Symantec Endpoint Protection and Management Seminar May 13, 2008

Size: px
Start display at page:

Download "Symantec Endpoint Protection and Management Seminar May 13, 2008"

Transcription

1 Symantec Endpoint Protection and Management Seminar May 13, 2008

2 Agenda 8:00 8:30 am Registration and Breakfast 8:30 9:30 am Revolutionizing Endpoint Security Teresa Chen - Symantec 9:30 9:45 am Break 9:45-10:45 am Endpoint Security & Management Group A Winning Combination Dave Swanson Altiris, now part of Symantec 10:45-11:45 am Total Operational and Economic Impact Analysis Stanley King Alchemy Solutions Group 11:45 12:00 pm Closing Remarks

3 Symantec Partners Carahsoft has a proven history in helping government agencies find the best possible solutions at the best possible value. Carahsoft offers needs analysis, configuration support, ease of ordering and special government pricing. The leading provider of key solutions to help government agencies keep critical information safe, available, and compliant. Altiris, recently acquired by Symantec, combines its endpoint management capabilities with the security and back-up expertise of Symantec to deliver a unique set of solutions to the government market. Symantec@carahsoft.com or 877-GOV-SYMC

4 Carahsoft Symantec Solutions for Government Strategic Partnership Platinum Partner - Symantec (Largest Public Sector Partner) Platinum Partner Altiris Merging Technologies to fit Government Customer Needs Key Technologies for Government Server and Application Virtualization Compliance around various Federal Mandates/ Regulations Vista Migration Carahsoft Delivers Altiris Solutions Trained and Knowledgeable Personnel Configuration, Design, Implementation Services, and Expertise Carahsoft GSA Schedule No. GS-35F-0131R Other Federal GWACs, and Agency specific BPA s

5 Upcoming Events Symantec Events May 28, 2008 Symantec PureDisk Webcast June 17, 2008 NetBackup User s Group June 26, 2008 NetBackup 6.5 for VMware Webcast Register and learn more about all upcoming Symantec events at:

6 Symantec Contact Information Carahsoft Symantec Solutions 877-GOV-SYMC

7 Revolutionizing Endpoint Security Teresa Chen Product Marketing Manager, Endpoint Security May 2008

8 Agenda 1 Security Trends at the Corporate Endpoint 3 A Complete Enterprise Security Solution 4 Call to Action! Copyright Symantec Corporation

9 Security 2.0 New technologies are changing the way we communicate Businesses are sharing information across their extended enterprises and engaging in more complex electronic interactions New technologies are also introducing new security risks No longer focused on just the device it s about the information and interactions Phishing, ID theft, malicious users and non-compliance are all risks Must keep the threats out, and ensure the information stays inside Symantec is bringing together an ecosystem of products, services and partners that help create a safe and connected world Symantec s mission is to deliver solutions that protect customers connected experiences Copyright Symantec Corporation

10 Protecting Information External Threats Such As Viruses, Spyware & Crimeware Exploiting System Vulnerabilities Internal Threats Such As Data Theft and Data Leakage Exploit Lack Of Supervision For Corporate Information Flow Non-Compliance With Policies Or Regulations (SOX, FISMA, etc) Lack Of Adequate Controls Or Evidence Collection Copyright Symantec Corporation

11 Endpoint Security Copyright Symantec Corporation

12 Business Problems at the Endpoint Endpoint management costs are increasing Cost of downtime impacts both productivity and revenue, productivity hit largest in enterprise Costs to acquire, manage and administer point products are increasing, as well as the demand on system resources Complexity is increasing as well Complexity and man power to manage disparate endpoint protection technologies are inefficient and time consuming Growing number of known and unknown threats Number of Zero Day threats Stealth-based and silent attacks are increasing, so there is a need for antivirus to do much more Source: Internet Security Threat Report Vols. XI & XII; March & Sep 2007 Copyright Symantec Corporation

13 Changes in the Threat Landscape From Hackers To Thieves Fame motivated Financially motivated Noisy and highly visible Silent Indiscriminate Highly targeted Few named variants Overwhelming variants Copyright Symantec Corporation 2007

14 The Need for Complete Endpoint Security: Endpoint Protection + Endpoint Compliance Protection Viruses Worms ID Theft Bots Unknown Attacks Compliance Endpoint Security Policy Antivirus On Antivirus Signature Updated Personal Firewall On Service Pack Updated Patch Updated Status Copyright Symantec Corporation

15 Key Ingredients for Endpoint Protection AntiVirus World s leading AV solution Most (37) consecutive VB100 Awards Virus Bulletin April 2008 Antivirus Copyright Symantec Corporation

16 Key Ingredients for Endpoint Protection Antispyware Best rootkit detection and removal VxMS = superior rootkit protection Antispyware Viruses, Trojans, Worms Antivirus Source: Thompson Cyber Security Labs, August 2006 Copyright Symantec Corporation

17 Key Ingredients for Endpoint Protection Firewall Industry leading endpoint firewall technology Gartner MQ Leader 4 consecutive years Rules based FW can dynamically adjust port settings to block threats from spreading Firewall Spyware, Rootkits Antispyware Viruses, Trojans, Worms Antivirus Copyright Symantec Corporation

18 Key Ingredients for Endpoint Protection Intrusion Prevention Intrusion Prevention Worms, Spyware Firewall Spyware, Rootkits Antispyware Combines NIPS (network) and HIPS (host) Generic Exploit Blocking (GEB) one signature to proactively protect against all variants Granular application access control TruScan TM - Proactive Threat Scanning technology - Very low (0.0049%) false positive rate Detects 1,000 new threats/month - not detected by leading av engines No False Alarm 25M Installations Viruses, Trojans, Worms Antivirus False Alarms Fewer than 50 False Positives for every 1 MM PC s Copyright Symantec Corporation

19 Intrusion Prevention System (IPS) Combined technologies offer best defense Intrusion Prevention (IPS) (N)IPS Network IPS (H)IPS Host IPS Deep packet inspection Generic Exploit Blocking Attack-facing (Can create custom sigs, SNORT-like) Vulnerability-facing (Signatures for vulnerability) System Lockdown TruScan TM Controlling application s ability to read, write, execute and network connections Behavior-based (Whole Security) Copyright Symantec Corporation 2007

20 Key Ingredients for Endpoint Protection Device and Application Control Device and Application Control 0-day, Key Logging Intrusion Prevention Prevents data leakage Restrict Access to devices (USB keys, Backup drives) Whitelisting allow only trusted applications Worms, Spyware Firewall Spyware, Rootkits Antispyware Viruses, Trojans, Worms Antivirus W32.SillyFDC targets removable memory sticks spreads by copying itself onto removable drives such as USB memory sticks automatically runs when the device is next connected to a computer Copyright Symantec Corporation

