Symantec Protection Engine

Similar documents
Veritas Data Insight 6.1 Software Compatibility List 6.1

Veritas Data Insight Software Compatibility List 6.1.1

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

Commercial Product Matrix

Behind the Yellow Curtain Symantec s Proactive Protection and Detection Technology

Symantec Protection Engine for Cloud Services Getting Started Guide

EM L01 Introduction to Mobile

Piero DePaoli, Director, Product Marketing Scott Sawoya, Senior Manager, Product Management. SR B19: Symantec Endpoint Protection 12 Customer Panel

Configuring Symantec Protection Engine for Network Attached Storage 8.0 for NetApp Data ONTAP

Configuring Symantec. device

Configuring Symantec Protection Engine for Network Attached Storage for Hitachi Unified and NAS Platforms

Configuring Symantec Protection Engine for Network Attached Storage. Dell FluidFS 5.0

Enterprise Vault Overview Nedeljko Štefančić

SYMANTEC DATA CENTER SECURITY

Antivirus Solution Guide. NetApp Clustered Data ONTAP 8.2.1

Symantec Protection Engine for Cloud Services 7.9 Sizing Guide

Configuring Symantec Protection Engine for Network Attached Storage 7.9 for Hitachi Unified and NAS Platforms

Symantec Enterprise Vault Technical Note

Symantec Endpoint Protection 14

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

FluidFS Antivirus Integration

CloudSOC and Security.cloud for Microsoft Office 365

NTP Software File Reporter

EM L05 Symantec Mobile Management Managing ios and Android Devices

Oracle Solaris 11: No-Compromise Virtualization

Configuring Symantec AntiVirus for BlueArc Storage System

Antivirus Solution Guide for Clustered Data ONTAP: Symantec

Oracle Database Mobile Server, Version 12.2

Inside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1

The Device Has Left the Building

The Evolution of Data Center Security, Risk and Compliance

IBM Aspera for Microsoft SharePoint

CTA and CTA/VE 10.0 SP3 Interoperability Matrix EMC Part Number = Rev.09

McAfee Advanced Threat Defense

Technical Brief Enterprise Vault SMTP Enhancements

Oracle Developer Studio 12.6

ConnectWise Automate. What is ConnectWise Automate?

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

Symantec Endpoint Protection

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks

Cisco Prime Service Catalog Compatibility Matrix

Technical Brief Veritas Technical Education Services

Becoming Proactive on High Availability and Disaster Recovery Readiness

Juniper Sky Advanced Threat Prevention

Symantec Protection Engine for Cloud Services 8.0 Software Developer's Guide

Preventing the Next Insider Threat from Leveraging Cross Domain Data Movement

Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide

Click "Continue", then select "Browse for fixes" and click "Continue" again.

ZENworks: Meeting the Top Requirements for Automated Patch Management

NTP Software QFS. Installation Requirements

How to Secure Your Cloud with...a Cloud?

Application Container Cloud

Encryption Vision & Strategy

Technical Brief Veritas Technical Education Services

Evolution of Cyber Security. Nasser Kettani Chief Technology Officer Microsoft, Middle East and Africa

Dell Change Auditor 6.5. Event Reference Guide

CTA and CTA/VE 10.0 SP3.1 Interoperability Matrix EMC Part Number = Rev.10

IC B01: Internet Security Threat Report: How to Stay Protected

Symantec Data Insight Installation Guide 4.5

Exam : Title : symantec small Business security. Version : DEMO

Enterprise Vault 11 Whitepaper Deploying IMAP Access to Enterprise Vault

Securing the Modern Data Center with Trend Micro Deep Security

INTRODUCING SOPHOS INTERCEPT X

Configuring Symantec Protection Engine for Network Attached Storage 7.9 for NetApp Data ONTAP

Prevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise,

Metascan Client. Tony Berning Product Manager

May the (IBM) X-Force Be With You

Transforming your IT infrastructure Journey to the Cloud Mike Sladin

Enterprise Vault.cloud Feature Briefing

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0

Symantec Multi-tier Protection

McAfee Endpoint Security

Mobile Workforce Produc0vity Vision Jon Kuhn

Symantec and VMWare why 1+1 makes 3

EMC Documentum System

Configuring Symantec Protection Engine for Network Attached Storage. Compuverde vnas Cluster

MySQL CLOUD SERVICE. Propel Innovation and Time-to-Market

Progress DataDirect For Business Intelligence And Analytics Vendors

MOBILE DEFEND. Powering Robust Mobile Security Solutions

Oracle Data Provider for.net Microsoft.NET Core and Entity Framework Core O R A C L E S T A T E M E N T O F D I R E C T I O N F E B R U A R Y

Kaspersky Security for Windows Server

McAfee VirusScan Enterprise for Storage 1.3.0

Deltek Vision 7.6. Technical Overview and System Requirements: Advanced Deployment (150 or More Employees)

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management

Panda Security. Corporate Presentation. Gianluca Busco Arré Country Manager

Managing Data Growth and Storage with Backup Exec 2012

Veritas Operations Manager Storage Insight Add-on for Deep Array Discovery and Mapping 4.0 User's Guide

Introduction to Xamarin Cross Platform Mobile App Development

SSO Integration Overview

10 ways to securely optimize your network. Integrate WAN acceleration with next-gen firewalls to enhance performance, security and control

Mandar J. Vaidya. IBM Systems and Technology Group ISV Enablement May 2013

Technical Brief Veritas Technical Education Services

SOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE

Perceptive Nolij Web. Technical Specifications. Version:

Security Readiness Assessment

Data Sheet: Archiving Altiris Server Management Suite 7.0 Essential server management: Discover, provision, manage, and monitor

2018 Edition. Security and Compliance for Office 365

W H I T E P A P E R : T E C H N I C A L. Enterprise Vault 8.0 Security Model for Microsoft SharePoint Archiving

Enterprise Vault 12 Feature Briefing Classification

Transcription:

Ian McShane Senior Manager, Product Management Kevin Kingston Senior Product Manager 1

Where is your data? 2

What s the problem? File uploads You shouldn t trust any of them. Ever. File sharing You shouldn t trust any files. Ever. File processing File storage / archiving You must establish trust before this happens, but don t rely on it. You shouldn t trust any files, ever. 3

The solution has to be Client Agnostic No security agent No management No guarantees 4

Evolution of Protection Engine 2002 Symantec Carrier Scan 2005 Symantec Scan Engine 2012 Symantec Protection Engine Performance Scalability Enterprise Storage protection Policy Control Next Gen Protection Mobile threats Insight Reputation Content Sanitising 5

Protection Engine for Cloud Services SYMANTEC VISION 2012 6

Provide on-time/real-time protection Client(s) Exchange SharePoint Network Storage Cloud Services/ SAAS..etc... Applications, URLs, Files, etc. Storage, web apps, LOB apps, collaboration, Virtual Machine storage, carrier/telco 7

What can Protection Engine do? Threat Detection URL Filtering Policy Control Next Gen AV. Most popular file types. Latest AV definitions available via LiveUpdate, Rapid Release and Intelligent Update technologies. RuleSpace technology with intelligence on more than 33 million URLs. User defined category support. Latest URL definitions available via LiveUpdate technology. File size File type Scan result Container policies 8

The Scanning Components Typer Accurate file identification Decomposer Inspect containers and almost all file types and formats STAR components Signature based threat detection Advanced Heuristics for threat detection File reputation based threat detection (2013) 9

Popular Deployment Scenarios for ISP s and Enterprise URL classification / Blocking with Symantec RuleSpace File upload & download protection SMTP & MMS attachments Android application (apk) protection Cloud storage Integrate with ANY application either via ICAP or SDK 10

