Protecting Critical Systems with Symantec

Post on 13-Jan-2015

569 views 3 download

Tags:

description

 

Transcript of Protecting Critical Systems with Symantec

Protecting Critical Systems with Symantec

Chris Collier

Presales Specialist

E: Chris.Collier@arrowecs.co.uk

Agenda• Introduction

• What is a Critical System?

• Symantec Critical System Protection

• Common Customer Requirements

• Use Case

• Summary

• Q&A

2

What is a Critical System?

What is a Critical System?

Databases Application

WebFile Legacy

CriticalSystems

Symantec Critical System Protection

Product Description

Symantec Critical System Protection secures physical and virtual servers.

Proactively safeguard server

environments

• Restrict application and OS behavior

• Protect against zero day threats

• Monitor approved applications

Granular, policy-based controls

Defends physical and virtual servers.

• Monitor and protect physical and virtual data centers

• Provide granular, policy-based controls

• Use host-based intrusion detection (HIDS), intrusion prevention (HIPS), and least-privilege access control

OS Support

– Microsoft Windows

– Sun Solaris®

– Red Hat® Linux

– SUSE Linux

– HP-UX®

– IBM AIX®

– VMware ESX Console OS

7

http://www.symantec.com/connect/blogs/symantec-critical-system-protection-hack-proof-black-hat

8

Black Hat Conference 2012

- A “Capture the flag” event

- Unpatched Windows 2003 server

- Running several vulnerable applications,

- Protected by Symantec solutions. – SEP & CSP

- More than 50 skilled hackers

- The Symantec protected systems remained hack-proof

The Result?

Customer Requirements

Customer Requirements

Use Case

Use Case: VMware Customer

• Target Segments: Financial Services, technology. public sector, manufacturing, healthcare

• Business driver: Moving business onto the cloud to lower capital and operating expenses.

• Potential Background: Building cloud infrastructure using vSphere.

• Feature: Symantec Critical System Protection completely protects vSphere. It is a single solution that protects the ESX and ESXi Hypervisors and vCenter as well as Windows and non-Windows guest virtual machines.

• Outcome: Physical and virtual servers are hardened and secured from attack.

• Key Question: “What are you doing to protect the Hypervisor?”

Summary

Summary

– Critical systems need extra security

– There are multiple opportunities for this product to be positioned.

– Physical Security

– Virtualisation Security

– Legacy & Non-Legacy System Security

– Broad Platform Support

– Proven Technology from Market Leading Security Vendor

Questions?