Comprehensive Endpoint Security. Chris Quinn Systems Engineer March 24, 2009
|
|
- Jordan Russell
- 6 years ago
- Views:
Transcription
1 Comprehensive Endpoint Security Chris Quinn Systems Engineer March 24, 2009
2 Agenda 1 Today s Security Challenges 2 Symantec Endpoint Protection, NAC, and Open Collaborative Architecture 3 Why Symantec? 4 Next Steps Endpoint Security 3
3 Today s Challenges Internet Kiosks & Shared Computers Guests WANs & Extranets Consultants SSL VPN Employees Working at Home IPsec VPN Wireless Networks Web Applications Endpoint Security 4
4 The Complexity Challenge What s wrong with the current world? Multiple vendors without a complete product offering Agent bloat Too many endpoint agents to manage Too many consoles Too many silo d point solutions Specialized talent / resources needed for to configure and manage each application Endpoint Security 5
5 Multiple Complex Consoles/Agents Endpoint Security 6
6 Benefits of a Comprehensive Endpoint Solutions Threat Protection Keep the Bad things Out Protect against malware Protect from known and unknown threats Manage multiple endpoint technologies Network Access Control Trust, but Verify Enforce Endpoint Security policies Allow guest access to the network Provide access only to properly secured endpoints Data Loss Prevention & Encryption Keep the Good things In Discover confidential data Monitor its use Enforce policies to prevent its loss Encrypt to prevent unauthorized access Endpoint Management Keep the Wheels On Integrates security, data loss and management Provides automation Increases visibility and control Lowers total cost of ownership by managing multiple endpoint technologies Endpoint Security 7
7 Keeping the bad things out Endpoint Security 8
8 Business Problems at the Endpoint Endpoint management costs are increasing Cost of downtime impacts both productivity and revenue, productivity hit largest in enterprise Costs to acquire, manage and administer point products are increasing, as well as the demand on system resources Complexity is increasing as well Complexity and resources needed to manage disparate endpoint protection technologies are inefficient and time consuming Growing number of known and unknown threats Stealth-based and silent attacks are increasing, so there is a need for antivirus to do much more Source: Internet Security Threat Report Vol. XIII; Mar 2008 Endpoint Security 9
9 Keeping up with threats Endpoint Security 10
10 Changes in the Threat Landscape From Hackers To Thieves Fame motivated Financially motivated Noisy and highly visible Silent Indiscriminate Highly targeted Few named variants Overwhelming variants Endpoint Security 11
11 Key Ingredients for Endpoint Protection AntiVirus World s leading AV solution Most (41) consecutive VB100 Awards Virus Bulletin December 2008 Antivirus Endpoint Security 12 12
12 Key Ingredients for Endpoint Protection Antispyware Best rootkit detection and removal VxMS = superior rootkit protection Antispyware Viruses, Trojans, Worms Antivirus Source: Thompson Cyber Security Labs, August 2006 Endpoint Security 13 13
13 Key Ingredients for Endpoint Protection Firewall Industry leading endpoint firewall technology Gartner MQ Leader 4 consecutive years Rules based FW can dynamically adjust port settings to block threats from spreading Firewall Spyware, Rootkits Antispyware Viruses, Trojans, Worms Antivirus Endpoint Security 14 14
14 Key Ingredients for Endpoint Protection Intrusion Prevention Intrusion Prevention Worms, Spyware Firewall Spyware, Rootkits Antispyware Combines NIPS (network) and HIPS (host) Generic Exploit Blocking (GEB) one signature to proactively protect against all variants Granular application access control TruScan TM - Proactive Threat Scanning technology - Very low (0.0049%) false positive rate Detects 1,000 new threats/month - not detected by leading av engines No False Alarm 25M Installations Viruses, Trojans, Worms Antivirus False Alarms Fewer than 50 False Positives for every 1 MM PC s Endpoint Security 15 15
15 Intrusion Prevention System (IPS) Combined technologies offer best defense Intrusion Prevention (IPS) (N)IPS Network IPS (H)IPS Host IPS Deep packet inspection Attack-facing (Symantec sigs. via LiveUpdate, Custom sigs, SNORT-like) System Lockdown White listing (tightly control which applications can run) Generic Exploit Blocking Vulnerability-facing (Signatures for vulnerability) TruScan TM Behavior-based (Proactive Threat Scan technology) Endpoint Security 16
16 Exploit Timeline Vulnerability Announcement Vulnerability Exploit Virus Signature 0 Day <24 Hours 6-7 Days ~3 Hours Later Generic Exploit Blocking Vulnerability-Based Signature Based on vulnerabilities characteristics Number of Variants Blocked Single GEB Signature MS RPC DCOM BO MS_RPC_NETDD E_BO Threat Blaster W32.Mytob.IM@ mm 394 MS LSASS BO Sasser TruScan TM Proactive Threat Scan technology Behavior Analysis RPC_NETAPI32_B O NetBIOS MS NO (TCP) W97M.Invert.B W32.Gaobot.AA Y Endpoint Security 17 17
17 TruScan TM - Proactive Threat Scan Detects 1,000 threats/month not detected by top 5 leading antivirus engines 6 months testing with Norton consumer technology Very low false positive rate (0.004%) Fewer than 50 False Positives for every 1M computers No set up or configuration required Endpoint Security 18