Software Developer Kit v7.0 (C SDK) Latest compilers added for each platform SDK updated to support new ICAP services for Enhanced Threat Categorization. New return codes added for Unscannable File Handling Operating system Arch Compiler Red Hat Enterprise Linux 5.5 x64 gcc 4.1.2 Red Hat Enterprise Linux 6 x86_64 gcc 4.4.5-6 Red Hat Enterprise Linux (SELinux)] 5 x86 gcc 3.4.6 Solaris 10 (SPARC) 32bit gcc 3.4.6 Solaris 10 (SPARC) 64bit gcc 3.4.3 Solaris 10 (x86) 32bit gcc 3.4.3 Solaris 10 (x86) 64bit gcc 3.4.3 Windows Server 2008 R2 x64 MS Visual Studio 2008 MS Visual Studio 2010 Windows Server 2003 R2 x86 MS Visual Studio 2003 SYMANTEC VISION 2012 11

Software Developer Kit v7.0 (Java and.net SDK) Java SDK Supported Platforms and Compilers Operating system Arch Compiler Microsoft Windows Server 2003 R2 x86 jdk 1.6 Microsoft Windows Server 2008 x86 jdk 1.6 Solaris (SPARC) 10 x86 jdk 1.6 Red Hat Enterprise Linux 5.5 x86 jdk 1.6 Microsoft Windows Server 2008 R2 x64 jdk 1.6 Solaris (SPARC) 10 x64 jdk 1.6 Red Hat Enterprise Linux 5.5 x64 jdk 1.6.Net SDK Supported Platforms and Compilers Operating system Arch Compiler Microsoft Windows Server 2003 R2 x86.net 2005 Microsoft Windows Server 2008 R2 x64.net 2008 SYMANTEC VISION 2012 12

Protection Engine for NAS SYMANTEC VISION 2012 13

Why does Network Attached Storage need protection? Defense in Depth Provides protection on storage that can not be bypassed by clients Massive Centralized Repository for Sensitive Data Centralized vector of infection! Can be specifically targeted by hackers Unmanaged Clients that have access to Storage PCs, Linux, Mac, Virtual Machines 14

What is Protection Engine for NAS? Network based virus scanner Supports ICAP and RPC protocols(rpc used for NetApp support only) Most common integration with NetApp DataONTAP client RPC-based connector built-in to ONTAP s CIFS protocol Determines which files to Scan Read, Write, Read/Write Include/Exclude list Already Scanned? Mandatory scan option 15

Other common storage integrations Hitachi NAS EMC Isilon, VNX(formerly Celerra) IBM Sonas and Storwize * These platforms utilize ICAP protocol and are certified by vendor 16

Protection Engine for SharePoint SYMANTEC VISION 2012 17

Provide on-time/real-time protection Client(s) Files 18

Deployment Option 1 Onbox Architecture Protection Engine and SPSS Connector installed on front-end server No additional hardware required Simple installation SharePoint Front-End SPSS Connector SQL Servers SPSS Connector 19

Deployment Option 2 Off-box Architecture Connector installed on each front-end server Can point each WFE to one or more scan engines installed on separate server Increases performance Designed to handle larger loads SharePoint Front-End SPSS Connector SQL Servers SPSS Connector 20

Deployment Option 3 Hybrid Architecture One scan engine resides on front end server with connector SharePoint Front-End Can handle one or more off-box scanners Increased performance with prioritization capabilities Designed to handle larger loads of scanning files Utilizes all available hardware SPSS Connector SQL Servers SPSS Connector 21

Strongest Protection Next generation threat detection technologies powered by the largest threat intelligence network Flexibility and Choice Vast platform support for server and SDK spanning Linux, Solaris and Windows. Security Leadership Provide robust malware protection for NAS platform, and almost any other application via SDK or ICAP. 22

Thank you! Kevin Kingston - kevin_kingston@symantec.com Ian McShane - @ianmcshane Copyright 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 23