Symantec Network Access Control Starter Edition

Similar documents
Symantec Network Access Control Starter Edition

Symantec Network Access Control Starter Edition

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

Symantec Endpoint Protection

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

Symantec Multi-tier Protection

Evaluation Program for Symantec Mail Security Appliances

Cisco Network Admission Control (NAC) Solution

Symantec Client Security. Integrated protection for network and remote clients.

Symantec Network Security 7100 Series

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group

Symantec Multi-tier Protection

Symantec Advanced Threat Protection: Endpoint

Veritas Provisioning Manager

Networks with Cisco NAC Appliance primarily benefit from:

Symantec Security Monitoring Services

Cisco NAC Network Module for Integrated Services Routers

Key Features. DATA SHEET

Veritas Volume Replicator Option by Symantec

Symantec Discovery. Track hardware/software assets and monitor license compliance throughout a multiplatform IT infrastructure

Novell ZENworks Network Access Control

INSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic

: Administration of Symantec Endpoint Protection 14 Exam

Data Sheet: Archiving Altiris Server Management Suite 7.0 Essential server management: Discover, provision, manage, and monitor

White Paper February McAfee Policy Enforcer. Securing your endpoints for network access with McAfee Policy Enforcer.

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Cisco Identity Services Engine

Symantec Backup Exec System Recovery

Teleworking and Security: IT All Begins with Endpoints. Jim Jessup Solutions Manager, Information Risk Management June 19, 2007

Veritas NetBackup 6.5 Clients and Agents

Remote Expert Installation Service for Symantec Mail Security 8300

Introducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection. Bernard Laroche Endpoint security Product marketing

Data Sheet: Storage Management Veritas Storage Foundation by Symantec Heterogeneous online storage management

Windows Server Network Access Protection. Richard Chiu

Veritas Storage Foundation for Windows by Symantec

McAfee Public Cloud Server Security Suite

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet

Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control

Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection

Veritas Storage Foundation for Windows by Symantec

Overview: Compliance and Security Management PCI-DSS Control Compliance Suite Overview

INSIDE. Overview of Intelligent Message Filter Integration. Symantec Enterprise Security

Seqrite Endpoint Security

Reviewer s guide. PureMessage for Windows/Exchange Product tour

Altiris Client Management Suite 7.1 from Symantec User Guide

Server Management Delivering business value from complex application and server environments

Symantec Endpoint Protection

IT Analytics 7.1 for Altiris IT Management Suite from Symantec

W H I T E P A P E R : T E C H N I C A L. Enterprise Vault 8.0 Security Model for Microsoft SharePoint Archiving

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

Comprehensive Database Security

Symantec Business Continuity Solutions for Operational Risk Management

Symantec Endpoint Protection 14

MOBILE NETWORK ACCESS CONTROL

Symantec Enterprise Vault

The McAfee MOVE Platform and Virtual Desktop Infrastructure

Securing the Empowered Branch with Cisco Network Admission Control. September 2007

Campus Manager. Out-of-Band Network Access Control for Wired, Wireless and VPN Networks. DataSheet

Deployment of security devices can result in significant financial savings from reduction or redirection of IT staff resources needed to deploy,

Symantec Enterprise Support Services Manage IT Risk. Maximize IT Performance.

HP ProCurve Network Access Controller 800

IBM Internet Security Systems Proventia Management SiteProtector

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0

Symantec System Recovery 2011 FAQ

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

Total Protection for Compliance: Unified IT Policy Auditing

Discovering ZENworks 11

Network Access Control Whitepaper

SYMANTEC DATA CENTER SECURITY

Symantec Data Center Transformation

Understanding Network Access Control: What it means for your enterprise

Klaudia Bakšová System Engineer Cisco Systems. Cisco Clean Access

Implementation Guide for Symantec Endpoint Protection Small Business Edition

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

NAC Director. Out-of-Band Network Access Control for Wired, Wireless and VPN Networks. DataSheet

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

Mobile Network Access Control Extending corporate security policies to mobile devices

Data Insight Feature Briefing Box Cloud Storage Support

Data Sheet: High Availability Veritas Cluster Server from Symantec Reduce Application Downtime

SIEM: Five Requirements that Solve the Bigger Business Issues

Symantec NetBackup 7 for VMware

Symantec Backup Exec 2012

ForeScout CounterACT. Automated Security Control Platform. Network Access Control Mobile Security Endpoint Compliance Threat Prevention

Technical Field Enablement. Symantec Messaging Gateway 10.0 HIGH AVAILABILITY WHITEPAPER. George Maculley. Date published: 5 May 2013

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

WHITE PAPER: ENTERPRISE SOLUTIONS. Disk-Based Data Protection Achieving Faster Backups and Restores and Reducing Backup Windows

