Agenda 1 Today s IT Challenges 2 Symantec s Collaborative Architecture 3 Symantec TM Endpoint Management Suite 4 Connecting Symantec Technologies Today 5 Q & A 1
Traditional Protection isn t Good Enough Anymore 5% 30% Evil geniuses who attack us with zero-day attacks < 5% 30% can be resolved through patch management 65% System configuration represents 2/3 of all system weaknesses Source: SearchSecurity.TechTarget.com 3
A Secure Endpoint is a Well-managed Endpoint Security problems can be solved by endpoint management John Pescatore, Vice President, Gartner Inc. Source: http://searchsecurity.techtarget.com/news/interview/0,289202,sid14_gci905234,00.html 4
Symantec s Collaborative Architecture
Open Collaborative Architecture: Connecting People and Technology Workflow Execution Endpoint Security Backup & Recovery Service Desk Patch Management Monitor status Close incidents Distribute patches Obtain change control approval Update signatures Kick-off backup process Test patches Notify risk management team Configuration Management Database (CMDB) Comprehensive Network Discovery Common Software Delivery Process Centralized Reporting Remote Administration 6
Driving to Convergence Situation Solution Integration on Altiris Platform CMDB Duplication of tasks Gaps require manual processes Multiple consoles and agents Various data repositories Overlapping policies Native integration Single view of compliance Consolidated status reporting Pre-built workflow processes 7
Introducing Endpoint Management Suite MANAGE SECURE RECOVER Altiris Client Management Suite 6.0 Inventory and discovery Imaging and provisioning Software delivery and patch management Remote administration Symantec Endpoint Protection 11.0 Antivirus and antispyware protection Firewall Intrusion prevention Application and device control Backup Exec System Recovery 8 Local and offsite backup File and folder restore Complete system recovery #1 in worldwide software distribution (IDC 2006) Leader in client management suites (Forrester 2007) #1 in worldwide secure content and threat management (IDC 2006) Leader in endpoint protection platforms (Gartner 2007) #1 in worldwide data protection and recovery (IDC 2006) Leader enterprise backup/recovery software (Gartner 2007) 9
Manage. How are you managing your Windows desktops and laptops?
IT Lifecycle Management Problem Resolution Transition & Migration Asset Identification Monitor & Track Business Continuity Endpoint Security & Management Retirement Procurement Staging Production Contract Management Deployment & Configuration Application Packaging & QA Patch Management Endpoint Security Software Distribution & Virtualization 11
Altiris Client Management Suite 6.0 Results Software Distribution & Patch Management Imaging & Provisioning Inventory & Discovery Altiris Client Management Suite 6.0 12
Key Ingredients for Management Inventory and Discovery Populates CMDB with comprehensive data for discoverable assets Aggregates data across environment in real time Assists with software license management Helps forecast growth requirements Inventory & Discovery Results GM Brazil > Reduced annual software license expenses by 44 percent within 45 days, equaling a 1,000 percent ROI Reed Smith > Reduced inventory time from one month to minutes 13
Key Ingredients for Management Imaging and Provisioning Imaging & Provisioning Comprehensive deployment capabilities Image-based or scripted OS install Ongoing updates/re-provisioning Tools for hands-free and PC user personality migrations Facilitates implementation of standardized desktop configurations Reduces risks associated with desktop changes Inventory & Discovery Results Triple S > Reduced migration time by 85 percent U.S. Air Force > Responded to new hardware imaging requests in 88 percent less time
Key Ingredients for Management Software Distribution and Patch Management Software Distribution & Patch Management Imaging & Provisioning Inventory & Discovery Implements policy-based software management Distribute applications, updates, code, files to target systems Proactively manage software updates to minimize security risks Automates patch distribution with one-click creation of collections and policies Bandwidth-sensitive systems management for the mobile workforce and roaming worker Results Horizon > Improved software delivery success rate from 60 percent to 90+ percent Edwards Lifesciences > Able to patch their 2,000 PCs in less than two hours 15
Secure. How are you protecting yourself from external threats?