21 Key Ingredient for Endpoint Compliance Network Access Control Device and Application Control Network Access Control Comes ready for Network Access Control add on Agent is included, no extra agent deployment Simply license SNAC Enforcement Intrusion Prevention Firewall Antispyware Antivirus Copyright Symantec Corporation

22 Solution: Symantec Network Access Control Checks adherence to endpoint security policies NAC is process that creates a much more secure network Antivirus installed and current? Firewall installed and running? Required patches and service packs? Required configuration? Fixes configuration problems Controls guest access Network Access Control helps prevent malware from spreading throughout the network Copyright Symantec Corporation 2007

23 Network Access Control (continued) Restricts access to your network by creating a closed system Offers automatic endpoint remediation before access is granted Checks adherence to endpoint security policies even when connected to network Employees Non-employees Unmanaged Managed On-site Remote Corporate Network Copyright Symantec Corporation 2007

24 Presenting Network Access Control Device and Application Control Intrusion Prevention Firewall Antispyware Antivirus Symantec Endpoint Protection 11.0 Symantec Network Access Control 11.0 Copyright Symantec Corporation

25 Single Agent, Single Console Results: Increased Protection, Control & Manageability Reduced Cost, Complexity & Risk Exposure Managed by Symantec Endpoint Protection Manager Copyright Symantec Corporation

26 Beta Customer Value Data Single console Customers will reduce management hours by 75% Security Related Reporting One customer expects to save 97% of the hours on weekly security related reporting Application Control One customer: will eliminate nearly $800,000 in cost of servers currently being used to maintain performance and sufficient drive space because of music downloading Another: anticipates recovering over $2.0 million from network outages caused by unauthorized peer to peer applications Copyright Symantec Corporation 2007

27 What analysts are saying Symantec is moving ahead of competition in this space as most competing solutions either lack the company s integrated approach, functionality or manageability. Therefore, we are very confident that Symantec s new solutions for endpoint protection and network access control are a safe bet for any business. Copyright Symantec Corporation 2007

28 What the press is saying Symantec Endpoint Protection 11.0 Winner of Best Security Suite for SMB s - PC World Awards Mexico 2007 Symantec Endpoint Protection 11.0 will definitely simplify administration efforts and therefore help to save money in the long-term. - Johann Baumeister, Searchsecurity.de, November 2007 Symantec's new offering looks very solid...we were particularly impressed with Symantec's management capabilities McAfee's completely new epolicy Orchestrator (epo) is a major disappointment. - Information Security, November 2007 Copyright Symantec Corporation 2007

29 What customers are saying We re aiming to increase our manpower by 20% in the next 12 months and the number of hosts is expected to double in the same period. Using Symantec Endpoint Protection we will not need any extra staff to manage this growth. - Carsten Klitgaard Villumsen, CIO of the Scandinavian environmental company, The Solum Group, October, 2007 Symantec Endpoint Protection has the kind of consolidated security I m looking for to simplify management of our 10,000 PCs With secure endpoints, we can consolidate security with a single management console. - Enrico Fedeli, Chief Information Security Officer, Comune di Milano Copyright Symantec Corporation 2007

30 Recent SEP 11.0 Wins Southeast Communications company Deployed SEP on more than 9,000 nodes Displacing Trend Micro Antivirus Company implementing advanced protection features (including Device and Application Control) The administrative console in Symantec Endpoint Protection 11.0 allows us to give remote IT members access to the machines under their control. This takes a lot of the burden off of the centralized security group they don't have to comb through logs and alerts anymore and enables us to quickly detect infections and to notify field offices before the intrusion becomes an epidemic. Largest Medical Staffing Solutions Provider in the US Displaced McAfee I had the unique opportunity to compare Symantec s product with McAfee s, in terms of speed to write new virus signatures and central management tools, and I thought the McAfee product paled in comparison... Large Semiconductor corporation in Oregon Displaced Trend Micro Antivirus Trend was good enough at finding the viruses, but it couldn t do much about them once they were there It didn t have the remediation capabilities we needed With Symantec Endpoint Protection, I feel like our data is protected and that we re not sending our sheep to the wolves, so to speak. Copyright Symantec Corporation 2007

31 Redefining Endpoint Security Solution Endpoint Protection Symantec Endpoint Security Endpoint Compliance Definition Endpoint Protection proactively protects laptops, desktops and servers from known and unknown malware such as viruses, worms, Trojans, spyware, adware and rootkits by combining these capabilities: Antivirus Antispyware Desktop firewall Intrusion Prevention (Host & Network) Device & Application Control Endpoint Compliance securely controls entry into networks Ongoing endpoint integrity checking Centralized endpoint compliance policy management Automated remediation Host based enforcement of access policies Monitor and report System configuration checking, remediation & enforcement Prove compliance by monitoring effectiveness of IT controls in real time Key Products Symantec Endpoint Protection 11.0 * SNAC-ready out of the box Symantec Network Access Control 11.0 Also available in a Starter Edition Other Products Symantec Mobile Security Symantec Critical System Protection Symantec Endpoint Encryption Symantec Security Information Manager Symantec On-Demand Protection (for OWA & Web Apps) Copyright Symantec Corporation

32 Symantec Global Intelligence Network + 200, Millions Hundreds malware Systems of security threat of submissions MSS Worldwide reports alerts customers per per 30% month month of World s Traffic + >6,200 Managed Security Devices Symantec Security 4 Symantec SOCs 74 Symantec Monitored 40,000+ Registered Sensors Countries in 180+ Countries Response Centers Advanced Honeypot Network Tokyo, Japan Calgary, Canada San Francisco, CA Redwood City, CA Santa Monica, CA Dublin, Ireland Twyford, England Munich, Germany Taipei, Taiwan Alexandria, VA Pune, India Sydney, Australia Copyright Symantec Corporation

33 For More Information Copyright Symantec Corporation

34 Thank You! Copyright 2007 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Copyright Symantec Corporation

35 Endpoint Security & Management Group A Winning Combination Dave Swanson, DOD/Intel National Accounts Engineer

36 A Well-Managed Endpoint is a More Secure Endpoint Evil geniuses who attack us with zero-day attacks < 5% 30% can be resolved through Patch Management System configuration represents 2/3 of all system weakness Source: SearchSecurity.TechTarget.com 2

37 A Well-Managed Endpoint is a More Secure Endpoint 3

38 A New Threat Is Discovered 1 Threat Alert Announced Kick off automatic response process > Notify risk management 4

39 5

40 A New Threat Is Discovered 1 Threat Alert Announced Kick off automatic response process > Notify risk management 2 Identify Exposure Create Incident > Audit systems > Prioritize risks CMDB 6

41 7

42 A New Threat Is Discovered 1 Threat Alert Announced Kick off automatic response process > Notify risk management 2 Identify Exposure Create Incident > Audit systems > Prioritize risks 3 CMDB Deliver Signatures and Patches Update signatures > Issues patches > Block attacks 8