18 Key Ingredients for Endpoint Protection Device and Application Control Device and Application Control 0-day, Key Logging Intrusion Prevention Prevents data leakage Restrict Access to devices (USB keys, Back-up drives) Whitelisting allow only trusted applications to run Worms, Spyware Firewall Spyware, Rootkits Antispyware Viruses, Trojans, Worms Antivirus W32.SillyFDC targets removable memory sticks spreads by copying itself onto removable drives such as USB memory sticks automatically runs when the device is next connected to a computer Endpoint Security 19 19
19 Symantec Endpoint Protection 11.0 Protect Against Unauthorized Applications The Risks Users installing unauthorized applications like Skype, BitTorrent, LimeWire, emule, etc. The Solution Block unauthorized applications using Application Control Only an Endpoint Security solution with full device control capabilities can protect against all threats Application Control included in base product; no extra cost Endpoint Security 20 20
20 Symantec Endpoint Protection 11.0 Protect Against FireWire and Bluetooth Attacks The Risks Physical attacks against endpoints Exploit PoC winlockpwn can break into a Windows machine using just FireWire connection Vulnerability by design in FireWire that will not be fixed Windows may be vulnerable to Bluetooth attacks that can take complete control over the system Microsoft recently released a critical Bluetooth security patch (MS08-030) to address this The Solution Block FireWire and Bluetooth using Device Control Only an Endpoint Security solution with full device control capabilities can protect against all threats Device Control included in base product; no extra cost Endpoint Security 21 21
21 Key Ingredient for Endpoint Compliance Network Access Control Device and Application Control Network Access Control Comes ready for Network Access Control add on Agent is included, no extra agent deployment Simply license SNAC Enforcement Intrusion Prevention Firewall Antispyware Antivirus Endpoint Security 22 22
22 How to Protect Against Threats with a Single Agent, Single Console Network Access Control Benefits: Device and Application Control Intrusion Prevention Increased Protection, Control & Manageability Firewall Reduced Cost, Complexity & Risk Exposure Antispyware Antivirus Symantec Endpoint Protection 11.0 Symantec Network Access Control 11.0 Endpoint Security 23
23 Incremental Value SNAC enabled Device and Application Control Enhanced Spyware/Rootkit protection Antispyware Antivirus Intrusion Prevention Firewall Extensive Intrusion Prevention functions (TruScan) SAV CE 10.x Antispyware Antivirus Firewall/Device Control and Network Access Control Ready Symantec Endpoint Protection 11.0 Endpoint Security 24
24 Flexible Deployment Options Standard deployment Intrusion Prevention* Antispyware Antivirus Comprehensive Endpoint Protection deployment Device and Application Control Firewall Intrusion Prevention Antispyware Antivirus Complete Endpoint Security Solution Network Access Control Device and Application Control Firewall Intrusion Prevention Antispyware Antivirus Security Functions enabled as needed Endpoint Security 25
25 Medium Large Organizations (100+) Symantec Endpoint Protection (SEP) Install SEP with antivirus and antispyware options enabled Enable additional protection features at own pace Migrate from Symantec AntiVirus at own pace For desktops, laptops and network servers Symantec Multi-tier Protection* SEP and additional solutions to protect multiplatform network environments, mobile devices, mail servers and SMTP gateways Excellent choice for organizations with Microsoft Exchange For organizations with multiple network servers and many workstations or laptops Symantec Multi-tier Protection* and SNAC Enforcers** SEP and additional solutions to protect multiplatform network environments, mobile devices, mail servers and SMTP gateways SNAC enforcer options provide greatest flexibility For organizations with multiple network servers and many workstations or laptops *SMP includes SEP plus Antivirus for Mac, Linux, Windows Mobile, as well as Mail Security for Exchange, Domino, Premium Antispam and 8300 Virutal Edition **SNAC Enforcers verify that a host is compliant with minimum security policies. Typical types are Gateway, LAN, DHCP and Self Enforcement Endpoint Security 27 27
26 Symantec Global Intelligence Network 4 Symantec SOCs 80 Symantec Monitored Countries 40,000+ Registered Sensors in 180+ Countries 11 Symantec Security Response Centers > 7,000 Managed Security Devices Million Systems Worldwide + 2Million Probe Network + Advanced Honeypot Network Tokyo, Japan Calgary, Canada Dublin, Ireland San Francisco, CA Mountain View, CA Reading, England Chengdu, China Culver City, CA Austin, TX Alexandria, VA Pune, India Taipei, Taiwan Chennai, India Sydney, Australia Received 41 consecutive Virus Bulletin 100% Certification awards* TruScan TM technology catches 1,000 more threats per month than other AV vendors** * Source: Endpoint virusbtn.org; Security ** Source: 28 Symantec 28
27 Trust, but verify Endpoint Security 29
28 What is Network Access Control? Restricts access to your network by creating a closed system Offers automatic endpoint remediation before access is granted Checks adherence to endpoint security policies even when connected to network Employees Non-employees Unmanaged Managed On-site Remote Corporate Network Endpoint Security 30
29 Solution: Network Access Control Checks adherence to endpoint security policies NAC is process that creates a much more secure network Antivirus installed and current? Firewall installed and running? Required patches and service packs? Required configuration? Fixes configuration problems Controls guest access Network Access Control helps prevent malware from spreading throughout the network Endpoint Security 31
