will still be required and only the endpoint client costs are potentially challenged by Microsoft Endpoint Protection. One of the predominant trends in IT computing is the move to mobile devices. Executives and knowledge workers are introducing new devices to the enterprise at an uncontrolled rate. ipads, smart phones from Blackberry, Google, and Apple, predominate and will need additional management and security products to accommodate this consumerization of IT or Bring Your Own Device (BYOD) IT-Harvest 7

8 Software Assurance Licensing In 2005 Microsoft began offering Software Assurance. This extra licensing regime serves to protect customers from the unpredictable release cycle of major new versions of Microsoft products such as Office Productivity and Windows. Because the typical contract is for three years and Microsoft releases often exceed that, many customers opt out of Software Assurance. However, as of August 1, 2011 in order to get signature updates for Endpoint Protection customers must have a paid up Software Assurance license. This could significantly add to the cost of using End Point Protection. According to Forester a desktop Software Assurance License is 29% of the cost of the underlying software and for a server 25%. Product use rights: End Point Protection are those in effect during the term of corresponding Enterprise CAL Suite Software Assurance coverage. In other words, a customer must enroll in Microsoft Software Assurance licensing for all of the licensed products to get the benefits from End Point Protection. Number Of Seats ecal Cost Per Seat Annual Software Assurance , ,350 10, ,375 In the chart above the standard ecal pricing per seat of $175 was discounted 5, 10, and 15% for increasing organization size. Software Assurance, required for signature updates is an annual cost of 29% of the ecal license. Very few organizations of these sizes will be able to afford Microsoft Premium Support and will have to do without. IT-Harvest estimates that a typical mid to large enterprise will face over $431K annual increases in the cost of providing anti-malware defense across the enterprise. This model does not take into account other drawbacks associated with Microsoft Endpoint Protection such as lack of available training, poor reporting, or the increased costs of supporting (updating, patching, cleaning) additional Windows servers. It also does not include costs associated with potentially higher malware infection rates, which are hard to predict and may vary widely from customer to customer. Enterprises would do well to also factor in these and other potential costs when considering a move to Microsoft End Point Protection IT-Harvest 8

9 Changes to Forefront in 2012 Forefront Endpoint Protection 2010 is being folded into System Center 2012 Configuration Manager and will be called System Center 2012 End Point Protection. With this change Microsoft has bundled all of its end point management capabilities into System Center including configuration management, data protection, operations manager, and virtual machine management. Note that End Point Protection does not yet support Windows 8. The following Forefront products are no longer available but existing customers can get up to five years of support: Forefront Protection 2010 for Exchange Server (FPE) Forefront Protection 2010 for SharePoint (FPSP) Forefront Security for Office Communications Server (FSOCS) Forefront Threat Management Gateway 2010 (TMG) Forefront Threat Management Gateway Web Protection Services (TMG WPS) With the discontinuation of the Forefront server security products Server Security Management Consoles are no longer needed. Cost for core CAL has increased by 10% while ECAL pricing has remained the same. However the new components of ECAL as well as Forefront Protection cannot be enacted unless Software Assurance is purchased. Conclusion Microsoft Enterprise Client Access Licensing gives the enterprise desktop protection from the End Point Protection product, but additional Microsoft products, hardware and support must be purchased for management. Most organizations maintain servers and devices that are not from Microsoft. Abandoning a third party AV vendor completely will not be possible. Security should be treated as a separate layer in IT infrastructure. Basing malware defense on 100% Microsoft products decreases an enterprise s overall security posture because the management and control systems are subject to the same attacks that they are protecting against. The way Microsoft has made Software Assurance a requirement for signature updates to Forefront components is an abject example of the entanglement that can occur when enterprises single source a vendor IT-Harvest 9