43 9

44 A New Threat Is Discovered 1 Threat Alert Announced Kick off automatic response process > Notify risk management 2 Identify Exposure Create Incident > Audit systems > Prioritize risks 3 Deliver Signatures and Patches CMDB Update signatures > Issues patches > Block attacks 4 Validate Remediation Track compliance > View Dashboard > Close Incident 10

45 80 / 20 Rule of Management 11

46 IT Lifecycle Management 12

47 Potential Opportunities Tracking assets from receiving to disposal Zero-touch deployment & migration Integrated software management Software license compliance & harvesting Incident management & resolution capabilities 13

48 Do these sound familiar? I need to manage a growing and increasingly complex environment. We have an upcoming hardware migration project. My helpdesk staff spends too much time troubleshooting and I m not sure how many incidents are still open. I think we are paying too much for software licenses, but I can t get an accurate count in my environment. I need a way to track my assets where are they located, how are they configured and how do they interact with one another. 14

49 Altiris Platform & Solutions 15

50 Analytics Drive Intelligent Decisions 16

51

52 Convergence is Around the Corner We are changing the security management game. We will be integrating Symantec Endpoint Protection into the Altiris platform as a top priority. Brad Kingsbury Senior Vice President Endpoint Security and Management Group 18

53 Altiris Product Family Total Management Suite Client Management Server Management Service & Asset Management Deployment & Migration Inventory & Application Metering Software Packaging & Delivery Software Virtualization Remote Control & Diagnostics System Provisioning Inventory & Baselining Hardware & System Monitoring Virtualization Management Remote Diagnostics Incident & Problem Management Asset Management License Compliance CMDB Add-On Solutions Workflow Solution Software Virtualization IT Analytics Free Symantec Integration Components Symantec Endpoint Protection BackUp Exec System Recovery Veritas Configuration Manager 19

54 Best of Breed Solutions The Forrester Wave is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.

55 Passionate about Partnerships 21

56 Competitive Top 3 Silver Bullets 1 Multiplatform Support (#1 versus Microsoft) Multiple OS, multiple virtualization environments 2 Single Best of Breed Vendor (#1 versus non-ms Vendors) Only Vendor that is Leader in Security, Management and Availability. Symantec is market-leading, best in class, the gold standard 3 Collaborative Architecture Collaborative architecture provides a more nimble, efficient and costeffective IT infrastructure. 22

57

58 The Alchemy Solutions Group, Inc All Rights Reserved. Total Operational and Economic Impact (TOEI) Analysis By The Alchemy Solutions Group For Symantec Endpoint Protection 11.0 Research and Analysis Conducted by: Sponsored by: Total Operational and Economic Impact 1

59 Purpose and Objectives The SEP 11.0 Beta VDR Purpose and Objectives were to: To identify, document, and validate the measurable value (Total Operational and Economic Impact) SEP 11.0 is providing customers in a post implementation environment as defined by the customer. To establish the creation of a repeatable customer engagement process that enables customers to help determine the Business Case for specific products and services. The Alchemy Solutions Group, Inc All Rights Reserved. Total Operational and Economic Impact 2 2

60 The Alchemy Solutions Group, Inc All Rights Reserved. Purpose and Objectives To enhance the relationships with senior IT executives by communicating the operational and economic benefit versus features and functions of product and services. To transition the go-to-market planning from feature based to economic based acumen for all product related communications. Total Operational and Economic Impact 3

61 SEP 11.0 Beta Customer Demographics 40 Symantec customers were interviewed and subsequently qualified. Customer participation required a significant commitment to support the TOEI Research: Provide executive and staff resources to participate in two, on-site interviews ranging from four to six hours each Install and extensively test the SEP 11.0 beta software immediately upon release Make resources available throughout the process with both a technical and business acumen related to IT security operations Were willing to share with Symantec and Alchemy privately, the potential TOEI impact SEP 11.0 would have on their respective organizations. The Alchemy Solutions Group, Inc All Rights Reserved. Total Operational and Economic Impact 4 4

62 SEP 11.0 Beta Customer Demographics 12 Customers agreed to these terms and conditions 4 customers cancelled participation due to job transitions, acquisition activity and competing priorities. 8 Customers fully participated in the VDR Research End User communities ranged from 170 to 30,000 Remote support locations ranged from 2 to 126 globally Focused on the SEP 11.0 product areas where the highest customer benefit was assumed. The Alchemy Solutions Group, Inc All Rights Reserved. Total Operational and Economic Impact 5 5

63 The Alchemy Solutions Group, Inc All Rights Reserved. SEP 11.0 TOEI Engagement Process Total Operational and Economic Impact 6

64 The Alchemy Solutions Group, Inc All Rights Reserved. Total Number of End Users by Customer Total Operational and Economic Impact 7

65 The Alchemy Solutions Group, Inc All Rights Reserved. Total Number of Support Locations by Customer Total Operational and Economic Impact 8

66 The Alchemy Solutions Group, Inc All Rights Reserved. Annual Contribution by TOEI Area Total Operational and Economic Impact 9

67 The Alchemy Solutions Group, Inc All Rights Reserved. Common TOEI Findings by Application Area Client UI- End user self diagnosis once unthinkable is now being reconsidered based on a tightly controlled and graphically driven interface at the endpoint. Benefits could reduce calls to the help desk by 65% Automatic Deployment- of AS, AV and Personal Firewall software and updates could reduce current IT man hours by 75%. Device Control- Managing the introduction of unprotected computers and/or devices to the endpoint and/or network and there immediate disposition provides a significantly higher control point for network and endpoint security best practices. Application Control- Controlling unauthorized or recreational applications (peer to peer) avoids significant network performance issues and outages. Total Operational and Economic Impact 10

68 The Alchemy Solutions Group, Inc All Rights Reserved. Common TOEI Findings by Application Area Admin UI- Graphical user interfaces greatly simplify and automate the process of monitoring for possible threats including detection, identification, classification and dispatching the recovery against that the threat. Threat Monitoring combined with Device Control- allow the opportunity to deal with threats in a timely proactive manner which is a major consideration in cost avoidance. Report Generation- Totally automated reporting for network security operations in meeting requirements for the auditing and compliance communities (SOX, GLBA, HIPAA) could reduce man hours by 85% on average. Account Creation and Role Based Administration- real time creation, rollout and updating of accounts including sharing rights at the end user level from a single management console eliminates most if not all travel for user specific set up at the end point. Total Operational and Economic Impact 11

69 TOEI Findings by BETA Customer Global Electronics Manufacturer -TOEI $5.3 million in savings from deploying the SEP 11.0 solution. The primary areas of savings are in application control and reduction in help desk support time to resolve security related issues County Government -TOEI $20k in savings by deploying SEP The primary areas of savings are application control, reporting and policy setting tasks managed from the Admin UI console. Regional Bank -TOEI $2.0 million in savings by deploying SEP Centralizing the management of many mundane security related task and more efficient endpoint PC scanning for virus and malware. The Alchemy Solutions Group, Inc All Rights Reserved. Total Operational and Economic Impact 12 12