30 Symantec Network Access Control 3 Key Components 1. Central Management Console 2. Endpoint Evaluation Technology 3. Enforcer Endpoint Security 32
31 1. Central Management Console Symantec Endpoint Protection Manager Policy Management Web-based GUI Enterprise class/scale Role-based access Hierarchical views Integration with Active Directory Same Management Console used for Symantec Endpoint Protection 11.0 Endpoint Security 33
32 2. Endpoint Evaluation Technologies Unmanagable Endpoints Remote Scanner Good Unmanaged Endpoints Dissolvable Agents Better Managed Endpoints Persistent Agents Best Symantec Endpoint Protection 11.0 agent is SNAC ready Endpoint Security 34
33 3. Enforcers Host-based Network-based (optional) Symantec Self-Enforcement Symantec Gateway Enforcer Symantec DHCP Enforcer Symantec LAN Enforcer-802.1X Good Better Best Endpoint Security 35
34 Why Symantec s NAC Symantec makes implementing a NAC less daunting & costly Neutral Deployable Today Flexible Primary Differentiators: Greater diversity of NAC approaches than any other vendor Operational Efficiencies Field-proven NAC solution with hundreds of customers Deployable today No need to wait for standards or upgrades Award winning solution Endpoint Security 36
35 Symantec NAC Self-Enforcement: How It Works Persistent Agent Symantec Endpoint Protection Manager Onsite or Remote Laptop Quarantine Protected Network Remediation Resources Client connects to network and validates policy Persistent Agent performs selfcompliance checks Compliance pass: Apply Office firewall policy Compliance fail: Apply Quarantine firewall policy Host Integrity Rule Anti-Virus On Anti-Virus Updated Personal Firewall On Service Pack Updated Status Patch Updated Endpoint Security 37 37
36 Keeping the good things in Endpoint Security 38
37 Keep the Wheels On Endpoint Security 39
38 Single Centrally Managed Console Symantec Endpoint Protection Symantec Network Access Control Symantec Endpoint Encryption Symantec Data Loss Prevention Endpoint Symantec Management Console Endpoint Security 40
39 Migration Made Easy Overview What is it? A free tool to help customers migrate to Symantec Endpoint Protection Symantec Integrated Component Product offered with pre-configures templates to remove previously installed solutions Symantec Competitive Where do I get and When? Download now at Altiris Client Management Suite 30 Day Trial available today Who can use this? Any customer or partner may leverage the Symantec Endpoint Protection Integrated Component, but we recommend that customers consider that they are deploying the Altiris management platform. Endpoint Security 41
40 Complement Security with Management Symantec Endpoint Protection Integrated Component Altiris Software Delivery Suite Altiris Client Management Suite Streamline migrations Initiate scans or agent health tasks Dashboards integrate security and operational information Apply Patches Ensure software is installed and stays installed Report machines not connecting Identify missing hard-drives Policy-based software delivery Application Management Software Virtualization Patch Management Backup and Recovery Application Usage Remote Control Endpoint Security 42
41 Driving to Convergence Situation Solution Integration on Open Collaborative Architecture CMDB Duplication of tasks Gaps require manual processes Multiple consoles and agents Various data repositories Overlapping policies Native integration Single view of compliance Consolidated status reporting Pre-built workflow processes Endpoint Security 43 43
42 Why Open Collaborative Architecture? Security 3 rd Party Mgmt Solutions Symantec Collaborative Solutions Endpoint, Data, IT policy Compliance Mgmt Industry, Financial, IT policy Collaborative solution INFORMATION RISK INFRASTRUCTURE SECURITY STORAGE BUSINESS Business Continuity & COMPLIANCE OPERATIONS CONTINUITY Protect, retain, recover, HA/DR Resource Mgmt Asset, TCO, capacity, Performance Incident Resolution Helpdesk, Notify, Problem mgmt Open Collaborative Architecture Infrastructure Mgmt Discover, Deploy, Config, Change Evolving Evolving product product requirements requirements Tie Tie into into multiple multiple levels levels Cross 3 rd Party Cross multiple Products multiple processes processes and and disciplines disciplines Management Cooperate Cooperate in in cross cross vendor Product vendor environments / environments Leverage Leverage Symantec Services Symantec configuration, configuration, metadata, metadata, operations, operations, policy/task policy/task control control Data, Task & Operational Services Console, Workflow, Security, CMDB Altiris Endpoint Management SEP Endpoint Security Management SSIM Security Information Management Symantec Products CCS Control & Compliance Suite EV Information Risk & Compliance Vontu Data Loss Prevention NBU / BE Backup & Recovery SF / CC Storage Management VCS(-One) HA/DR & Server Management Symantec Endpoint Technology Security Solutions 44 44
43 Why Symantec? Endpoint Security 45
44 Why Symantec? Greater Security Greater Control Endpoint Security 46
45 Analysts Position Symantec as a Leader Altiris Platform Endpoint Security 47
46 Analysts Position Symantec as a Leader Symantec Endpoint Protection Altiris Platform Endpoint Security 48
