B Powerpoint Endpt Mgmt Suite

31
Symantec TM Endpoint Management Suite Customer Presentation Manage. Secure. Recover.

Transcript of B Powerpoint Endpt Mgmt Suite

Page 1: B Powerpoint Endpt Mgmt Suite

SymantecTM Endpoint Management Suite Customer PresentationManage. Secure. Recover.

Page 2: B Powerpoint Endpt Mgmt Suite

2

Agenda

Today’s IT Challenges11

Symantec’s Collaborative Architecture

SymantecTM Endpoint Management Suite

Connecting Symantec Technologies Today

Q & A

22

33

44

55

Page 3: B Powerpoint Endpt Mgmt Suite

3

NaturalDisasters

InfrastructureFailures

HumanError

MaliciousThreats

Today’s IT Challenges

Information

Page 4: B Powerpoint Endpt Mgmt Suite

Traditional Protection isn’t Good Enough Anymore

4

Source: SearchSecurity.TechTarget.com

Evil geniuses who attack us with zero-day attacks < 5%

System configuration represents 2/3 of all system weaknesses

65%

30% can be resolved through patch management

30%

5%

Page 5: B Powerpoint Endpt Mgmt Suite

A Secure Endpoint is a Well-managed Endpoint

5

95%Security problems can be solved by endpoint management

John Pescatore, Vice President, Gartner Inc.Source: http://searchsecurity.techtarget.com/news/interview/0,289202,sid14_gci905234,00.html

John Pescatore, Vice President, Gartner Inc.Source: http://searchsecurity.techtarget.com/news/interview/0,289202,sid14_gci905234,00.html

Page 6: B Powerpoint Endpt Mgmt Suite

Symantec’s Collaborative Architecture

Page 7: B Powerpoint Endpt Mgmt Suite

7

Open Collaborative Architecture: Connecting People and Technology

Backup & Recovery

Service Desk

Endpoint Security

Patch Management

Workflow Execution

Monitor statusClose incidentsDistribute patchesObtain change control approvalUpdate signaturesKick-off backup processTest patchesNotify risk management team

Comprehensive Network DiscoveryCommon Software Delivery ProcessCentralized ReportingRemote Administration

Configuration Management Database (CMDB)

Page 8: B Powerpoint Endpt Mgmt Suite

Integration on Altiris Platform

8

Driving to Convergence

Solution

• Native integration• Single view of compliance• Consolidated status reporting• Pre-built workflow processes

CMDB

Situation

• Duplication of tasks • Gaps require manual processes• Multiple consoles and agents • Various data repositories• Overlapping policies

Page 9: B Powerpoint Endpt Mgmt Suite

Symantec Leads the Way

July 2007 “The Forrester Wave™: Client Management Suites, Q3 2007”

Symantec’s acquisition of Altiris in Q2 2007 illustrates the impending requirements of integrated security and management—and that is exactly what Symantec delivers.

9Symantec Confidential

WeakWeak StrategyStrategy StrongStrong

CurrentofferingCurrentoffering

StrongStrong

Market presenceMarket presence

BMC SoftwareBMC Software

IBMIBM

MicrosoftMicrosoft

NovellNovell

LANDeskLANDeskCACA HPHP

Full vendor participationFull vendor participation

ContendersContendersStrong

PerformersStrong

Performers LeadersLeadersRiskyBets

RiskyBets

SymantecSymantec

Natalie LambertSenior Analyst, Forrester

Symantec Offers the Most Mature Client Management SuiteSymantec Offers the Most Mature Client Management Suite

Page 10: B Powerpoint Endpt Mgmt Suite

10

IntroducingEndpoint Management Suite

• Inventory and discovery

• Imaging and provisioning

• Software delivery and patch management

• Remote administration

MANAGE

#1 in worldwide software distribution (IDC 2006)

Leader in client management suites (Forrester 2007)

Altiris® Client Management Suite™ 6.0

• Local and offsite backup

• File and folder restore

• Complete system recovery

RECOVER

#1 in worldwide data protection and recovery (IDC 2006)

Leader enterprise backup/recovery software (Gartner 2007)

Backup Exec™ System Recovery 8

• Antivirus and antispyware protection

• Firewall

• Intrusion prevention

• Application and device control

SECURE

#1 in worldwide secure content and threat management (IDC 2006)

Leader in endpoint protection platforms (Gartner 2007)

Symantec™ Endpoint Protection 11.0

Page 11: B Powerpoint Endpt Mgmt Suite

Manage.

How are you managing your Windows® desktops and laptops?