70 TOEI Findings by BETA Customer State Government -TOEI Expects to realize more than $3.4 million by deploying SEP The primary areas of savings are in centralizing the management of many administrative task including application control, location awareness, and log file monitoring of over 130 government agencies and offices. SEP 11.0 will serve as a key enabler is a state wide reorganization of IT Security Operations and IT Risk Management organizations. Savings from this effort can not be estimated at this time. County Government-TOEI Estimates savings of almost $300,000 from deploying SEP 11.0 and benefiting from the much improved Admin and Client UI capabilities as well as displacing currently deployed point solutions. Healthcare Benefits and Pension Organization -TOEI Expects to save more than $315,000 by deploying SEP The areas of savings will be in Admin UI tasks and application control. The Alchemy Solutions Group, Inc All Rights Reserved. Total Operational and Economic Impact 13 13

71 TOEI Findings by BETA Customer National Landscape Company - TOEI Expects to save more than $326,000 by deploying SEP The key area of savings is in managing upgrades at over 120 remote locations. Behavioral Healthcare Organization - TOEI Expects to save more than $24,000 by deploying SEP The centralized management tools will give them greater access and control of users in remote locations. The Alchemy Solutions Group, Inc All Rights Reserved. Total Operational and Economic Impact 14 14

72 TOEI Findings - Global Electronics Manufacturer 1100 total end users with a very high percentage working remotely with laptops and traveling through the Far East and Europe. IT staff totals 33 globally. 8 have direct responsibility for security operations. Headquarters in CA, and facilities in Horseheads, NY; Nozay, France; San Donato, Italy; with manufacturing operations in both Shanghai, China; and Bangkok, Thailand. International presence presents many threat concerns to their environment include virus and malware, laptops stolen or compromised, threats through external devices entering their network and not being detected. Most significant losses are through non authorized peer to peer applications crippling the network. $5.3 million in savings from deploying the SEP 11.0 solution. The primary areas of savings are in cost avoidance through application control and reduction in help desk support time to resolve security related issues The Alchemy Solutions Group, Inc All Rights Reserved. Total Operational and Economic Impact 15 15

73 The Alchemy Solutions Group, Inc All Rights Reserved. Global Electronics Manufacturer Ranks Greatest Areas of Data Exposure Total Operational and Economic Impact 16

74 The Alchemy Solutions Group, Inc All Rights Reserved. Global Electronics Manufacturer Estimates 30% Reduction in Calls to IT Support Total Operational and Economic Impact 17

75 The Alchemy Solutions Group, Inc All Rights Reserved. Global Electronics Manufacturer Network Outages due to Recreational Network Usage Total Operational and Economic Impact 18

76 The Alchemy Solutions Group, Inc All Rights Reserved. Global Electronics Manufacturer Idled Employees per Location per Incident Due to Recreational Network Usage Total Operational and Economic Impact 19

77 The Alchemy Solutions Group, Inc All Rights Reserved. Global Electronics Manufacturer Man Hours Lost per Location per Incident Due to Recreational Network Usage Total Operational and Economic Impact 20

78 The Alchemy Solutions Group, Inc All Rights Reserved. Global Electronics Manufacturer Loses $62,000 per Incident Due to Recreational Network Usage Total Operational and Economic Impact 21

79 TOEI Findings County Government 3500 end users located throughout the county in approximately 50 various buildings and remote locations. 35 IT employees with only two FTEs focused on security with daily threats are in the tens of thousands. Conservative estimate of $20k in savings deploying SEP 11.0 from application control and other reporting and policy setting tasks managed from the Admin UI console. The Alchemy Solutions Group, Inc All Rights Reserved. Total Operational and Economic Impact 22 22

80 The Alchemy Solutions Group, Inc All Rights Reserved. County Government Ranks Areas of Greatest Data Exposure Total Operational and Economic Impact 23

81 The Alchemy Solutions Group, Inc All Rights Reserved. County Government Estimates 50% Reduction in Calls to IT Support Total Operational and Economic Impact 24

82 TOEI Findings Florida Banking Institution Full-service financial serving customers through 83 branches in 13 coastal counties The IT department supports a total of 1500 end users with a staff of 74 IT employees with a budget for security tools of approximately $1.0 million Four planned audits per year from the Office of Thrift Supervision (OTS), and to numerous internal audits for system compliance. Employee down time due to a variety of security related issues is primary concern. Anticipated savings of $2.0 million deploying SEP Centralizing the management of many mundane security related task and more efficient endpoint PC scanning for virus and malware from a single management console. The Alchemy Solutions Group, Inc All Rights Reserved. Total Operational and Economic Impact 25 25

83 The Alchemy Solutions Group, Inc All Rights Reserved. Florida Banking Institution Ranks Greatest Areas of Data Exposure Total Operational and Economic Impact 26

84 The Alchemy Solutions Group, Inc All Rights Reserved. Florida Banking Institution Reduction in Man Hours by Functional Area Total Operational and Economic Impact 27

85 The Alchemy Solutions Group, Inc All Rights Reserved. Florida Banking Institution Productivity Lost per Location Total Operational and Economic Impact 28

86 The Alchemy Solutions Group, Inc All Rights Reserved. Florida Banking Institution Productivity Lost per Location Total Operational and Economic Impact 29

87 TOEI Findings State Government This organization represents all state government agencies totaling 13 secretariat level offices that support 133 agencies. This organization supports 30,000 end users which include a wide variety of skills and specific functions including all executive level, all state funded agencies and extending into hospitals, libraries and other local state offices. They have 1000 employees in the IT organization comprised of 300 staff in the centralized corporate IT functions and 700 staff members working at the divisional or other department levels. A total of 400 of these staff members are focused on security functions or an average of three FTEs per agency. The IT department is decentralized across the major agencies and cascades their support to sub agencies and smaller departments creating a very costly support model. The Alchemy Solutions Group, Inc All Rights Reserved. Total Operational and Economic Impact 30 30

88 The Alchemy Solutions Group, Inc All Rights Reserved. TOEI Findings State Government Due to the decentralized nature of the organization, processes and best practices are inconsistent from one agency to another. Each agency recognizes the importance of creating a secure environment but delays in communication or the execution of security related actions, has an impact on overall readiness. Anticipated savings of more than $3.4 million by deploying SEP 11.0 primarily in centralizing the management of application control, location awareness, and log file monitoring. Strategic Planning at the State level is now restructured Security Operations into a central location as a result of the utilities found in the SEP 11 product. Total Operational and Economic Impact 31