47 Analysts Position Symantec as a Leader Symantec Network Access Control Symantec Endpoint Protection Altiris Platform Endpoint Security 49
48 Analysts Position Symantec as a Leader Symantec Endpoint Encryption Symantec Network Access Control Symantec Symantec Endpoint Protection Altiris Platform Endpoint Security 50
49 Analysts Position Symantec as a Leader Symantec Data Loss Prevention Endpoint Symantec Endpoint Encryption Symantec Network Access Control Symantec Endpoint Protection Altiris Platform Endpoint Security 51
50 Who Trusts Symantec Over 100 Million Endpoints Protected Endpoint Security 52
51 Questions? Chris Quinn Systems Engineer, Symantec Endpoint Security 54
52 Thank You! Copyright 2007 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Endpoint Security 55
Introducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection. Bernard Laroche Endpoint security Product marketing
Introducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection Bernard Laroche Endpoint security Product marketing Agenda 1 Organizational Risk and Endpoint Challenges 32 Symantec Endpoint
More informationTeleworking and Security: IT All Begins with Endpoints. Jim Jessup Solutions Manager, Information Risk Management June 19, 2007
Teleworking and Security: IT All Begins with Endpoints Jim Jessup Solutions Manager, Information Risk Management June 19, 2007 Agenda 1 Today s Landscape 2 Trends at the Endpoint 3 Endpoint Security 4
More informationAgenda. Today s IT Challenges. Symantec s Collaborative Architecture. Symantec TM Endpoint Management Suite. Connecting Symantec Technologies Today
Agenda 1 Today s IT Challenges 2 Symantec s Collaborative Architecture 3 Symantec TM Endpoint Management Suite 4 Connecting Symantec Technologies Today 5 Q & A 1 Traditional Protection isn t Good Enough
More informationData Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview creates a protected endpoint and messaging environment that is secure against today s complex data loss, malware, and spam threats controlling
More informationSymantec Endpoint Protection
The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,
More informationSymantec Multi-tier Protection
Trusted protection from malware and email-bourne threats for multiplatform environments Overview Symantec Multi-tier Protection is designed to safeguard enterprise assets and lower risk by providing unmatched
More informationSymantec Endpoint Protection 11.0
OVERVIEW Symantec Endpoint Protection replaces Symantec AntiVirus Corporate Edition, Symantec Client Security, Symantec Sygate Enterprise protection and Confidence Online for PCs. Symantec Endpoint Protection
More informationSymantec Network Access Control Starter Edition
Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationSymantec Network Access Control Starter Edition
Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access
More informationData Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement
Simplified endpoint enforcement Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationSymantec Network Access Control Starter Edition
Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationSymantec Endpoint Protection 14
Symantec Endpoint Protection Cloud Security Made Simple Symantec Endpoint Protection 14 Data Data Sheet: Sheet: Endpoint Endpoint Security Security Overview Last year, we saw 431 million new malware variants,
More information: Administration of Symantec Endpoint Protection 14 Exam
250-428: of Symantec Endpoint Protection 14 Exam Study Guide v. 2.2 Copyright 2017 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Altiris are trademarks or registered trademarks
More informationThe Convergence of Management and Security. Stephen Brown, Sr. Product Manager December 2008
The Convergence of Management and Security Stephen Brown, Sr. Product Manager December 2008 Agenda 1 A Robust Management Foundation 2 The Value of Security and Management Convergence 3 Symantec Endpoint
More informationSymantec Enterprise Solution Product Guide
SOLUTION BRIEF: SYMANTEC ENTERPRISE SOLUTION PRODUCT GUIDE........................................ Symantec Enterprise Solution Product Guide Who should read this paper Businesses participating in the
More informationInternet Security Threat Report Volume XIII. Patrick Martin Senior Product Manager Symantec Security Response October, 2008
Internet Security Threat Report Volume XIII Patrick Martin Senior Product Manager Symantec Security Response October, 2008 Agenda 1 ISTR XIII Important Facts 2 ISTR XIII Key Messages 3 ISTR XIII Key Facts
More informationA Secure Foundation for Your Business. Lauren Duda - Product Marketing Manager March 13th, 2007
A Secure Foundation for Your Business Lauren Duda - Product Marketing Manager March 13th, 2007 Sample Agenda Slide 1 Corporate issues and threat landscape 2 MS Vista and Symantec Security 3 Symantec Endpoint
More informationCybercrime e minacce informatiche: trend emergenti e soluzioni innovative u
Cybercrime e minacce informatiche: trend emergenti e soluzioni innovative u Nicola D Ottavio Sales Security Specialist nicola_dottavio@symantec.com 1 On July 13, 2010 a unique form of malware was discovered
More informationSymantec Multi-tier Protection
Trusted protection from malware and email-borne threats for multiplatform environments Overview safeguards enterprise assets and lowers risk by providing unmatched protection against threats for laptops,
More informationSymantec Client Security. Integrated protection for network and remote clients.