10 Enterprises considering abandoning third party AV solutions should use the following checklist in their TCO calculations: Additional costs associated with upgrade to ecal licensing Additional costs for MSQL licenses for System Center 2012 Configuration Manager Additional costs for Software Assurance across the ecal suite Costs of additional IT resources for managing the required components Clean up costs of infections from using good-enough versus best-of breed solution including additional IT support costs and secondary loss of productivity. Enterprises should not switch to Microsoft End Point Protection. Even though client and server licenses are included in the Enterprise Client Access License bundle, the additional costs could exceed $500,000 annually and the overall value delivered is less. This white paper was produced with the sponsorship of F-Secure. Its conclusions and opinions expressed are solely those of IT-Harvest and not necessarily those of our sponsors. References: 1. Microsoft Changes Forefront Roadmap 2. Microsoft System Center 2012 Endpoint Protection 3. Microsoft CAL guide: 4. Forrester Examines Strategies for Microsoft Licensing 5. Dell Licensing Center CAL FAQ: en&s=bsd&~page=5 6. Microsoft pricing for Forefront Client Security: aspx 7. Microsoft Service Offering Plans: 8. Forefront Team blog: 9. System problems Microsoft Premier Mission Critical Description: mspx 11. New level of premium support Microsoft Forefront TCO WhitePaper Miscrosoft Forefront Server Security Management Console Pricing Planning and Deploying the Server Infrastructure for Configuration Manager library/bb aspx 15. Schedule and Strategy Update for Forefront Endpoint Protection. schedule-and-strategy-update-for-forefront-endpoint-protection.aspx Network World Magazine Microsoft customers sour on Software Assurance news/2007/ microsoft-customers-sour-on-software.html 18. Microsoft Premier Support page IT-Harvest 10

Securing Today s Mobile Workforce

Securing Today s Mobile Workforce WHITE PAPER Securing Today s Mobile Workforce Secure and Manage Mobile Devices and Users with Total Defense Mobile Security Table of Contents Executive Summary..................................................................................

More information

TBR. Thinking outside the ecal box can reduce cost and improve solution value. A white paper sponsored by Symantec

TBR. Thinking outside the ecal box can reduce cost and improve solution value. A white paper sponsored by Symantec Thinking outside the ecal box can reduce cost and improve solution value We see two types of customers: 1) those that understand the importance of security and management and 2) those that are ambiguous

More information

A Guide to Closing All Potential VDI Security Gaps

A Guide to Closing All Potential VDI Security Gaps Brought to you by A Guide to Closing All Potential VDI Security Gaps IT and security leaders are embracing virtual desktop infrastructure (VDI) as a way to improve security for an increasingly diverse

More information

Internet of Things. The Digital Oilfield: Security in SCADA and Process Control. Mahyar Khosravi

Internet of Things. The Digital Oilfield: Security in SCADA and Process Control. Mahyar Khosravi Internet of Things The Digital Oilfield: Security in SCADA and Process Control Mahyar Khosravi makhosra@cisco.com Critical infrastructures worldwide not ready to battle cyber attacks, claims new study.

More information

Microsoft licensing for the Consumerization of IT

Microsoft licensing for the Consumerization of IT Volume Licensing brief Microsoft licensing for the Consumerization of IT Table of Contents This brief applies to all Microsoft Volume Licensing programs. Summary... 1 What s New in This Brief... 1 Introduction...

More information

Microsoft 365 Business FAQs

Microsoft 365 Business FAQs Microsoft 365 Business FAQs Last updated April 27 th, 2018 Table of Contents General... 3 What is Microsoft 365 Business?... 3 Who should consider adopting Microsoft 365 Business?... 3 How can I get Microsoft

More information

Forefront Server Security for Partners. Frederique Dennison Security and Management Product Marketing Manager

Forefront Server Security for Partners. Frederique Dennison Security and Management Product Marketing Manager Forefront Server Security for Partners Frederique Dennison Security and Management Product Marketing Manager Why does Forefront matter? Security is the #1 customer satisfaction driver AU$30M industry in

More information

Microsoft IT deploys Work Folders as an enterprise client data management solution

Microsoft IT deploys Work Folders as an enterprise client data management solution Microsoft IT deploys Work Folders as an enterprise client data management solution Published May 2014 The following content may no longer reflect Microsoft s current position or infrastructure. This content

More information

Datacenter Management and The Private Cloud. Troy Sharpe Core Infrastructure Specialist Microsoft Corp, Education

Datacenter Management and The Private Cloud. Troy Sharpe Core Infrastructure Specialist Microsoft Corp, Education Datacenter Management and The Private Cloud Troy Sharpe Core Infrastructure Specialist Microsoft Corp, Education System Center Helps Deliver IT as a Service Configure App Controller Orchestrator Deploy

More information

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER FORTINET Say Yes to BYOD PAGE 2 Introduction Bring Your Own Device (BYOD) and consumerization