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

WHITE PAPER: ENTERPRISE SOLUTIONS. Veritas Storage Foundation for Windows Dynamic Multi-pathing Option. Competitive Comparisons

Symantec Document Retention and Discovery

align security instill confidence

Portnox CORE. On-Premise. Technology Introduction AT A GLANCE. Solution Overview

Administration of Symantec Data Loss Prevention 10.5 Study Guide

Veritas Enterprise Vault 6.0 What s New

Choosing the Right Solution for Strategic Deployment of Encryption

Symantec Backup Exec System Recovery Granular Restore Option User's Guide

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS)

Industrial Defender ASM. for Automation Systems Management

ForeScout ControlFabric TM Architecture

Symantec Endpoint Protection 11.0

Veritas Cluster Server from Symantec

Transcription:

Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely leveraged toward a full Symantec Network Access Control deployment. Like Symantec Network Access Control, it grants access only to endpoints that comply with your defined security policies by evaluating compliance status, providing automatic remediation, and ensuring access is properly provisioned and secured. The result is a network environment in which businesses can realize significant reductions in security incidents, increased levels of compliance with configuration policies, and confidence that endpoint security mechanisms are properly enabled. Verifiable organizational compliance information through near real-time endpoint compliance data Minimized total cost of ownership based on an enterprise-class centralized management architecture Verification that endpoint security investments such as Symantec AntiVirus and the client firewall are properly enabled Seamless integration with Symantec Endpoint Protection Key features Key benefits Organizations that deploy Symantec Network Access Control Starter Edition can experience multiple measurable benefits, including: Reduced propagation of malicious code such as viruses, worms, spyware, and other forms of crimeware Lowered risk profile through increased control of unmanaged and managed endpoints accessing the corporate network Greater network availability and reduced disruption of services for end users Symantec Network Access Control Starter Edition Process Network access control process Network access control is a process one that mandates coverage for all types of endpoints and all types of networks. It begins prior to connection to the network and continues throughout the duration of the connection. As with all corporate processes, policy serves as the basis for evaluations and actions. Page 1 of 5

The network access control process consists of four steps: 1. Discover and evaluate endpoints. This occurs as endpoints connect to the network and before they access resources. Through integration with the existing network infrastructure and the use of intelligent agent software, network administrators can be assured that new devices connecting to the network are evaluated according to minimum IT policy requirements. 2. Provision network access. Full network access is granted only after systems are evaluated and determined to be in compliance with IT policy. Systems not in compliance, or failing to meet the minimum security requirements for the organization, are quarantined with limited or no access to the network. 3. Remediate noncompliant endpoints. Automatic remediation of noncompliant endpoints empowers administrators to quickly bring endpoints into compliance and subsequently alter network access. Administrators can either fully automate the remediation process, resulting in a fully transparent process to the end user, or provide information to the user for manual remediation. 4. Proactively monitor compliance. Because adherence to policy is a full-time issue, Symantec Network Access Control actively monitors the compliance posture for all endpoints on an administrator-set interval. If at any time the endpoint s compliance status changes, so will the network access privileges of the endpoint. Deployable in any network The typical corporate user connects to the network by multiple access methods; as a result, administrators must have the flexibility to consistently apply evaluation and connection controls regardless of the connection type. As one of the most mature network access control solutions on the market today, Symantec Network Access Control Starter Edition allows network administrators to actively enforce compliance through existing investments in network infrastructure with no required network equipment upgrades. Whether using one of the Symantec Network Access Control Gateway Enforcers that integrate directly into the network or our host-based Self-Enforcement option requiring no network enforcers, organizations can be assured that end users and endpoints are in compliance at the point of contact to the corporate network. Symantec Network Access Control architecture The Symantec Network Access Control architecture includes three core components: policy management, endpoint evaluation, and network enforcement. All three components work together as a single solution without relying on external elements for functionality. If host-based enforcement is desired over network-based enforcement, only the policy management and endpoint evaluation components are necessary. Centralized policy management and reporting Paramount to the efficient operation of any solution is an enterprise-class management console. The Symantec Endpoint Protection Manager provides a Java technology based console to centrally create, deploy, manage, and report agent and Enforcer activity. Scalable to fit the most Page 2 of 5