Symantec Client Security Integrated protection for network and remote clients. Complex Internet threats require comprehensive security. Today's complex threats require comprehensive security solutions
More informationSymantec Endpoint Protection
Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec Insight and by SONAR, a single,
More informationSR B25 Symantec.cloud Security Solutions: Expert Insights into , Web, Endpoint and IM Security Best Practices
SR B25 Symantec.cloud Security Solutions: Expert Insights into Email, Web, Endpoint and IM Security Best Practices Ronald Poserina Director, Systems Engineering SR B25: Symantec.cloud Security Solutions
More informationChanging face of endpoint security
Changing face of endpoint security S A N T H O S H S R I N I V A S A N C I S S P, C I S M, C R I S C, C E H, C I S A, G S L C, C G E I T D I R E C T O R S H A R E D S E R V I C E S, H C L T E C H N O L
More informationReviewer s guide. PureMessage for Windows/Exchange Product tour
Reviewer s guide PureMessage for Windows/Exchange Product tour reviewer s guide: sophos nac advanced 2 welcome WELCOME Welcome to the reviewer s guide for NAC Advanced. The guide provides a review of the
More informationCisco Network Admission Control (NAC) Solution
Data Sheet Cisco Network Admission Control (NAC) Solution New: Updated to include the Cisco Secure Network Server (SNS) Cisco Network Admission Control (NAC) solutions allow you to authenticate wired,
More informationDefense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation
Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client
More informationSYMANTEC DATA CENTER SECURITY
SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information
More informationCisco Self Defending Network
Cisco Self Defending Network Integrated Network Security George Chopin Security Business Development Manager, CISSP 2003, Cisco Systems, Inc. All rights reserved. 1 The Network as a Strategic Asset Corporate
More informationNovell ZENworks Network Access Control
Brochure RESOURCE MANAGEMENT www.novell.com Novell ZENworks Network Access Control Novell and Your Strong Perimeter Fast pre-connect testing that does not interfere with the end user s logging on experience
More informationSymantec Protection Suite Add-On for Hosted Security
Symantec Protection Suite Add-On for Hosted Email Security Overview Malware and spam pose enormous risk to the health and viability of IT networks. Cyber criminal attacks are focused on stealing money
More informationSecuring the Empowered Branch with Cisco Network Admission Control. September 2007
Securing the Empowered Branch with Cisco Network Admission Control September 2007 Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. 1 Contents 1 The Cisco Empowered Branch 2 Security Considerations
More informationCA Host-Based Intrusion Prevention System r8
PRODUCT BRIEF: CA HOST-BASED INTRUSION PREVENTION SYSTEM CA Host-Based Intrusion Prevention System r8 CA HOST-BASED INTRUSION PREVENTION SYSTEM (CA HIPS) BLENDS A STAND-ALONE FIREWALL WITH INTRUSION DETECTION
More informationSecuring Your Business Against the Diversifying Targeted Attacks Leonard Sim
Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim Manager, Client & Partner Services, Asia 1 Agenda 2010 Threats Targeted Attacks Defense Against Targeted Attacks Questions 2
More informationForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.
Real-time Visibility Network Access Control Endpoint Compliance Mobile Security ForeScout CounterACT Continuous Monitoring and Mitigation Rapid Threat Response Benefits Rethink IT Security Security Do
More informationMcAfee Embedded Control
McAfee Embedded Control System integrity, change control, and policy compliance in one solution McAfee Embedded Control maintains the integrity of your system by only allowing authorized code to run and
More informationSecuring Your Environment with Dell Client Manager and Symantec Endpoint Protection
Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection Altiris, Now Part of Symantec Copyright 2007 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,
More informationEM L01 Introduction to Mobile
EM L01 Introduction to Scott Jareo Principal Field Enablement Mgr. 1 Agenda 1 Welcome and Introduction 2 Overview 3 Lab Exercises 4 Resources and Conclusion 2 Leading Concerns In Enterprise Mobility Discussions
More informationMcAfee Public Cloud Server Security Suite
McAfee Public Cloud Server Security Suite Comprehensive security for AWS and Azure cloud workloads As enterprises shift their data center strategy to include and often lead with public cloud server instances,
More informationNetDefend Firewall UTM Services
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860/1660/2560/2560G) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content
More informationConnectWise Automate. What is ConnectWise Automate?