More information

UNCLASSIFIED. Mimecast UK Archiving Service Description

UNCLASSIFIED. Mimecast UK  Archiving Service Description UNCLASSIFIED 26/05/2016 v2.3 Mimecast UK Email Archiving Service Description Mimecast UK Email Archiving, provides businesses with a secure, scalable cloud-based message archive. It s designed to significantly

More information

Licensing Expert Series. Licensing The Private Cloud

Licensing Expert Series. Licensing The Private Cloud Licensing Expert Series Licensing The Private Cloud Agenda Transformational Trends Why Private Cloud? The Microsoft Private Cloud The Microsoft Private Cloud Components Windows Server 2012 R2 & System

More information

Windows Server 2012 R2 Licensing Datasheet

Windows Server 2012 R2 Licensing Datasheet Windows Server 2012 R2 Licensing Datasheet Product overview Windows Server 2012 R2 captures Microsoft s experience of delivering global-scale cloud services to provide an enterprise-class server and cloud

More information

Microsoft Lync Server 2010 LICENSING GUIDE

Microsoft Lync Server 2010 LICENSING GUIDE Microsoft Lync Server 2010 LICENSING GUIDE Table of Contents Executive Summary... 3 1 Key Changes for Lync Server 2010... 4 1.1 New Brand... 4 1.2 New Plus CAL... 4 1.3 Changes to the Enterprise CAL and

More information

MaaS360 Unified Mobility Management

MaaS360 Unified Mobility Management Feature phone 1999- BlackBerry 2010- MDM 2013- EMM 2016- UMM 2016+ Cognitive UMM 2017+ MaaS360 Unified Mobility Management July 2016 Unified Mobility Management Quesitons How important is CYOD & BYOD strategy?

More information

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS 10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS WHITE PAPER INTRODUCTION BANKS ARE A COMMON TARGET FOR CYBER CRIMINALS AND OVER THE LAST YEAR, FIREEYE HAS BEEN HELPING CUSTOMERS RESPOND

More information

ISO27001 Preparing your business with Snare

ISO27001 Preparing your business with Snare WHITEPAPER Complying with ISO27001 Preparing your business with Snare T he technical controls imposed by ISO (International Organisation for Standardization) Standard 27001 cover a wide range of security

More information

Security Challenges: Integrating Apple Computers into Windows Environments

Security Challenges: Integrating Apple Computers into Windows Environments Integrating Apple Computers into Windows Environments White Paper Parallels Mac Management for Microsoft SCCM 2018 Presented By: Table of Contents Environments... 3 Requirements for Managing Mac Natively

More information

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips Table of Contents Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips 2 Current State of BYOD in the Enterprise Defining BYOD Bring-Your-Own-Device (BYOD): a business practice

More information

Securing Office 365 with MobileIron

Securing Office 365 with MobileIron Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,

More information

Prevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise,

Prevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise, Prevx 3.0 v3.0.1.65 Product Overview - Core Functionality April, 2009 includes overviews of MyPrevx, Prevx 3.0 Enterprise, and Prevx 3.0 Banking and Ecommerce editions Copyright Prevx Limited 2007,2008,2009

More information

Licensing Expert Series. Licensing Office 2013 & Office 365

Licensing Expert Series. Licensing Office 2013 & Office 365 Licensing Expert Series Licensing Office 2013 & Office 365 1 Agenda Trends The New Office and Office 365 Project 2013 & Visio 2013 Office 2013 Servers, CALs & CAL Suites Software Assurance Migrations and

More information

Protect Your End-of-Life Windows Server 2003 Operating System

Protect Your End-of-Life Windows Server 2003 Operating System Protect Your End-of-Life Windows Server 2003 Operating System Your guide to mitigating risks in your Windows Server 2003 Systems after the end of support End of Support is Not the End of Business When

More information

Total Cost of Ownership: Benefits of ECM in the OpenText Cloud

Total Cost of Ownership: Benefits of ECM in the OpenText Cloud Total Cost of Ownership: Benefits of ECM in the OpenText Cloud OpenText Managed Services brings together the power of an enterprise cloud platform with the technical skills and business experience required

More information

Licensing & Pricing FAQ

Licensing & Pricing FAQ Licensing & Pricing FAQ Table of Contents WINDOWS SERVER 2012 DATACENTER AND STANDARD EDITIONS... 4 Q1. What is new in Windows Server 2012?... 4 Q2. What is the difference between Windows Server 2012 Standard

More information

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN Perimeter Defenses Enterprises need to take their security strategy beyond stacking up layers of perimeter defenses to building up predictive

More information

Building Resilience in a Digital Enterprise

Building Resilience in a Digital Enterprise Building Resilience in a Digital Enterprise Top five steps to help reduce the risk of advanced targeted attacks To be successful in business today, an enterprise must operate securely in the cyberdomain.