Page 12: B Powerpoint Endpt Mgmt Suite

IT Lifecycle Management

12

Endpoint Security &

Management• Retirement• Procurement• Staging• Production

Transition &

MigrationProblem Resolution

Monitor &Track

BusinessContinuity

Patch Management

Asset Identification

Contract Management

Deployment & Configuration

Application Packaging & QA

Software Distribution & Virtualization

Endpoint Security

Page 13: B Powerpoint Endpt Mgmt Suite

Altiris® Client Management Suite™ 6.0

13

Results

Inventory &Discovery

Inventory &Discovery

Imaging & ProvisioningImaging &

Provisioning

Software Distribution & Patch ManagementSoftware Distribution & Patch Management

Altiris Client Management

Suite 6.0

Page 14: B Powerpoint Endpt Mgmt Suite

14

Key Ingredients for Management

Inventory and Discovery

Populates CMDB with comprehensive data for discoverable assets

Aggregates data across environment in real time

Assists with software license management

Helps forecast growth requirements

Inventory &Discovery

Inventory &Discovery

Results

GM Brazil > Reduced annual software license expenses by 44 percent within 45 days, equaling a 1,000 percent ROI

Reed Smith > Reduced inventory time from one month to minutes

GM Brazil > Reduced annual software license expenses by 44 percent within 45 days, equaling a 1,000 percent ROI

Reed Smith > Reduced inventory time from one month to minutes

Page 15: B Powerpoint Endpt Mgmt Suite

Key Ingredients for Management

Imaging and Provisioning

Comprehensive deployment capabilities Image-based or scripted OS install Ongoing updates/re-provisioning Tools for hands-free and PC user

personality migrations Facilitates implementation of

standardized desktop configurations Reduces risks associated with

desktop changes

Results

Triple S > Reduced migration time by 85 percent

U.S. Air Force > Responded to new hardware imaging requests in 88 percent less time

Triple S > Reduced migration time by 85 percent

U.S. Air Force > Responded to new hardware imaging requests in 88 percent less time

Inventory &Discovery

Inventory &Discovery

Imaging & ProvisioningImaging &

Provisioning

Page 16: B Powerpoint Endpt Mgmt Suite

16

Key Ingredients for Management

Inventory &Discovery

Inventory &Discovery

Imaging & ProvisioningImaging &

Provisioning

Software Distribution & Patch ManagementSoftware Distribution & Patch Management

Software Distribution and Patch Management

Implements policy-based software management Distribute applications, updates,

code, files to target systems Proactively manage software updates to

minimize security risks Automates patch distribution with

one-click creation of collections and policies

Bandwidth-sensitive systems management for the mobile workforce and roaming worker

Results

Horizon > Improved software delivery success rate from 60 percent to 90+ percent

Edwards Lifesciences > Able to patch their 2,000 PCs in less than two hours

Horizon > Improved software delivery success rate from 60 percent to 90+ percent

Edwards Lifesciences > Able to patch their 2,000 PCs in less than two hours

Page 17: B Powerpoint Endpt Mgmt Suite

Secure.

How are you protecting yourself from external threats?

Page 18: B Powerpoint Endpt Mgmt Suite

Corporate Network is Continually Exposed

WirelessNetworks

WebApplications

Guests

Consultants

IPsec VPN

EmployeesWorking at Home

WANs& Extranets

SSL VPN

Internet Kiosks& Shared

Computers

Page 19: B Powerpoint Endpt Mgmt Suite

19

Symantec Endpoint Protection 11.0

Antivirus & AntispywareAntivirus & Antispyware

FirewallFirewall

IntrusionPreventionIntrusion

Prevention

Device and Application Control

Device and Application Control

Reduced Cost,

Complexity & Risk Exposure

Increased Protection, Control &

Manageability

Results

Symantec Endpoint Protection 11.0

Page 20: B Powerpoint Endpt Mgmt Suite

20

Key Ingredients for Endpoint Protection

20

Spyware, RootkitsSpyware, RootkitsViruses, Trojans, WormsViruses, Trojans, Worms

Antivirus

World’s leading antivirus solution Most (37) consecutive VB100 Awards

Antispyware

Best rootkit detection and removal VxMS = superior rootkit protection

Antivirus & AntispywareAntivirus & Antispyware

Source: Thompson Cyber Security Labs, August 2006

Page 21: B Powerpoint Endpt Mgmt Suite

21

Key Ingredients for Endpoint Protection

Worms, SpywareWorms, Spyware

Firewall

Industry-leading endpoint firewall technology

Gartner Magic Quadrant “Leader” four consecutive years

Rules-based firewall can dynamically adjust port settings to block threats from spreading