What is ConnectWise Automate? ConnectWise Automate is a remote monitoring and management tool (RMM) that allows us to actively track the health and performance of your IT network. We compile that data
More informationUnderstanding Network Access Control: What it means for your enterprise
Understanding Network Access Control: What it means for your enterprise Network access control is a term that is highly used, but not clearly defined. By understanding the reasons for pursuing a network
More informationPutting Trust Into The Network Securing Your Network Through Trusted Access Control
Putting Trust Into The Network Securing Your Network Through Trusted Access Control Steve Hanna, Juniper Networks Co-Chair, Trusted Network Connect Sub Group of Trusted Computing Group ACSAC December 2006
More informationSymantec Endpoint Protection 12
Symantec Endpoint Protection 12 Hundreds of Millions of New Pieces of Malware Mean You Have to Do Things Differently Graham Ahearne, Marcus Brownell Product Management 1 Agenda 1 2 3 Challenges How Symantec
More informationSymantec Small Business Solutions
Symantec Small Business Solutions Protect All the Information That Drives Your Business Protect computers and information together with Symantec for a confident future. Full spectrum business protection
More informationfor businesses with more than 25 seats
for businesses with more than 25 seats ESET Business Solutions 1/6 Whether your business is just starting out or is established, there are a few things that you should expect from the software you use
More informationAngelo Gentili Head of Business Development, EMEA Region, PartnerNET
Angelo Gentili Head of Business Development, EMEA Region, PartnerNET The Innovation Solution in the Business Security Field. PartnerNet introduces Seqrite Welcome To Dynamic. Scalable. Future-Ready. Why
More informationKey Features. DATA SHEET
DATA SHEET Total Defense THREAT MANAGER r12 Overview: Total Defense Threat Manager r12 integrates anti-malware, groupware protection and network access control in one easy-touse solution, providing comprehensive
More informationfor businesses with more than 25 seats
for businesses with more than 25 seats ESET Business Solutions 1/6 Whether your business is just starting out or is established, there are a few things that you should expect from the software you use
More informationSymantec & Blue Coat Technical Update Webinar 29. Juni 2017
Avantec Blue Coat/Symantec Webinar Jean Marc Edder Senior Systems Engineer The Global Leader in Cyber Network + + Cloud Global market leader in Endpoint, Email, Data Loss Prevention and Website, User Authentication
More informationKASPERSKY ENDPOINT SECURITY FOR BUSINESS
KASPERSKY ENDPOINT SECURITY FOR BUSINESS 1 WHAT WE SEE TODAY 325,000 New Endpoint Threats per day Targeted attacks and malware campaigns Threat reports Continued Exploitation of Vulnerabilities in 3rd
More informationSecuring Your Most Sensitive Data
Software-Defined Access Securing Your Most Sensitive Data Company Overview Digital Growth Means Digital Threats Digital technologies offer organizations unprecedented opportunities to innovate their way
More informationWhy ESET. We help more than 100,000,000 users worldwide to Enjoy Safer Technology. The only vendor with record-breaking protection
Why ESET The only vendor with record-breaking protection ESET has the longest unbroken run of VB100 awards for malware detection of any IT security vendor. We ve been excelling at VB100 tests since May
More informationSecure & Manage The World s Information
1 Secure & Manage The World s Information Governance Policy Compliance Risk Management Incident Management Classification Data Loss Prevention Information ediscovery Archiving / Retention Infrastructure
More informationMcAfee Embedded Control for Retail
McAfee Embedded Control for Retail System integrity, change control, and policy compliance for retail point of sale systems McAfee Embedded Control for retail maintains the integrity of your point-of-sale
More informationSymantec Endpoint Protection and Management Seminar May 13, 2008
Symantec Endpoint Protection and Management Seminar May 13, 2008 Agenda 8:00 8:30 am Registration and Breakfast 8:30 9:30 am Revolutionizing Endpoint Security Teresa Chen - Symantec 9:30 9:45 am Break
More informationWhite Paper February McAfee Policy Enforcer. Securing your endpoints for network access with McAfee Policy Enforcer.
White Paper February 2006 McAfee Policy Enforcer Securing your endpoints for network access with McAfee Policy Enforcer White Paper February 2006 Page 2 Table of Contents Executive Summary 3 Enforcing
More informationSymantec Reference Architecture for Business Critical Virtualization
Symantec Reference Architecture for Business Critical Virtualization David Troutt Senior Principal Program Manager 11/6/2012 Symantec Reference Architecture 1 Mission Critical Applications Virtualization
More informationKEEP YOUR BUSINESS SECURE WITH ESET. Proven. Trusted.