More information

Service Description VMware Workspace ONE

Service Description VMware Workspace ONE VMware Workspace ONE Last Updated: 05 April 2018 The product described in this Service Description is protected by U.S. and international copyright and intellectual property laws. The product described

More information

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and

More information

NetDefend Firewall UTM Services

NetDefend Firewall UTM Services NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860/1660/2560/2560G) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content

More information

Protect Your End-of-Life Windows Server 2003 Operating System

Protect Your End-of-Life Windows Server 2003 Operating System Protect Your End-of-Life Windows Server 2003 Operating System Your guide to mitigating risks in your Windows Server 2003 Systems after the end of support End of Support is Not the End of Business When

More information

That Set the Foundation for the Private Cloud

That Set the Foundation for the Private Cloud for Choosing Virtualization Solutions That Set the Foundation for the Private Cloud solutions from work together to harmoniously manage physical and virtual environments, enabling the use of multiple hypervisors

More information

Demystifying Microsoft Desktop Licensing

Demystifying Microsoft Desktop Licensing Demystifying Microsoft Desktop Licensing Presenter: Amy Amos Licensing Account Executive, CDW Corporation Thank you for being here today August 18, 2014 Agenda Desktop Operating Systems Reimaging & Downgrade

More information

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW: SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE Protecting your business assets and sensitive data requires regular vulnerability assessment,

More information

Mapping traditional AV detection failures. October 2017

Mapping traditional AV detection failures. October 2017 Mapping traditional AV detection failures October 2017 TABLE OF CONTENTS Introduction 01 Methodology 02 Findings 03 AV failures common malware 03 Multiple AV failures 04 Four leading AVs failures 05 Conclusion

More information

MICROSOFT APPLICATIONS

MICROSOFT APPLICATIONS MICROSOFT APPLICATIONS MICROSOFT SOFTWARE SOLUTIONS THE EFFECTIVE WAY TO DELIVER MICROSOFT APPLICATIONS The Microsoft Office suite of applications are a business essential; one that is used each and every

More information

Computer Hardware and Software Standards for OSU Extension

Computer Hardware and Software Standards for OSU Extension Computer Hardware and Software Standards for OSU Extension Sections 1. Executive Summary 2. Criteria for Establishing Standards 3. Computers a. Primary Choices for Highest Level of Support b. Secondary

More information

Managed Endpoint Defense

Managed Endpoint Defense DATA SHEET Managed Endpoint Defense Powered by CB Defense Next-gen endpoint threat detection and response DEPLOY AND HARDEN. Rapidly deploy and optimize endpoint prevention with dedicated security experts

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

<Placeholder cover we will adjust> Microsoft Azure Stack Licensing Guide (end customers)

<Placeholder cover we will adjust> Microsoft Azure Stack Licensing Guide (end customers) Microsoft Azure Stack Licensing Guide (end customers) August 2017 Introduction This licensing guide is for people who would like to gain a basic understanding of how

More information

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity How NSFOCUS Protected the G20 Summit Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity SPONSORED BY Rosefelt is responsible for developing NSFOCUS threat intelligence and web

More information

ACHIEVING FIFTH GENERATION CYBER SECURITY

ACHIEVING FIFTH GENERATION CYBER SECURITY ACHIEVING FIFTH GENERATION CYBER SECURITY A Survey Research Report of IT and Security Professionals MARCH 2018 INTRODUCTION The pursuit of the highest level of cyber security is a top priority for IT and

More information

Pedal to the Metal: Mitigating New Threats Faster with Rapid Intel and Automation

Pedal to the Metal: Mitigating New Threats Faster with Rapid Intel and Automation Pedal to the Metal: Mitigating New Threats Faster with Rapid Intel and Automation Date: November 14, 2016 Underwritten by: Introduction Agencies deal with a greater volume and velocity of cyber threats

More information

Migration from On-Premise to Cloud

Migration from On-Premise to Cloud Economies of Cloud Migration from On-Premise to Cloud Hybrid Environments Changing the Value Proposition Hosting is growing 4x faster than Enterprise Cloud Instances are growing at 45% CAGR 19% of new

More information

IBM Security Intelligence on Cloud

IBM Security Intelligence on Cloud Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients

More information

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.