Corporate Network is Continually Exposed Guests Internet Kiosks & Shared Computers WANs & Extranets SSL VPN Consultants Employees Working at Home Wireless Networks Web Applications IPsec VPN
Symantec Endpoint Protection 11.0 Device and Application Control Results Intrusion Prevention Firewall Increased Protection, Control & Manageability Antivirus & Antispyware Symantec Endpoint Protection 11.0 Reduced Cost, Complexity & Risk Exposure 18
Key Ingredients for Endpoint Protection Antivirus World s leading antivirus solution Most (37) consecutive VB100 Awards Antispyware Viruses, Trojans, Worms Spyware, Rootkits Best rootkit detection and removal VxMS = superior rootkit protection Antivirus & Antispyware Source: Thompson Cyber Security Labs, August 2006 19 19
Key Ingredients for Endpoint Protection Firewall Worms, Spyware Industry-leading endpoint firewall technology Gartner Magic Quadrant Leader four consecutive years Rules-based firewall can dynamically adjust port settings to block threats from spreading Firewall Antivirus & Antispyware 20
Key Ingredients for Endpoint Protection Intrusion Prevention 0-Day, Key Logging Intrusion Prevention Firewall Antivirus & Antispyware Combines NIPS (network) and HIPS (host) Generic Exploit Blocking (GEB) One signature to proactively protect against all variants Granular application access control TruScan Proactive threat scanning technology; very low (0.0049%) falsepositive rate Detects 1,000 new threats per month that are not detected by leading antivirus engines No False Alarm 25M Installations Fewer than 50 false positives for every 1M PCs False Alarms 21
Key Ingredients for Endpoint Protection Device and Application Control Slurping, IP Theft Device and Application Control Intrusion Prevention Prevents data leakage Restrict Access to devices (USB keys, backup drives) Whitelisting Allow only trusted applications to run Firewall Antivirus & Antispyware W32.SillyFDC Targets removable memory sticks Spreads by copying itself onto removable drives such as USB memory sticks Automatically runs when the device is next connected to a computer
Recover. How quickly can you recover from a loss or disaster?
The Cost of System Failure What would you lose if a system crashed? Sales transactions Manufacturing data Email and other business data Employee productivity Company reputation 24
Symantec Backup Exec System Recovery 8 Desktop Edition Results File or Folder Restore Complete System Recovery Increased end-user productivity Local or Offsite Backup Symantec Backup Exec System Recovery 8 Reduced downtime and data loss 25
Key Ingredients for Endpoint Recovery Local or Offsite Backup Local or Offsite Backup Create real-time, while-you-work recovery points of the entire system and save to any disk storage device Supports full and incremental backups to save disk space and increase backup performance Select from multiple compression options: none, standard, medium, or high Select from multiple encryption options: 128-bit, 192-bit, or 256-bit AES Automatically copy recovery points (backups) to a network share, FTP server, or external hard drive to enhance disaster recovery efforts Intelligently and uniquely identifies and communicates to USB drives, successfully running backup jobs even if the drive letter for the device changes 26
Key Ingredients for Endpoint Protection Complete System Recovery File or Folder Restore Complete System Recovery Local or Offsite Backup Rapid recovery of entire systems, even to dissimilar hardware or virtual environments, breaks the barrier of incompatible storage controllers and hardware abstraction layers Volumes can be resized during a restore, making hard-drive upgrades or full hardware migrations quick and easy File or Folder Restore Recovers individual files and folders in seconds from either recovery points or file/folder backups Enables end-user recovery of files and folders via Google Desktop or Backup Exec Retrieve using a common Webbrowser interface for fast and simple recovery, without IT intervention
Connecting Symantec Technologies Today Altiris Console Integration Centralized management of agents Centralized distribution of clients Create backup policies and apply to desired systems Leverage other components within the management framework ThreatCon Integration Integrates with Symantec ThreatCon and DeepSight Threat Management System* * Only requires Internet connection. Does not require Symantec Endpoint Protection Manager 28
Symantec Endpoint Management Suite Symantec continues to drive innovation through unique technology convergence and integration