89 The Alchemy Solutions Group, Inc All Rights Reserved. State Government Ranks Greatest Areas of Data Exposure Total Operational and Economic Impact 32

90 The Alchemy Solutions Group, Inc All Rights Reserved. State Government Savings per Application Area Total Operational and Economic Impact 33

91 TOEI Findings County Government IT Organization supports 6000 end users across approximately 70 locations The County serves 1M citizens and city services and government including the Court System, Jail, Health & Wellness, Human Services, Registration & Elections, and Tax Assessment and Collection. There are 145 IT staff members in the central IT organization, 8 staff are dedicated to security. $28.2 million IT budget. Estimate savings of almost $300,000 from deploying SEP 11.0 and benefiting from the much improved Admin and Client UI capabilities as well as displacing currently deployed point solutions. The Alchemy Solutions Group, Inc All Rights Reserved. Total Operational and Economic Impact 34 34

92 The Alchemy Solutions Group, Inc All Rights Reserved. County Government Ranks Greatest Areas of Data Exposure Total Operational and Economic Impact 35

93 The Alchemy Solutions Group, Inc All Rights Reserved. County Government % Reduction in Man Hours by Functional Area Total Operational and Economic Impact 36

94 TOEI Findings Healthcare Benefits and Pension Company Have approximately 300 end users and process more than 700,000 pension and healthcare claims each year for more than 45,000 members Personal health and financial information of nearly every actor or actress in the motion picture or television business today. The sensitive nature of this information can not be understated. The IT team totals 25 including management percent of their time is spent on security related issues. Anticipate more than $315,000 by deploying SEP The areas of savings will be in Admin UI tasks and application control. The Alchemy Solutions Group, Inc All Rights Reserved. Total Operational and Economic Impact 37 37

95 The Alchemy Solutions Group, Inc All Rights Reserved. Healthcare Benefits and Pension Company Ranks Greatest Areas of Data Exposure Total Operational and Economic Impact 38

96 The Alchemy Solutions Group, Inc All Rights Reserved. Healthcare Benefits and Pension Company % Reduction in Man Hours by Functional Area Total Operational and Economic Impact 39

97 TOEI Findings National Landscape Company $1.0 billion company provides design, build and maintenance services and has 1,550 end users at over 120 branch offices The IT organization has 36 staff members with a budget of around $8.0M. million annually and a team of 36 staff members. Only one FTE is dedicated to security and is generally in reactive mode. Anticipate savings of more than $326,000 by deploying SEP 11.0 in many security areas including managing software upgrade deployments at over 120 remote locations. The Alchemy Solutions Group, Inc All Rights Reserved. Total Operational and Economic Impact 40 40

98 The Alchemy Solutions Group, Inc All Rights Reserved. National Landscape Company Ranks Greatest Areas of Data Exposure Total Operational and Economic Impact 41

99 TOEI Findings Behavioral Healthcare Organization Fully accredited HealthCare Organization specializing in innovative family centered behavioral treatment. The IT organization supports a total of 170 end users with four crosstrained staff members including the Director. 70 percent of the end users have laptops and are continuously moving between clinic and office locations. Their current IT budget is less then $250,000 per year of which 30 percent is directed to security tools. The large mobile work force presents the biggest security risk in the control of the endpoint. Expects to save more than $24,000 by deploying SEP The centralized management tools will give them greater access and control of users in remote locations. The Alchemy Solutions Group, Inc All Rights Reserved. Total Operational and Economic Impact 42 42

100 The Alchemy Solutions Group, Inc All Rights Reserved. Behavioral Healthcare Organization Ranks Greatest Areas of Data Exposure Total Operational and Economic Impact 43

101 Conclusions The SEP 11.0 solution will change the game for IT Security Operations globally: After 150 hours of interviews, technologies that are comprehensive enough to address the unique complexities of endpoint security have not been commercially available until now. SEP 11.0 will eliminate up to 75% to 100% of the mundane and redundant processes required to manage IT security solutions at the end point. Independent of the number of end users and remote support locations, the operating efficiencies and subsequent savings made available to IT organizations are significant. The Alchemy Solutions Group, Inc All Rights Reserved. Total Operational and Economic Impact 44 44

102 The Alchemy Solutions Group, Inc All Rights Reserved. Conclusions An estimated $11.6M over the next two years for the 8 accounts that participated in the SEP 11.0 beta Efficiently executing IT Security best practices on a global level at the end point will make a positive economic and operational impact for both the end user and compliance communities. Adopting SEP 11.0 with enable organizational changes and the streamlining for IT security organizations that have organized themselves around point solutions without the benefit of the single management console. Total Operational and Economic Impact 45

103 Conclusions Based on four years of VDR research in the technology community, SEP 11.0 is one of those rare and unique technologies that will have an immediate economic and operational impact on the IT organizations at large Despite product quality issues, the customers who participated in the Hamlet VDR Research were largely overwhelmed by the utilities available in this product and the direct impact those functions will have on reducing operating cost and improving overall asset utilization The Alchemy Solutions Group, Inc All Rights Reserved. Total Operational and Economic Impact 46 46

104 The Alchemy Solutions Group, Inc All Rights Reserved. Total Operational and Economic Impact (TOEI) Analysis Thank You! Research and Analysis Conducted by: Sponsored by: Total Operational and Economic Impact 47

Teleworking and Security: IT All Begins with Endpoints. Jim Jessup Solutions Manager, Information Risk Management June 19, 2007

Teleworking and Security: IT All Begins with Endpoints. Jim Jessup Solutions Manager, Information Risk Management June 19, 2007 Teleworking and Security: IT All Begins with Endpoints Jim Jessup Solutions Manager, Information Risk Management June 19, 2007 Agenda 1 Today s Landscape 2 Trends at the Endpoint 3 Endpoint Security 4

More information

Agenda. Today s IT Challenges. Symantec s Collaborative Architecture. Symantec TM Endpoint Management Suite. Connecting Symantec Technologies Today

Agenda. Today s IT Challenges. Symantec s Collaborative Architecture. Symantec TM Endpoint Management Suite. Connecting Symantec Technologies Today Agenda 1 Today s IT Challenges 2 Symantec s Collaborative Architecture 3 Symantec TM Endpoint Management Suite 4 Connecting Symantec Technologies Today 5 Q & A 1 Traditional Protection isn t Good Enough

More information

Introducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection. Bernard Laroche Endpoint security Product marketing

Introducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection. Bernard Laroche Endpoint security Product marketing Introducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection Bernard Laroche Endpoint security Product marketing Agenda 1 Organizational Risk and Endpoint Challenges 32 Symantec Endpoint

More information

Comprehensive Endpoint Security. Chris Quinn Systems Engineer March 24, 2009

Comprehensive Endpoint Security. Chris Quinn Systems Engineer March 24, 2009 Comprehensive Endpoint Security Chris Quinn Systems Engineer March 24, 2009 Agenda 1 Today s Security Challenges 2 Symantec Endpoint Protection, NAC, and Open Collaborative Architecture 3 Why Symantec?

