Agenda. Today s IT Challenges. Symantec s Collaborative Architecture. Symantec TM Endpoint Management Suite. Connecting Symantec Technologies Today

Similar documents
Introducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection. Bernard Laroche Endpoint security Product marketing

Teleworking and Security: IT All Begins with Endpoints. Jim Jessup Solutions Manager, Information Risk Management June 19, 2007

Comprehensive Endpoint Security. Chris Quinn Systems Engineer March 24, 2009

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

The Convergence of Management and Security. Stephen Brown, Sr. Product Manager December 2008

Symantec Enterprise Solution Product Guide

Symantec Endpoint Protection

KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Symantec Endpoint Protection 11.0

Symantec Small Business Solutions

Symantec Endpoint Protection

Reducing Security Administration Time by 60 percent for More Efficient City Government with Symantec and Novacoast

McAfee Embedded Control

A Secure Foundation for Your Business. Lauren Duda - Product Marketing Manager March 13th, 2007

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

Symantec System Recovery 2013 Management Solution FAQ

Changing face of endpoint security

Innovate or die!? Modern IT Workplace Security. Alex Verboon Cyber Security Consultant

Symantec System Recovery 2011 Management Solution Technical FAQ

Symantec Endpoint Protection 14

Securing Today s Mobile Workforce

Simplify Backups. Dell PowerVault DL2000 Family

Symantec Network Access Control Starter Edition

A NEW DIMENSION FOR DELL SOFTWARE SOFTWARE SOLUTIONS APRIL 2009

Future-ready security for small and mid-size enterprises

AT&T Endpoint Security

CA Host-Based Intrusion Prevention System r8

Data Retrieval Firm Boosts Productivity while Protecting Customer Data

Securing the Empowered Branch with Cisco Network Admission Control. September 2007

Symantec Network Access Control Starter Edition

Deploying VMware Mirage : Tips and Tricks for Success

Symantec Network Access Control Starter Edition

Securing the Modern Data Center with Trend Micro Deep Security

HP Security Solutions for business PCs. Comprehensive protection measures so you can work smarter and with greater confidence.

Symantec Backup Exec 2012

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0

Threat Control and Containment in Intelligent Networks. Philippe Roggeband - Product Manager, Security, Emerging Markets

Angelo Gentili Head of Business Development, EMEA Region, PartnerNET

Data Sheet: Archiving Altiris Server Management Suite 7.0 Essential server management: Discover, provision, manage, and monitor

Symantec Multi-tier Protection

Archiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention

Symantec Multi-tier Protection

Data Protection in Practice

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

ConnectWise Automate. What is ConnectWise Automate?

CYBER SECURITY. formerly Wick Hill DOCUMENT* PRESENTED BY I nuvias.com/cybersecurity I

Reinvent Your 2013 Security Management Strategy

SaaS Flyer for Trend Micro

Surprisingly Successful: What Really Works in Cyber Defense. John Pescatore, SANS

Veritas Provisioning Manager

IT Boosting Employee & Business Productivity with Innovative Technologies and Solutions Refresh Now

WHITE PAPER: ENTERPRISE SOLUTIONS. Disk-Based Data Protection Achieving Faster Backups and Restores and Reducing Backup Windows

Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

IBM Security. Endpoint Manager- BigFix. Daniel Joksch Security Sales IBM Corporation

Stopping Advanced Persistent Threats In Cloud and DataCenters

Altiris Client Management Suite 7.1 from Symantec User Guide

Symantec Backup Exec System Recovery

Cisco ASA 5500 Series IPS Edition for the Enterprise

Endpoint Security for DeltaV Systems

NEN The Education Network

SYMANTEC DATA CENTER SECURITY

Understanding Office 365: Is A Cloud Based Solution Right For Your Business?

To Renew or Change? Cloud-based Antivirus for Busy IT People

Training for the cyber professionals of tomorrow

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Ryan KS office thesee

Symantec System Recovery 2013 R2 Management Solution Administrator's Guide

Symantec to Acquire Altiris January 29, 2007

Cracked BitDefender Client Security 2 Years 20 PCs lowest price software ]

The professional IT management platform

Symantec Endpoint Protection and Management Seminar May 13, 2008

Dell helps you simplify IT

WHITE PAPER Best Practices for Windows Vista Planning, Migration, and Ongoing Management

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief

for businesses with more than 25 seats

Cisco Secure Ops Solution

NEXT BIG THING. Edgemo Summit Martin Plesner-Jacobsen Team Lead Nordic

MD-100: Modern Desktop Administrator Part 1

McAfee Embedded Control for Retail

Why ESET. We help more than 100,000,000 users worldwide to Enjoy Safer Technology. The only vendor with record-breaking protection

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

CASE STUDY: USING THE HYBRID CLOUD TO INCREASE CORPORATE VALUE AND ADAPT TO COMPETITIVE WORLD TRENDS

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

Endpoint Protection. ESET Endpoint Antivirus with award winning ESET NOD32 technology delivers superior detection power for your business.