KEEP YOUR BUSINESS SECURE WITH ESET Proven. Trusted. Trust ESET with your Endpoint protection. A pioneer of the antivirus industry for more than 25 years. 25 Years Securing Endpoints, Creating Efficiencies
More informationTrend Micro Deep Security
Trend Micro Deep Security Endpoint Security Similarities and Differences with Cisco CSA A Trend Micro White Paper May 2010 I. INTRODUCTION Your enterprise invested in Cisco Security Agent (CSA) because
More informationSeqrite Endpoint Security
Enterprise Security Solutions by Quick Heal Integrated enterprise security and unified endpoint management console Enterprise Suite Edition Product Highlights Innovative endpoint security that prevents
More informationAT&T Endpoint Security
AT&T Endpoint Security November 2016 Security Drivers Market Drivers Online business 24 x 7, Always on Globalization Virtual Enterprise Business Process / IT Alignment Financial Drivers CapEx / OpEx Reduction
More informationStopping Advanced Persistent Threats In Cloud and DataCenters
Stopping Advanced Persistent Threats In Cloud and DataCenters Frederik Van Roosendael PSE Belgium Luxembourg 10/9/2015 Copyright 2013 Trend Micro Inc. Agenda How Threats evolved Transforming Your Data
More informationKlaudia Bakšová System Engineer Cisco Systems. Cisco Clean Access
Klaudia Bakšová System Engineer Cisco Systems Cisco Clean Access Agenda 1. Securing Complexity 2. NAC Appliance Product Overview and In-Depth 3. NAC Appliance Technical Benefits The Challenge of Securing
More informationReal-time, Unified Endpoint Protection
Real-time, Unified Endpoint Protection Real-Time, Unified Endpoint Protection is a next-generation endpoint protection company that delivers realtime detection, prevention and remediation of advanced threats
More informationDeployment of security devices can result in significant financial savings from reduction or redirection of IT staff resources needed to deploy,
SECURITY APPLIANCES True Security Appliances reduce the complexity and increase the reliability of network security, while enhancing control, efficiency, and overall functionality for enterprises of all
More informationSYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet
SYMANTEC ENTERPRISE SECURITY Symantec Internet Security Threat Report September 00 Power and Energy Industry Data Sheet An important note about these statistics The statistics discussed in this document
More informationProduct Line Guide Corporate Antimalware PLUS Network Visibility PLUS Systems Management
Product Line Guide 2011 Corporate Antimalware PLUS Network Visibility PLUS Systems Management IT S YOUR BUSINESS. DEFEND IT. Today s business security solutions need to go beyond basic virus detection
More informationForeScout ControlFabric TM Architecture
ForeScout ControlFabric TM Architecture IMPROVE MULTI-VENDOR SOLUTION EFFECTIVENESS, RESPONSE AND WORKFLOW AUTOMATION THROUGH COLLABORATION WITH INDUSTRY-LEADING TECHNOLOGY PARTNERS. The Challenge 50%
More informationFuture-ready security for small and mid-size enterprises
First line of defense for your network Quick Heal Terminator (UTM) (Unified Threat Management Solution) Data Sheet Future-ready security for small and mid-size enterprises Quick Heal Terminator is a high-performance,
More informationIBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.
IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity Keeping up with quickly evolving ` Internet threats
More informationTREND MICRO SMART PROTECTION SUITES
SOLUTION BROCHURE TREND MICRO SMART ROTECTION SUITES Maximum endpoint security from your proven security partner Get smarter security that goes where your users go The threat landscape is constantly changing,
More informationEndpoint Protection : Last line of defense?
Endpoint Protection : Last line of defense? First TC Noumea, New Caledonia 10 Sept 2018 Independent Information Security Advisor OVERVIEW UNDERSTANDING ENDPOINT SECURITY AND THE BIG PICTURE Rapid development
More informationEnsuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard
Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure
More informationMobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management
Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management June 29, 2011 1 Forward-Looking Statements This presentation
More informationSimplify Your Network Security with All-In-One Unified Threat Management
Singtel Business Product Factsheet Brochure Managed Defense Unified Services Management Simplify Your Network Security with All-In-One Unified Management Singtel Managed Unified Management (UTM) Services,
More informationReducing Security Administration Time by 60 percent for More Efficient City Government with Symantec and Novacoast
City of Aurora Reducing Security Administration Time by 60 percent for More Efficient City Government with Symantec and Novacoast Fending off viruses and other malware was straining IT resources at the
More informationGet BitDefender Client Security 2 Years 30 PCs software suite ]
Get BitDefender Client Security 2 Years 30 PCs software suite ] Description: The foundation of business security The security requirements for any new or existing company no matter how large or small -
More informationIntroducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS
Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS 1 Business drivers and their impact on IT AGILITY Move fast, be nimble and flexible 66% of business owners identify business agility as a priority EFFICIENCY
More informationFree Download BitDefender Client Security 1 Year 50 PCs softwares download ]
Free Download BitDefender Client Security 1 Year 50 PCs softwares download ] Description: The foundation of business security The security requirements for any new or existing company no matter how large
More informationWhite Paper April McAfee Protection-in-Depth. The Risk Management Lifecycle Protecting Critical Business Assets.