More information

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview creates a protected endpoint and messaging environment that is secure against today s complex data loss, malware, and spam threats controlling

More information

The Convergence of Management and Security. Stephen Brown, Sr. Product Manager December 2008

The Convergence of Management and Security. Stephen Brown, Sr. Product Manager December 2008 The Convergence of Management and Security Stephen Brown, Sr. Product Manager December 2008 Agenda 1 A Robust Management Foundation 2 The Value of Security and Management Convergence 3 Symantec Endpoint

More information

Internet Security Threat Report Volume XIII. Patrick Martin Senior Product Manager Symantec Security Response October, 2008

Internet Security Threat Report Volume XIII. Patrick Martin Senior Product Manager Symantec Security Response October, 2008 Internet Security Threat Report Volume XIII Patrick Martin Senior Product Manager Symantec Security Response October, 2008 Agenda 1 ISTR XIII Important Facts 2 ISTR XIII Key Messages 3 ISTR XIII Key Facts

More information

SYMANTEC DATA CENTER SECURITY

SYMANTEC DATA CENTER SECURITY SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information

More information

Symantec Endpoint Protection 11.0

Symantec Endpoint Protection 11.0 OVERVIEW Symantec Endpoint Protection replaces Symantec AntiVirus Corporate Edition, Symantec Client Security, Symantec Sygate Enterprise protection and Confidence Online for PCs. Symantec Endpoint Protection

More information

Symantec Endpoint Protection 14

Symantec Endpoint Protection 14 Symantec Endpoint Protection Cloud Security Made Simple Symantec Endpoint Protection 14 Data Data Sheet: Sheet: Endpoint Endpoint Security Security Overview Last year, we saw 431 million new malware variants,

More information

Total Protection for Compliance: Unified IT Policy Auditing

Total Protection for Compliance: Unified IT Policy Auditing Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

Symantec Endpoint Protection

Symantec Endpoint Protection Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec Insight and by SONAR, a single,

More information

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement Simplified endpoint enforcement Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely

More information

Symantec Endpoint Protection

Symantec Endpoint Protection The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,

More information

United Automotive Electronic Systems Co., Ltd Relies on McAfee for Comprehensive Security

United Automotive Electronic Systems Co., Ltd Relies on McAfee for Comprehensive Security United Automotive Electronic Systems Co., Ltd Relies on McAfee for Comprehensive Security Global Venture chooses McAfee for Complex Security Landscape UAES Customer Profile Joint venture of the United

More information

Symantec Network Access Control Starter Edition

Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely

More information

Securing Your Most Sensitive Data

Securing Your Most Sensitive Data Software-Defined Access Securing Your Most Sensitive Data Company Overview Digital Growth Means Digital Threats Digital technologies offer organizations unprecedented opportunities to innovate their way

More information

Symantec Network Access Control Starter Edition

Symantec Network Access Control Starter Edition Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access

More information

Intelligent, Collaborative Endpoint Security

Intelligent, Collaborative Endpoint Security Intelligent, Collaborative Endpoint Security Improves Detection and Protection and Slashes User Impact US Insurance Company Customer Profile A leading American insurer Industry Financial IT Environment

More information

Reducing Security Administration Time by 60 percent for More Efficient City Government with Symantec and Novacoast

Reducing Security Administration Time by 60 percent for More Efficient City Government with Symantec and Novacoast City of Aurora Reducing Security Administration Time by 60 percent for More Efficient City Government with Symantec and Novacoast Fending off viruses and other malware was straining IT resources at the

More information

Sustainable Security Operations

Sustainable Security Operations Sustainable Security Operations Optimize processes and tools to make the most of your team s time and talent The number and types of security incidents organizations face daily are steadily increasing,

More information

Building Resilience in a Digital Enterprise

Building Resilience in a Digital Enterprise Building Resilience in a Digital Enterprise Top five steps to help reduce the risk of advanced targeted attacks To be successful in business today, an enterprise must operate securely in the cyberdomain.

More information

Symantec Network Access Control Starter Edition

Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely

More information

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW: SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE Protecting your business assets and sensitive data requires regular vulnerability assessment,

More information

SIEM: Five Requirements that Solve the Bigger Business Issues

SIEM: Five Requirements that Solve the Bigger Business Issues SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered

More information

Changing face of endpoint security

Changing face of endpoint security Changing face of endpoint security S A N T H O S H S R I N I V A S A N C I S S P, C I S M, C R I S C, C E H, C I S A, G S L C, C G E I T D I R E C T O R S H A R E D S E R V I C E S, H C L T E C H N O L

More information

Symantec Data Center Transformation

Symantec Data Center Transformation Symantec Data Center Transformation A holistic framework for IT evolution As enterprises become increasingly dependent on information technology, the complexity, cost, and performance of IT environments

More information

CA Host-Based Intrusion Prevention System r8

CA Host-Based Intrusion Prevention System r8 PRODUCT BRIEF: CA HOST-BASED INTRUSION PREVENTION SYSTEM CA Host-Based Intrusion Prevention System r8 CA HOST-BASED INTRUSION PREVENTION SYSTEM (CA HIPS) BLENDS A STAND-ALONE FIREWALL WITH INTRUSION DETECTION

More information

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not

More information

Endpoint Security for DeltaV Systems

Endpoint Security for DeltaV Systems Endpoint Security for DeltaV Systems Decrease risk with intelligent, adaptive scanning Utilize advanced anti-malware protection Identify, remediate and secure your DeltaV system from cybersecurity risks

More information

White Paper April McAfee Protection-in-Depth. The Risk Management Lifecycle Protecting Critical Business Assets.

White Paper April McAfee Protection-in-Depth. The Risk Management Lifecycle Protecting Critical Business Assets. White Paper April 2005 McAfee Protection-in-Depth The Risk Management Lifecycle Protecting Critical Business Assets Protecting Critical Business Assets 2 Table of Contents Overview 3 Diagram (10 Step Lifecycle)

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not

More information

The McGill University Health Centre (MUHC)

The McGill University Health Centre (MUHC) The McGill University Health Centre (MUHC) Strengthening its security posture with in- depth global intelligence Overview The need MUHC security staff wanted to more quickly identify and assess potential

More information

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045 Solution Brief 8815 Centre Park Drive, Columbia MD 21045 About delivers business critical software and services that transform high-volume cryptic log data into actionable, prioritized intelligence that

More information

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Protecting Your Digital World

Protecting Your Digital World Protecting Your Digital World C O R P O R A T E O V E R V I E W With revenues of more than $105 Billion, cybercrime generates more revenue than the illegal drug trade. Source: U.S. Treasury, reported by

More information

Symantec Client Security. Integrated protection for network and remote clients.