Understanding Network Access Control: What it means for your enterprise

INTRODUCING VERITAS BACKUP EXEC SUITE

Get BitDefender Client Security 2 Years 30 PCs software suite ]

OUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and the Case For Automated Sandboxing

Protecting Critical Human Services with the Symantec. security and availability solution.

Certified Information Systems Auditor (CISA)

Ritz Camera Leverages Whitelisting for Picture Perfect Security

Network Performance, Security and Reliability Assessment

Enterprise Panel. June 12, 2008

Ransomware & Modern DR: Risky Business

Protect Your End-of-Life Windows Server 2003 Operating System

for businesses with more than 25 seats

Cisco Self Defending Network

T12: Virtualization: IT Audit and Security Perspectives Jason Chan, VMware

Transcription:

Agenda 1 Today s IT Challenges 2 Symantec s Collaborative Architecture 3 Symantec TM Endpoint Management Suite 4 Connecting Symantec Technologies Today 5 Q & A 1

Traditional Protection isn t Good Enough Anymore 5% 30% Evil geniuses who attack us with zero-day attacks < 5% 30% can be resolved through patch management 65% System configuration represents 2/3 of all system weaknesses Source: SearchSecurity.TechTarget.com 3

A Secure Endpoint is a Well-managed Endpoint Security problems can be solved by endpoint management John Pescatore, Vice President, Gartner Inc. Source: http://searchsecurity.techtarget.com/news/interview/0,289202,sid14_gci905234,00.html 4

Symantec s Collaborative Architecture

Open Collaborative Architecture: Connecting People and Technology Workflow Execution Endpoint Security Backup & Recovery Service Desk Patch Management Monitor status Close incidents Distribute patches Obtain change control approval Update signatures Kick-off backup process Test patches Notify risk management team Configuration Management Database (CMDB) Comprehensive Network Discovery Common Software Delivery Process Centralized Reporting Remote Administration 6

Driving to Convergence Situation Solution Integration on Altiris Platform CMDB Duplication of tasks Gaps require manual processes Multiple consoles and agents Various data repositories Overlapping policies Native integration Single view of compliance Consolidated status reporting Pre-built workflow processes 7

Introducing Endpoint Management Suite MANAGE SECURE RECOVER Altiris Client Management Suite 6.0 Inventory and discovery Imaging and provisioning Software delivery and patch management Remote administration Symantec Endpoint Protection 11.0 Antivirus and antispyware protection Firewall Intrusion prevention Application and device control Backup Exec System Recovery 8 Local and offsite backup File and folder restore Complete system recovery #1 in worldwide software distribution (IDC 2006) Leader in client management suites (Forrester 2007) #1 in worldwide secure content and threat management (IDC 2006) Leader in endpoint protection platforms (Gartner 2007) #1 in worldwide data protection and recovery (IDC 2006) Leader enterprise backup/recovery software (Gartner 2007) 9

Manage. How are you managing your Windows desktops and laptops?

IT Lifecycle Management Problem Resolution Transition & Migration Asset Identification Monitor & Track Business Continuity Endpoint Security & Management Retirement Procurement Staging Production Contract Management Deployment & Configuration Application Packaging & QA Patch Management Endpoint Security Software Distribution & Virtualization 11

Altiris Client Management Suite 6.0 Results Software Distribution & Patch Management Imaging & Provisioning Inventory & Discovery Altiris Client Management Suite 6.0 12

Key Ingredients for Management Inventory and Discovery Populates CMDB with comprehensive data for discoverable assets Aggregates data across environment in real time Assists with software license management Helps forecast growth requirements Inventory & Discovery Results GM Brazil > Reduced annual software license expenses by 44 percent within 45 days, equaling a 1,000 percent ROI Reed Smith > Reduced inventory time from one month to minutes 13

Key Ingredients for Management Imaging and Provisioning Imaging & Provisioning Comprehensive deployment capabilities Image-based or scripted OS install Ongoing updates/re-provisioning Tools for hands-free and PC user personality migrations Facilitates implementation of standardized desktop configurations Reduces risks associated with desktop changes Inventory & Discovery Results Triple S > Reduced migration time by 85 percent U.S. Air Force > Responded to new hardware imaging requests in 88 percent less time

Key Ingredients for Management Software Distribution and Patch Management Software Distribution & Patch Management Imaging & Provisioning Inventory & Discovery Implements policy-based software management Distribute applications, updates, code, files to target systems Proactively manage software updates to minimize security risks Automates patch distribution with one-click creation of collections and policies Bandwidth-sensitive systems management for the mobile workforce and roaming worker Results Horizon > Improved software delivery success rate from 60 percent to 90+ percent Edwards Lifesciences > Able to patch their 2,000 PCs in less than two hours 15

Secure. How are you protecting yourself from external threats?