More information

Reducing Cybersecurity Costs & Risk through Automation Technologies

Reducing Cybersecurity Costs & Risk through Automation Technologies Reducing Cybersecurity Costs & Risk through Automation Technologies Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: November 2017 Ponemon Institute Research

More information

1

1 The New for Midsize Businesses Plus Desktop Apps Web Apps Mobile Simple IT o All services work together o No servers to set up o is always up-to-date o Use on 5 devices/user o Everything you need in one

More information

Total Cost of Ownership: Benefits of the OpenText Cloud

Total Cost of Ownership: Benefits of the OpenText Cloud Total Cost of Ownership: Benefits of the OpenText Cloud OpenText Managed Services in the Cloud delivers on the promise of a digital-first world for businesses of all sizes. This paper examines how organizations

More information

IBM Case Manager on Cloud

IBM Case Manager on Cloud Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the

More information

Cisco Exam Questions & Answers

Cisco Exam Questions & Answers Cisco 700-101 Exam Questions & Answers Number: 700-101 Passing Score: 825 Time Limit: 120 min File Version: 31.4 http://www.gratisexam.com/ Cisco 700-101 Exam Questions & Answers Exam Name: Business Edition

More information

<Placeholder cover we will adjust> Microsoft Azure Stack Licensing Guide (Hosters and service providers)

<Placeholder cover we will adjust> Microsoft Azure Stack Licensing Guide (Hosters and service providers) Microsoft Azure Stack Licensing Guide (Hosters and service providers) Introduction This licensing guide is for people who would like to gain a basic understanding of

More information

GUIDE. MetaDefender Kiosk Deployment Guide

GUIDE. MetaDefender Kiosk Deployment Guide GUIDE MetaDefender Kiosk Deployment Guide 1 SECTION 1.0 Recommended Deployment of MetaDefender Kiosk(s) OPSWAT s MetaDefender Kiosk product is deployed by organizations to scan portable media and detect

More information

5 Reasons for IT to Get Physical with Access Control

5 Reasons for IT to Get Physical with Access Control 5 Reasons for IT to Get Physical with Access Control White Paper A guide to choosing an IT and user-friendly building security system Network security and building security are equally important. If either

More information

IT Security Cost Reduction

IT Security Cost Reduction Quantifying the Impact of Greater Endpoint Security Effectiveness, Higher Performance, and Smaller Footprint In the constant drive for increased productivity and cost-effectiveness, enterprises are continuously

More information

Future of the Data Center

Future of the Data Center Future of the Data Center Maine Digital Government Summit November 29, 2012 Dan Diltz Vice President, Public Sector 1 Session Description A new data center is the perfect opportunity to start fresh by

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

Service Description VMware Horizon Cloud Service on Microsoft Azure

Service Description VMware Horizon Cloud Service on Microsoft Azure VMware Horizon Cloud Service on Microsoft Azure Effective: October 12, 2017 The product described in this Service Description is protected by U.S. and international copyright and intellectual property

More information

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance. Real-time Visibility Network Access Control Endpoint Compliance Mobile Security ForeScout CounterACT Continuous Monitoring and Mitigation Rapid Threat Response Benefits Rethink IT Security Security Do

More information

Ryan KS office thesee

Ryan KS office thesee SERVERR and WORKSTATION REMOTE MANAGEMENT SERVICES Ryan Dental Systems Dental Computer Systems Support and Sales 303 2 nd Street, PO Box 194, Inland NE 68954 5506 SW 31stPh: 402-461-5575 Terrace Topeka

More information

SIEM: Five Requirements that Solve the Bigger Business Issues

SIEM: Five Requirements that Solve the Bigger Business Issues SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered

More information

How Microsoft IT Reduced Operating Expenses Using Virtualization

How Microsoft IT Reduced Operating Expenses Using Virtualization How Microsoft IT Reduced Operating Expenses Using Virtualization Published: May 2010 The following content may no longer reflect Microsoft s current position or infrastructure. This content should be viewed

More information

How Microsoft s Enterprise Mobility Suite Provides helps with those challenges

How Microsoft s Enterprise Mobility Suite Provides helps with those challenges 2 Agenda Enterprise challenges for mobility How Microsoft s Enterprise Mobility Suite Provides helps with those challenges Hybrid identity With Azure Active Directory and Azure Active Directory Premium

More information

Symantec Endpoint Protection

Symantec Endpoint Protection The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,

More information

AND FINANCIAL CYBER FRAUD INSTITUTIONS FROM. Solution Brief PROTECTING BANKING

AND FINANCIAL CYBER FRAUD INSTITUTIONS FROM. Solution Brief PROTECTING BANKING PROTECTING BANKING AND FINANCIAL INSTITUTIONS FROM CYBER FRAUD Enabling the financial industry to become proactively secure and compliant Overview In order to keep up with the changing digital payment

More information

SandBlast Agent FAQ Check Point Software Technologies Ltd. All rights reserved P. 1. [Internal Use] for Check Point employees

SandBlast Agent FAQ Check Point Software Technologies Ltd. All rights reserved P. 1. [Internal Use] for Check Point employees SandBlast Agent FAQ What is Check Point SandBlast Agent? Check Point SandBlast Agent defends endpoints and web browsers with a complete set of realtime advanced browser and endpoint protection technologies,

More information

VMware Enterprise Desktop Virtualization. Robin Crewe Senior Director, Virtual Desktop Infrastructure (VDI)

VMware Enterprise Desktop Virtualization. Robin Crewe Senior Director, Virtual Desktop Infrastructure (VDI) VMware Enterprise Desktop Virtualization Robin Crewe Senior Director, Virtual Desktop Infrastructure (VDI) Background - emerging PC trends Heterogeneity Ubiquitous Network Security Threats Data Theft Phishing

More information

Cisco Enterprise Cloud Suite for Service Providers. Cisco Knowledge Network Data Center Jan 16, 2018

Cisco Enterprise Cloud Suite for Service Providers. Cisco Knowledge Network Data Center Jan 16, 2018 Cisco Enterprise Cloud Suite for Service Providers Cisco Knowledge Network Data Center Jan 16, 2018 Agenda Cisco ONE Software Suite Overview Cisco Enterprise Agreement for Cisco ONE Cisco Service Provider

More information

Commercial Licensing Reference Guide. Windows Server 2012 R2

Commercial Licensing Reference Guide. Windows Server 2012 R2 Commercial Licensing Reference Guide Windows Server 2012 R2 Introduction This guide can help Microsoft Commercial Licensing customers understand how Windows Server 2012 R2 is licensed through Microsoft

More information

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com BULLETPROOF365 SECURING YOUR IT Bulletproof365.com INTRODUCING BULLETPROOF365 The world s leading productivity platform wrapped with industry-leading security, unmatched employee education and 24x7 IT

More information

AUTHORIZATION TO ENTER INTO A CONTRACT WITH SOFTWAREONE, INC. FOR LICENSING OF MICROSOFT SOFTWARE

AUTHORIZATION TO ENTER INTO A CONTRACT WITH SOFTWAREONE, INC. FOR LICENSING OF MICROSOFT SOFTWARE Agenda Report TO: FROM: SUBJECT: Honorable Mayor and City Council Department of Information Technology AUTHORIZATION TO ENTER INTO A CONTRACT WITH SOFTWAREONE, INC. FOR LICENSING OF MICROSOFT SOFTWARE

More information

Reaping the Benefits of Managed Services

Reaping the Benefits of Managed Services Figure 1. Converged Network with Managed Services These services complement each other when bundled together. For example, an IP VPN service makes managing an IP voice network simpler and more effective

More information

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load Complete User Protection Consumerization IT Work Load 2 Then... File/Folder & Removable Media Email & Messaging Web Access Employees IT Admin 3 Now! File/Folder & Removable Media Email & Messaging Web

More information

Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia

Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia F5 EMEA Webinar Listopad 2014 Andrzej Kroczek Field Systems Engineer Today s Network and App Access: So Many Variables! LOCATIONS USERS DEVICES