Symantec Client Security. Integrated protection for network and remote clients. Symantec Client Security Integrated protection for network and remote clients. Complex Internet threats require comprehensive security. Today's complex threats require comprehensive security solutions

More information

Symantec Security Monitoring Services

Symantec Security Monitoring Services 24x7 real-time security monitoring and protection Protect corporate assets from malicious global threat activity before it impacts your network. Partnering with Symantec skilled and experienced analysts

More information

Services solutions for Managed Service Providers (MSPs)

Services solutions for Managed Service Providers (MSPs) McAfee Advanced Threat Defense Services solutions for Managed Service Providers (MSPs) Differentiate your services and protect customers against zero-day attacks with the industry s most comprehensive

More information

Archiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention

Archiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention Symantec Enterprise Vault TransVault CommonDesk ARCviewer Vault LLC Optimize the management of information by defining a lifecycle strategy for data Backup is for recovery, archiving is for discovery.

More information

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity Keeping up with quickly evolving ` Internet threats

More information

Reducing Cybersecurity Costs & Risk through Automation Technologies

Reducing Cybersecurity Costs & Risk through Automation Technologies Reducing Cybersecurity Costs & Risk through Automation Technologies Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: November 2017 Ponemon Institute Research

More information

What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco

What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco Increasing Digital Traffic Creates a Greater Attack Surface Global IP Traffic

More information

Symantec Enterprise Solution Product Guide

Symantec Enterprise Solution Product Guide SOLUTION BRIEF: SYMANTEC ENTERPRISE SOLUTION PRODUCT GUIDE........................................ Symantec Enterprise Solution Product Guide Who should read this paper Businesses participating in the

More information

Understanding Network Access Control: What it means for your enterprise

Understanding Network Access Control: What it means for your enterprise Understanding Network Access Control: What it means for your enterprise Network access control is a term that is highly used, but not clearly defined. By understanding the reasons for pursuing a network

More information

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project

More information

INTELLIGENCE DRIVEN GRC FOR SECURITY

INTELLIGENCE DRIVEN GRC FOR SECURITY INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to

More information

Surprisingly Successful: What Really Works in Cyber Defense. John Pescatore, SANS

Surprisingly Successful: What Really Works in Cyber Defense. John Pescatore, SANS Surprisingly Successful: What Really Works in Cyber Defense John Pescatore, SANS 1 Largest Breach Ever 2 The Business Impact Equation All CEOs know stuff happens in business and in security The goal is

More information

Security by Default: Enabling Transformation Through Cyber Resilience

Security by Default: Enabling Transformation Through Cyber Resilience Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,

More information

Data Sheet: Archiving Altiris Server Management Suite 7.0 Essential server management: Discover, provision, manage, and monitor

Data Sheet: Archiving Altiris Server Management Suite 7.0 Essential server management: Discover, provision, manage, and monitor Essential server management: Discover, provision, manage, and monitor Overview Complexity with physical and virtual machine proliferation increases the challenges involved in managing servers. Server administrators

More information

Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection

Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection Altiris, Now Part of Symantec Copyright 2007 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,

More information

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23 Risk: Security s New Compliance Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23 Agenda Market Dynamics Organizational Challenges Risk: Security s New Compliance

More information

Combating Today s Cyber Threats Inside Look at McAfee s Security

Combating Today s Cyber Threats Inside Look at McAfee s Security Combating Today s Cyber Threats Inside Look at McAfee s Security Charles Ross, Director Sales Engineering Public Sector 2008 McAfee, Inc. Agenda Today s Threat Landscape McAfee s Security Challenges McAfee

More information

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client

More information

One Hospital s Cybersecurity Journey

One Hospital s Cybersecurity Journey MAY 11 12, 2017 SAN FRANCISCO, CA One Hospital s Cybersecurity Journey SanFrancisco.HealthPrivacyForum.com #HITprivacy Introduction Senior Director Information Systems Technology, Children s Mercy Hospital

More information

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure

More information

Combatting advanced threats with endpoint security intelligence

Combatting advanced threats with endpoint security intelligence IBM Software Thought Leadership White Paper January 2014 Combatting advanced threats with endpoint security intelligence IBM Endpoint Manager and IBM Security QRadar solutions enable real-time, closed-loop

More information

Cisco Self Defending Network

Cisco Self Defending Network Cisco Self Defending Network Integrated Network Security George Chopin Security Business Development Manager, CISSP 2003, Cisco Systems, Inc. All rights reserved. 1 The Network as a Strategic Asset Corporate

More information

McAfee Embedded Control

McAfee Embedded Control McAfee Embedded Control System integrity, change control, and policy compliance in one solution McAfee Embedded Control maintains the integrity of your system by only allowing authorized code to run and

More information

A Secure Foundation for Your Business. Lauren Duda - Product Marketing Manager March 13th, 2007

A Secure Foundation for Your Business. Lauren Duda - Product Marketing Manager March 13th, 2007 A Secure Foundation for Your Business Lauren Duda - Product Marketing Manager March 13th, 2007 Sample Agenda Slide 1 Corporate issues and threat landscape 2 MS Vista and Symantec Security 3 Symantec Endpoint

More information

AND FINANCIAL CYBER FRAUD INSTITUTIONS FROM. Solution Brief PROTECTING BANKING

AND FINANCIAL CYBER FRAUD INSTITUTIONS FROM. Solution Brief PROTECTING BANKING PROTECTING BANKING AND FINANCIAL INSTITUTIONS FROM CYBER FRAUD Enabling the financial industry to become proactively secure and compliant Overview In order to keep up with the changing digital payment

More information

The Artificial Intelligence Revolution in Cybersecurity

The Artificial Intelligence Revolution in Cybersecurity The Artificial Intelligence Revolution in Cybersecurity How Prevention Achieves Superior ROI and Efficacy Why You Should Read This ebook The answer to real threat protection is artificial intelligence

More information

Securing Today s Mobile Workforce

Securing Today s Mobile Workforce WHITE PAPER Securing Today s Mobile Workforce Secure and Manage Mobile Devices and Users with Total Defense Mobile Security Table of Contents Executive Summary..................................................................................