Corporate Network is Continually Exposed Guests Internet Kiosks & Shared Computers WANs & Extranets SSL VPN Consultants Employees Working at Home Wireless Networks Web Applications IPsec VPN

Symantec Endpoint Protection 11.0 Device and Application Control Results Intrusion Prevention Firewall Increased Protection, Control & Manageability Antivirus & Antispyware Symantec Endpoint Protection 11.0 Reduced Cost, Complexity & Risk Exposure 18

Key Ingredients for Endpoint Protection Antivirus World s leading antivirus solution Most (37) consecutive VB100 Awards Antispyware Viruses, Trojans, Worms Spyware, Rootkits Best rootkit detection and removal VxMS = superior rootkit protection Antivirus & Antispyware Source: Thompson Cyber Security Labs, August 2006 19 19

Key Ingredients for Endpoint Protection Firewall Worms, Spyware Industry-leading endpoint firewall technology Gartner Magic Quadrant Leader four consecutive years Rules-based firewall can dynamically adjust port settings to block threats from spreading Firewall Antivirus & Antispyware 20

Key Ingredients for Endpoint Protection Intrusion Prevention 0-Day, Key Logging Intrusion Prevention Firewall Antivirus & Antispyware Combines NIPS (network) and HIPS (host) Generic Exploit Blocking (GEB) One signature to proactively protect against all variants Granular application access control TruScan Proactive threat scanning technology; very low (0.0049%) falsepositive rate Detects 1,000 new threats per month that are not detected by leading antivirus engines No False Alarm 25M Installations Fewer than 50 false positives for every 1M PCs False Alarms 21

Key Ingredients for Endpoint Protection Device and Application Control Slurping, IP Theft Device and Application Control Intrusion Prevention Prevents data leakage Restrict Access to devices (USB keys, backup drives) Whitelisting Allow only trusted applications to run Firewall Antivirus & Antispyware W32.SillyFDC Targets removable memory sticks Spreads by copying itself onto removable drives such as USB memory sticks Automatically runs when the device is next connected to a computer

Recover. How quickly can you recover from a loss or disaster?

The Cost of System Failure What would you lose if a system crashed? Sales transactions Manufacturing data Email and other business data Employee productivity Company reputation 24

Symantec Backup Exec System Recovery 8 Desktop Edition Results File or Folder Restore Complete System Recovery Increased end-user productivity Local or Offsite Backup Symantec Backup Exec System Recovery 8 Reduced downtime and data loss 25

Key Ingredients for Endpoint Recovery Local or Offsite Backup Local or Offsite Backup Create real-time, while-you-work recovery points of the entire system and save to any disk storage device Supports full and incremental backups to save disk space and increase backup performance Select from multiple compression options: none, standard, medium, or high Select from multiple encryption options: 128-bit, 192-bit, or 256-bit AES Automatically copy recovery points (backups) to a network share, FTP server, or external hard drive to enhance disaster recovery efforts Intelligently and uniquely identifies and communicates to USB drives, successfully running backup jobs even if the drive letter for the device changes 26

Key Ingredients for Endpoint Protection Complete System Recovery File or Folder Restore Complete System Recovery Local or Offsite Backup Rapid recovery of entire systems, even to dissimilar hardware or virtual environments, breaks the barrier of incompatible storage controllers and hardware abstraction layers Volumes can be resized during a restore, making hard-drive upgrades or full hardware migrations quick and easy File or Folder Restore Recovers individual files and folders in seconds from either recovery points or file/folder backups Enables end-user recovery of files and folders via Google Desktop or Backup Exec Retrieve using a common Webbrowser interface for fast and simple recovery, without IT intervention

Connecting Symantec Technologies Today Altiris Console Integration Centralized management of agents Centralized distribution of clients Create backup policies and apply to desired systems Leverage other components within the management framework ThreatCon Integration Integrates with Symantec ThreatCon and DeepSight Threat Management System* * Only requires Internet connection. Does not require Symantec Endpoint Protection Manager 28

Symantec Endpoint Management Suite Symantec continues to drive innovation through unique technology convergence and integration