More information

etrust Antivirus Release 7.1

etrust Antivirus Release 7.1 D A T A S H E E T etrust Antivirus Release 7.1 etrust Antivirus provides superior protection from the perimeter to the PDA against today s most prevalent security threat viruses. It eliminates virus infections,

More information

A Data-Centric Approach to Endpoint Security

A Data-Centric Approach to Endpoint Security A Data-Centric Approach to Endpoint Security September 28, 2017 Eric Ogren Senior Analyst, Security 451 Research Bill Bradley Director of Product Marketing Digital Guardian About Eric Ogren Eric Ogren

More information

Introducing MVISION. Cohesive Cloud-based Management of Threat Countermeasures and Devices Leveraging Built-in Device Controls. Jon Parkes.

Introducing MVISION. Cohesive Cloud-based Management of Threat Countermeasures and Devices Leveraging Built-in Device Controls. Jon Parkes. Introducing MVISION Cohesive Cloud-based Management of Threat Countermeasures and Devices Leveraging Built-in Device Controls Jon Parkes McAfee 1 All information provided here is subject to non-disclosure

More information

Gujarat Forensic Sciences University

Gujarat Forensic Sciences University Gujarat Forensic Sciences University Knowledge Wisdom Fulfilment Cyber Security Consulting Services Secure Software Engineering Infrastructure Security Digital Forensics SDLC Assurance Review & Threat

More information

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com BULLETPROOF365 SECURING YOUR IT Bulletproof365.com INTRODUCING BULLETPROOF365 The world s leading productivity platform wrapped with industry-leading security, unmatched employee education and 24x7 IT

More information

How-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018

How-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018 How-to Guide: Tenable Nessus for Microsoft Azure Last Updated: April 03, 2018 Table of Contents How-to Guide: Tenable Nessus for Microsoft Azure 1 Introduction 3 Auditing the Microsoft Azure Cloud Environment

More information

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud Christopher Covert Principal Product Manager Enterprise Solutions Group Copyright 2016 Symantec Endpoint Protection Cloud THE PROMISE OF CLOUD COMPUTING We re all moving from challenges like these Large

More information

Securing the Modern Data Center with Trend Micro Deep Security

Securing the Modern Data Center with Trend Micro Deep Security Advania Fall Conference Securing the Modern Data Center with Trend Micro Deep Security Okan Kalak, Senior Sales Engineer okan@trendmicro.no Infrastructure change Containers 1011 0100 0010 Serverless Public

More information

SEPARATING FACT FROM FICTION MICROSOFT & POWER MANAGEMENT

SEPARATING FACT FROM FICTION MICROSOFT & POWER MANAGEMENT SEPARATING FACT FROM FICTION MICROSOFT & POWER MANAGEMENT DON T BE FOOLED: FREE WILL COST YOU... While Microsoft Windows and System Center include power management features, their capabilities are rudimentary

More information

IBM Security Services Overview

IBM Security Services Overview Services Overview Massimo Nardone Senior Lead IT Security Architect Global Technology Services, IBM Internet Security Systems massimo.nardone@fi.ibm.com THE VEHICLE THE SKILL THE SOLUTION Today s Business

More information

WHITE PAPER SEPTEMBER VMWARE vsphere AND vsphere WITH OPERATIONS MANAGEMENT. Licensing, Pricing and Packaging

WHITE PAPER SEPTEMBER VMWARE vsphere AND vsphere WITH OPERATIONS MANAGEMENT. Licensing, Pricing and Packaging WHITE PAPER SEPTEMBER 2017 VMWARE vsphere AND vsphere WITH OPERATIONS MANAGEMENT Licensing, Pricing and Packaging Table of Contents Executive Summary 3 VMware vsphere with Operations Management Overview

More information

Commercial Product Matrix

Commercial Product Matrix PRODUCT MATRIX 1H2016 FOR INTERNAL USE ONLY Trend Micro Commercial Product Matrix SELLING TREND MICRO SECURITY SOLUTIONS Small Business or /Medium Business? < 100 Users > 100 Users Trend Micro Customer

More information

Simplifying the Branch Network

Simplifying the Branch Network Simplifying the Branch Network By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Aruba, a Hewlett Packard Enterprise company Executive Summary A majority of IT organizations are experiencing