More information

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure

More information

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks Key Advantages Stay ahead of zero-day threats, ransomware, and greyware with machine learning and dynamic

More information

Automating the Top 20 CIS Critical Security Controls

Automating the Top 20 CIS Critical Security Controls 20 Automating the Top 20 CIS Critical Security Controls SUMMARY It s not easy being today s CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises

More information

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet SYMANTEC ENTERPRISE SECURITY Symantec Internet Security Threat Report September 00 Power and Energy Industry Data Sheet An important note about these statistics The statistics discussed in this document

More information

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief RSA Solution Brief The RSA Solution for VMware View: Managing Securing the the Lifecycle Virtual of Desktop Encryption Environment Keys with RSA Key Manager RSA Solution Brief 1 According to the Open Security

More information

AT&T Endpoint Security

AT&T Endpoint Security AT&T Endpoint Security November 2016 Security Drivers Market Drivers Online business 24 x 7, Always on Globalization Virtual Enterprise Business Process / IT Alignment Financial Drivers CapEx / OpEx Reduction

More information

IBM Internet Security Systems Proventia Management SiteProtector

IBM Internet Security Systems Proventia Management SiteProtector Supporting compliance and mitigating risk through centralized management of enterprise security devices IBM Internet Security Systems Proventia Management SiteProtector Highlights Reduces the costs and

More information

CIO Forum Maximize the value of IT in today s economy

CIO Forum Maximize the value of IT in today s economy CIO Forum Maximize the value of IT in today s economy Laura Scott, Vice President Service Product Line Sales Global Technology Services IT infrastructure is reaching a breaking point. 85% idle In distributed

More information

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017 Avantec Blue Coat/Symantec Webinar Jean Marc Edder Senior Systems Engineer The Global Leader in Cyber Network + + Cloud Global market leader in Endpoint, Email, Data Loss Prevention and Website, User Authentication

More information

align security instill confidence

align security instill confidence align security instill confidence cyber security Securing data has become a top priority across all industries. High-profile data breaches and the proliferation of advanced persistent threats have changed

More information

THALES DATA THREAT REPORT

THALES DATA THREAT REPORT 2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security INDIA EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Rising risks for sensitive data in India In India, as in the rest of the

More information

Mastering The Endpoint

Mastering The Endpoint Organizations Find Value In Integrated Suites GET STARTED Overview In the face of constantly evolving threat vectors, IT security decision makers struggle to manage endpoint security effectively. More

More information

Security Survey Executive Summary October 2008

Security Survey Executive Summary October 2008 A government technology Executive Survey Summary: HP Security Survey Executive Summary October 2008 Produced by: In Partnership With: Introduction Information is paramount to the survival of government

More information

NetDefend Firewall UTM Services

NetDefend Firewall UTM Services NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860/1660/2560/2560G) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content

More information

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0 Symantec Endpoint Protection Integration Component User's Guide Version 7.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

McAfee Total Protection for Data Loss Prevention

McAfee Total Protection for Data Loss Prevention McAfee Total Protection for Data Loss Prevention Protect data leaks. Stay ahead of threats. Manage with ease. Key Advantages As regulations and corporate standards place increasing demands on IT to ensure

More information

Best Practices in Securing a Multicloud World

Best Practices in Securing a Multicloud World Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers

More information

Symantec Multi-tier Protection

Symantec Multi-tier Protection Trusted protection from malware and email-bourne threats for multiplatform environments Overview Symantec Multi-tier Protection is designed to safeguard enterprise assets and lower risk by providing unmatched

More information

Reducing Operational Costs and Combating Ransomware with McAfee SIEM and Integrated Security

Reducing Operational Costs and Combating Ransomware with McAfee SIEM and Integrated Security Reducing Operational Costs and Combating Ransomware with McAfee SIEM and Integrated Security Healthcare provider manages threats with ease Atrius Health Customer Profile Large regional healthcare provider

More information

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance The RSA Solution for Cloud Security and Compliance The RSA Solution for Cloud Security and Compliance enables enduser organizations and service providers to orchestrate and visualize the security of their

More information

CipherCloud CASB+ Connector for ServiceNow

CipherCloud CASB+ Connector for ServiceNow ServiceNow CASB+ Connector CipherCloud CASB+ Connector for ServiceNow The CipherCloud CASB+ Connector for ServiceNow enables the full suite of CipherCloud CASB+ capabilities, in addition to field-level

More information

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION INFORMATION TECHNOLOGY SECURITY GUIDANCE TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION ITSM.10.189 October 2017 INTRODUCTION The Top 10 Information Technology (IT) Security

More information

McAfee Public Cloud Server Security Suite

McAfee Public Cloud Server Security Suite McAfee Public Cloud Server Security Suite Comprehensive security for AWS and Azure cloud workloads As enterprises shift their data center strategy to include and often lead with public cloud server instances,

More information

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management June 29, 2011 1 Forward-Looking Statements This presentation

More information

Business continuity management and cyber resiliency

Business continuity management and cyber resiliency Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Business continuity management and cyber resiliency Introductions Eric Wunderlich,

More information

Advanced Threat Defense Certification Testing Report. Symantec Corporation Symantec Advanced Threat Protection

Advanced Threat Defense Certification Testing Report. Symantec Corporation Symantec Advanced Threat Protection Advanced Threat Defense Certification Testing Report Symantec Advanced Threat Protection ICSA Labs Advanced Threat Defense December 8, 2015 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg,

More information

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity How NSFOCUS Protected the G20 Summit Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity SPONSORED BY Rosefelt is responsible for developing NSFOCUS threat intelligence and web

More information

OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER

OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER HOW TO ADDRESS GARTNER S FIVE CHARACTERISTICS OF AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER 1 POWERING ACTIONABLE

More information

FFIEC Cyber Security Assessment Tool. Overview and Key Considerations

FFIEC Cyber Security Assessment Tool. Overview and Key Considerations FFIEC Cyber Security Assessment Tool Overview and Key Considerations Overview of FFIEC Cybersecurity Assessment Tool Agenda Overview of assessment tool Review inherent risk profile categories Review domain

More information

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux EU GENERAL DATA PROTECTION: TIME TO ACT Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux Is this the WAY you handle GDPR today 2 3 area s to consider

More information

Data safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments.

Data safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments. WHITE PAPER Data safety for digital business. One solution for hybrid, physical, and virtual environments. It s common knowledge that the cloud plays a critical role in helping organizations accomplish

More information

CA Security Management

CA Security Management CA Security CA Security CA Security In today s business environment, security remains one of the most pressing IT concerns. Most organizations are struggling to protect an increasing amount of disparate

More information

A Comprehensive Guide to Remote Managed IT Security for Higher Education

A Comprehensive Guide to Remote Managed IT Security for Higher Education A Comprehensive Guide to Remote Managed IT Security for Higher Education About EventTracker EventTracker enables its customers to stop attacks and pass IT audits. EventTracker s award-winning product suite

More information

Information Technology

Information Technology Information Technology Company Profile 2 About Training Solutions Enterprise Solutions Infocan Infocan was established in 1989 with the mission of providing quality, professional, effective and practical

More information

The Convergence of Security and Compliance. How Next Generation Endpoint Security Manages 5 Core Compliance Controls

The Convergence of Security and Compliance. How Next Generation Endpoint Security Manages 5 Core Compliance Controls The Convergence of Security and Compliance How Next Generation Endpoint Security Manages 5 Core Compliance Controls Table of Contents Introduction.... 3 Positive versus Negative Application Security....

More information