White Paper April 2005 McAfee Protection-in-Depth The Risk Management Lifecycle Protecting Critical Business Assets Protecting Critical Business Assets 2 Table of Contents Overview 3 Diagram (10 Step Lifecycle)
More informationWHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group
WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.2 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The
More informationSecuring the SMB Cloud Generation
Securing the SMB Cloud Generation Intelligent Protection Against the New Generation of Threats Colin Brackman, National Distribution Manager, Consumer Sales, Symantec Christopher Covert Principal Product
More informationGEARS + CounterACT. Advanced Compliance Enforcement for Healthcare. December 16, Presented by:
Advanced Compliance Enforcement for Healthcare Presented by: December 16, 2014 Adam Winn GEARS Product Manager OPSWAT Kevin Mayer Product Manager ForeScout Agenda Challenges for the healthcare industry
More informationProduct Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd
Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd Symantec Endpoint Protection Product Roadmap 1 Safe Harbor Disclaimer Any information regarding pre-release Symantec offerings,
More informationIBM Security. Endpoint Manager- BigFix. Daniel Joksch Security Sales IBM Corporation
IBM Security Endpoint Manager- BigFix Daniel Joksch Security Sales Establish security as an immune system Malware protection Incident and threat management Identity management Device management Data monitoring
More informationA Unified Threat Defense: The Need for Security Convergence
A Unified Threat Defense: The Need for Security Convergence Udom Limmeechokchai, Senior system Engineer Cisco Systems November, 2005 1 Agenda Evolving Network Security Challenges META Group White Paper
More informationWireless and Network Security Integration Solution Overview
Wireless and Network Security Integration Solution Overview Solution Overview Introduction Enterprise businesses are being transformed to meet the evolving challenges of today's global business economy.
More informationData Retrieval Firm Boosts Productivity while Protecting Customer Data
Data Retrieval Firm Boosts Productivity while Protecting Customer Data With HEIT Consulting, DriveSavers deployed a Cisco Self-Defending Network to better protect network assets, employee endpoints, and
More informationCIH
mitigating at host level, 23 25 at network level, 25 26 Morris worm, characteristics of, 18 Nimda worm, characteristics of, 20 22 replacement login, example of, 17 signatures. See signatures SQL Slammer
More informationEU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux
EU GENERAL DATA PROTECTION: TIME TO ACT Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux Is this the WAY you handle GDPR today 2 3 area s to consider
More informationSecuring Today s Mobile Workforce
WHITE PAPER Securing Today s Mobile Workforce Secure and Manage Mobile Devices and Users with Total Defense Mobile Security Table of Contents Executive Summary..................................................................................
More informationSymantec and VMWare why 1+1 makes 3
Symantec and VMWare why 1+1 makes 3 Finn Henningsen Principal Systems Engineer Peter Schjøtt Principal Systems Engineer Rasmus Rask Eilersen Principal Systems Engineer Symantec and VMWare 1 Tak til vores
More informationIntrusion Prevention Signature Failures Symantec Endpoint Protection
Intrusion Prevention Signature Failures Symantec Endpoint Protection I tried changing the communication policies in SEPM from push to pull mode but I do No updates found for Symantec Endpoint Protection
More informationSymantec Endpoint Protection Integration Component User's Guide. Version 7.0
Symantec Endpoint Protection Integration Component User's Guide Version 7.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms
More informationBuilding Resilience in a Digital Enterprise
Building Resilience in a Digital Enterprise Top five steps to help reduce the risk of advanced targeted attacks To be successful in business today, an enterprise must operate securely in the cyberdomain.
More informationIBM Europe, Middle East, and Africa Services Announcement ZS , dated October 6, 2009
Services Announcement ZS09-0202, dated October 6, 2009 Security software for IBM Proventia Endpoint Secure Control, IBM ISS Data Security Services endpoint system protection - Digital Guardian software
More informationINSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic
Virus Protection & Content Filtering TECHNOLOGY BRIEF Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server Enhanced virus protection for Web and SMTP traffic INSIDE The need
More informationA NEW DIMENSION FOR DELL SOFTWARE SOFTWARE SOLUTIONS APRIL 2009
SOFTWARE SOLUTIONS APRIL 2009 A NEW DIMENSION FOR DELL SOFTWARE DISCOVER MICROSOFT ONLINE SERVICES PAGE 3 A NEW VIRTUALISATION LANDSCAPE WITH CITRIX XENSERVER AND VMWARE VIEW PAGE 4 DISCOVER THE BENEFITS
More informationNetworks with Cisco NAC Appliance primarily benefit from:
Cisco NAC Appliance Cisco NAC Appliance (formerly Cisco Clean Access) is an easily deployed Network Admission Control (NAC) product that allows network administrators to authenticate, authorize, evaluate,
More informationRyan KS office thesee
SERVERR and WORKSTATION REMOTE MANAGEMENT SERVICES Ryan Dental Systems Dental Computer Systems Support and Sales 303 2 nd Street, PO Box 194, Inland NE 68954 5506 SW 31stPh: 402-461-5575 Terrace Topeka
More information