More information

The McAfee MOVE Platform and Virtual Desktop Infrastructure

The McAfee MOVE Platform and Virtual Desktop Infrastructure The McAfee MOVE Platform and Virtual Desktop Infrastructure Simplifying and accelerating security management for virtualized environments Table of Contents Wish List of Security Elements for Virtualized

More information

Number: Passing Score: 825 Time Limit: 120 min File Version: Vendor: Cisco. Exam Code:

Number: Passing Score: 825 Time Limit: 120 min File Version: Vendor: Cisco. Exam Code: 700-104 Number: 000-000 Passing Score: 825 Time Limit: 120 min File Version: 130705 http://www.gratisexam.com/ Vendor: Cisco Exam Code: 700-104 Exam Name: Business Edition 6000 for Account Managers (BE6KAM)

More information

Key Features. DATA SHEET

Key Features.  DATA SHEET DATA SHEET Total Defense THREAT MANAGER r12 Overview: Total Defense Threat Manager r12 integrates anti-malware, groupware protection and network access control in one easy-touse solution, providing comprehensive

More information

Frequently Asked Questions Customers

Frequently Asked Questions Customers Important Updates on Maintenance Plans Frequently Asked Questions Customers This document answers frequently asked questions about maintenance plan changes as we move to one business model. Updated: May

More information

Deploy. A step-by-step guide to successfully deploying your new app with the FileMaker Platform

Deploy. A step-by-step guide to successfully deploying your new app with the FileMaker Platform Deploy A step-by-step guide to successfully deploying your new app with the FileMaker Platform Share your custom app with your team! Now that you ve used the Plan Guide to define your custom app requirements,

More information

Click to edit Master title style. DIY vs. Managed SIEM

Click to edit Master title style. DIY vs. Managed SIEM DIY vs. Managed SIEM Meet Paul Paul Caiazzo Principal, Chief Security Architect CISSP, CISA, CEH M.S. Information Security and Assurance 15+ years of experience in Information Security Connect with me:

More information

Reducing Security Administration Time by 60 percent for More Efficient City Government with Symantec and Novacoast

Reducing Security Administration Time by 60 percent for More Efficient City Government with Symantec and Novacoast City of Aurora Reducing Security Administration Time by 60 percent for More Efficient City Government with Symantec and Novacoast Fending off viruses and other malware was straining IT resources at the

More information

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

Protecting Against Online Fraud. F5 EMEA Webinar August 2014 Protecting Against Online Fraud F5 EMEA Webinar August 2014 Agenda Fraud threat trends and business challenges Web fraud protection Mobile fraud protection Security operations center Example architecture

More information

The Future of Network Infrastructure & Management

The Future of Network Infrastructure & Management WHITE PAPER The Future of Network Infrastructure & Management Software-defined networks, cloud management and LTE offer the ability to adapt a network to the changing workforce. Future Look: New Way to

More information

THREE PATHS TO CLOUD CHOICE WITHOUT COMPLEXITY. Copyright 2013 EMC Corporation. All rights reserved.

THREE PATHS TO CLOUD CHOICE WITHOUT COMPLEXITY. Copyright 2013 EMC Corporation. All rights reserved. THREE PATHS TO CLOUD CHOICE WITHOUT COMPLEXITY 1 Two Fundamental Challenges 65% MAINTAIN Increase Revenue 35% INVEST Lower Operational Costs Gartner IT Key Metrics Data, December 2012 2 Cloud Transforms

More information

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms. SOLUTION OVERVIEW Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms. What is a mobile protection product? A mobile protection

More information

Avoiding the Cost of Confusion: SQL Server Failover Cluster Instances versus Basic Availability Group on Standard Edition

Avoiding the Cost of Confusion: SQL Server Failover Cluster Instances versus Basic Availability Group on Standard Edition One Stop Virtualization Shop Avoiding the Cost of Confusion: SQL Server Failover Cluster Instances versus Basic Availability Group on Standard Edition Written by Edwin M Sarmiento, a Microsoft Data Platform

More information

Cisco Start. IT solutions designed to propel your business

Cisco Start. IT solutions designed to propel your business Cisco Start IT solutions designed to propel your business Small and medium-sized businesses (SMBs) typically have very limited resources to invest in new technologies. With every IT investment made, they

More information