Antivirus & AntispywareAntivirus & Antispyware

FirewallFirewall

Page 22: B Powerpoint Endpt Mgmt Suite

22

Key Ingredients for Endpoint Protection

0-Day, Key Logging0-Day, Key Logging

Intrusion Prevention

Combines NIPS (network) and HIPS (host)

Generic Exploit Blocking (GEB)—One signature to proactively protect against all variants

Granular application access control TruScan™—Proactive threat scanning

technology; very low (0.0049%) false-positive rate

Detects 1,000 new threats per month that are not detected by leading antivirus engines

Antivirus & AntispywareAntivirus & Antispyware

FirewallFirewall

IntrusionPreventionIntrusion

Prevention

25M Installations25M Installations

Fewer than 50 false positives for every 1M PCs

Fewer than 50 false positives for every 1M PCs

Page 23: B Powerpoint Endpt Mgmt Suite

Slurping, IP TheftSlurping, IP Theft

Key Ingredients for Endpoint Protection

Device and Application Control

Prevents data leakage Restrict Access to devices (USB keys,

backup drives) Whitelisting—Allow only “trusted”

applications to run

Device and Application Control

Device and Application Control

W32.SillyFDC

Targets removable memory sticks

Spreads by copying itself onto removable drives such as USB memory sticks

Automatically runs when the device is next connected to a computer

Antivirus & AntispywareAntivirus & Antispyware

FirewallFirewall

IntrusionPreventionIntrusion

Prevention

Page 24: B Powerpoint Endpt Mgmt Suite

Recover.

How quickly can you recover from a loss or disaster?

Page 25: B Powerpoint Endpt Mgmt Suite

The Cost of System Failure

• Sales transactions

• Manufacturing data

• Email and other business data

• Employee productivity

• Company reputation

25

What would you lose if a system crashed?What would you lose if a system crashed?

Page 26: B Powerpoint Endpt Mgmt Suite

26

Symantec Backup Exec System Recovery 8 Desktop Edition

Local or OffsiteBackup

Local or OffsiteBackup

Complete System Recovery

Complete System Recovery

File or Folder Restore

File or Folder Restore

Symantec Backup ExecSystem Recovery 8

Reduced downtime and

data loss

Increased end-user

productivity

Results

Page 27: B Powerpoint Endpt Mgmt Suite

27

Key Ingredients for Endpoint Recovery

Local or Offsite Backup

Create real-time, while-you-work recovery points of the entire system and save to any disk storage device

Supports full and incremental backups to save disk space and increase backup performance

Select from multiple compression options: none, standard, medium, or high

Select from multiple encryption options: 128-bit, 192-bit, or 256-bit AES

Automatically copy recovery points (backups) to a network share, FTP server, or external hard drive to enhance disaster recovery efforts

Intelligently and uniquely identifies and communicates to USB drives, successfully running backup jobs even if the drive letter for the device changes

Local or OffsiteBackup

Local or OffsiteBackup

Page 28: B Powerpoint Endpt Mgmt Suite

Key Ingredients for Endpoint Protection

Complete System Recovery

Rapid recovery of entire systems, even to dissimilar hardware or virtual environments, breaks the barrier of incompatible storage controllers and hardware abstraction layers

Volumes can be resized during a restore, making hard-drive upgrades or full hardware migrations quick and easy

File or Folder Restore

Recovers individual files and folders in seconds from either recovery points or file/folder backups

Enables end-user recovery of files and folders via Google Desktop™ or Backup Exec Retrieve using a common Web-browser interface for fast and simple recovery, without IT intervention

Local or OffsiteBackup

Local or OffsiteBackup

Complete System Recovery

Complete System Recovery

File or Folder Restore

File or Folder Restore

Page 29: B Powerpoint Endpt Mgmt Suite

29

Altiris Console Integration

• Centralized management of agents

• Centralized distribution of clients

• Create backup policies and apply to desired systems

• Leverage other components within the management framework

ThreatCon Integration

• Integrates with Symantec ThreatCon and DeepSight™ Threat Management System*

Connecting Symantec Technologies Today

* Only requires Internet connection. Does not require Symantec Endpoint Protection Manager

Page 30: B Powerpoint Endpt Mgmt Suite

Symantec Endpoint Management Suite

Symantec continues to drive innovationthrough unique technology convergence and integration

Symantec continues to drive innovationthrough unique technology convergence and integration

Page 31: B Powerpoint Endpt Mgmt Suite

Thank You!

Copyright © 2008 Symantec Corporation. All rights reserved.  Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries.  Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising.  All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law.  The information in this document is subject to change without notice.

31