demanding environments, the policy manager provides granular control to all administrative tasks in a highavailability architecture. Endpoint evaluation Symantec Network Access Control Starter Edition protects the network from malicious code and also verifies that endpoints connecting to the network are configured properly so they are protected from online attacks. Regardless of the goal, the process begins with evaluating the endpoint. While the common minimum requirements for allowing network access include checking for antivirus, antispyware, and installed patches, most organizations quickly expand well beyond these minimums after the initial network access control deployment. Symantec Network Access Control Starter Edition offers persistent agent based evaluation technology when determining endpoint compliance. Corporate-owned and other managed systems use an administrator-installed agent to determine compliance status. It checks antivirus, antispyware, and installed patches as well as complex system status characteristics such as registry entries, running processes, and file attributes. Persistent agents provide the most in-depth, accurate, and reliable system compliance information while offering the most flexible remediation and repair functionality of assessment options. Enforcement Symantec Network Access Control Starter Edition allows you to select between gateway-based enforcement and host-based enforcement: Gateway Enforcer is an in-line enforcement device used at network choke points. It controls the flow of traffic through the device based upon policy compliance of remote endpoints. Whether the choke point is at perimeter network connection points, such as WAN links or VPNs, or on internal segments accessing critical business systems, Gateway Enforcer efficiently provides controlled access to resources and remediation services. Microsoft Network Access Protection (NAP) Enforcer augments NAP s native capabilities by providing more comprehensive compliance-checking options and adds custom compliance checks. Organizations can deploy NAP quickly and easily through the unified architecture and simplified user interface provided by Symantec Network Access Control. Self-Enforcement leverages the host-based firewall capabilities within the Symantec Protection Agent to adjust local agent policies according to endpoint compliance status. This allows administrators to control access to any network, on or off the corporate network, for devices such as laptops that routinely move between multiple networks. Peer-to-Peer Enforcement ensures that client-to-client communication can only occur between endpoints that are owned and managed by the organization and between endpoints that are compliant with defined endpoint security policies. Page 3 of 5

Support services Symantec provides a range of consulting, technical education, and support services that guide you through the migration, deployment, and management of Symantec Network Access Control Starter Edition and help you realize the full value of your investment. For organizations that want to outsource security monitoring and management, Symantec also offers Managed Security Services to deliver real-time security protection. Symantec Network Access Control Starter Edition product family Central management Symantec Endpoint Protection Manager Enforcement LAN 802.1 DHCP Symantec Network Access Control Symantec Network Access Control Starter Edition Gateway Microsoft NAP Self-enforcement Peer-to-Peer Endpoint evaluation Persistent agent Dissolvable agent* Remote vulnerability scanning* * = purchased separately Minimum system requirements Platform support Symantec Endpoint Protection Manager Central administration server Microsoft Windows 2008 Server Microsoft Windows 2003 Microsoft Windows P Microsoft Windows 2000 (SP3 and later) Processor 600 MHz 1 GHz 512 MB 512 MB Hard disk 500 MB 500 MB Symantec Endpoint Protection Console Remote administration console (optional) Microsoft Windows Vista Microsoft Windows 2003 Microsoft Windows P Microsoft Windows 2000 (SP3 and later) Processor 600 MHz 1 GHz 256 MB 256 MB Hard disk 40 MB 40 MB Symantec Network Access Control Client Microsoft Windows 2008 Server Microsoft Windows Vista Microsoft Windows 2003 Microsoft Windows P Microsoft Windows 2000 Professional 128 MB 128 MB Hard disk 600 MB 600 MB Page 4 of 5

Symantec Network Access Control Starter Edition Symantec Network Access Control Enforcer 6100 Series (optional) Base Appliance Option (Gateway) Rack units 1 Dimensions 1.68" x 17.60" x 21.5" Processor Storage One 2.8-GHz Intel Pentium 4 processor 1 GB One 160-GB (SATA) Fail Open Appliance Option (Gateway) Rack units 1 Dimensions 1.68" x 17.60" x 21.5" Processor Storage One 2.8-GHz Intel Pentium 4 processor 1 GB One 160-GB (SATA) Symantec Network Access Control Scanner (optional) Operating system: Microsoft Windows 2000 Server (SP4) Microsoft Windows 2003 Server (SP1) Minimum processor: Intel Pentium 4 1.8 GHz 1 GB minimum 1 GB free hard disk space Internet Explorer 5.5 or later Microsoft Windows 2000 Professional More information Visit our Web site www.symantec.com/endpoint To speak with a Product Specialist in the U.S. Call toll-free 1 (800) 745 6054 To speak with a Product Specialist outside the U.S. For specific country offices and contact numbers, please visit our Web site. About Symantec Symantec is a global leader in providing security, storage, and systems management solutions to help business and consumers secure and manage their information. Headquartered in Cupertino, Calif., Symantec has operations in more than 40 countries. More information is available at www.symantec.com. Symantec World Headquarters 20330 Stevens Creek Boulevard Cupertino, CA 95014 USA +1 (408) 517 8000 1 (800) 721 3934 www.symantec.com Copyright 2008 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Symantec AntiVirus are trademarks or registered trademarks of Symantec Corporation or its affiliates in the United States and other countries. Intel and Pentium are registered trademarks of Intel Corporation. Microsoft, Windows, and Windows Vista are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Java is a trademark of Sun Microsystems, Inc., in the U.S. and other countries. Other names may be trademarks of their respective owners. Printed in the U.S.A. 03/08 12836808-1 Page 5 of 5