Symantec Technical Services · Symantec Technical Services strives to provide services for...

56
© 2013 Symantec Corporation. All rights reserved. 1 Symantec Technical Services Global Consulting Services Catalog Version 1.00 October 2013

Transcript of Symantec Technical Services · Symantec Technical Services strives to provide services for...

Page 1: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 1

Symantec Technical Services Global Consulting Services Catalog

Version 1.00 – October 2013

Page 2: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 2

Chapter 1: How to use this Catalog ................................................................................................... 6

Purpose of this Service Catalog ................................................................................................................................................................................................................................................. 6

Intended Audience ..................................................................................................................................................................................................................................................................... 6

Format of Service Offering Listings ............................................................................................................................................................................................................................................ 6

Product Peak Areas .................................................................................................................................................................................................................................................................... 6 Definition of terms ....................................................................................................................................................................................................................................................................... 6

Ordering and Requesting Services ............................................................................................................................................................................................................................................ 7

Requesting Additional Services.................................................................................................................................................................................................................................................. 7

Additional Information ................................................................................................................................................................................................................................................................. 7 Legal Notice ................................................................................................................................................................................................................................................................................ 7

Chapter 2: ADTO Overview ............................................................................................................... 8

Assess, Design, Transform, Operate (ADTO) methodology ...................................................................................................................................................................................................... 8 ADTO Phases defined ................................................................................................................................................................................................................................................................ 8

Association with Service Offerings ............................................................................................................................................................................................................................................. 8 Service Type Translation Table .................................................................................................................................................................................................................................................. 9

Chapter 3: Global Services Offerings ............................................................................................... 10

Information Management .......................................................................................................................................................................................................................................................... 10 ApplicationHA ................................................................................................................................................................................................................................................................ 10

Data Insight (DI) ............................................................................................................................................................................................................................................................. 10 Symantec Enterprise Vault™ (EV) ................................................................................................................................................................................................................................. 10

Symantec NetBackup™ (NBU) ..................................................................................................................................................................................................................................... 10

Storage Foundation High Availability (SFHA) ................................................................................................................................................................................................................ 11

Information Security .................................................................................................................................................................................................................................................................. 12

Control Compliance Suite (CCS) ................................................................................................................................................................................................................................... 12

Critical System Protection (CSP) ................................................................................................................................................................................................................................... 12

Data Loss Prevention (DLP) ........................................................................................................................................................................................................................................... 12

User Protection and Productivity .............................................................................................................................................................................................................................................. 13 PGP Encryption .............................................................................................................................................................................................................................................................. 13

Symantec Endpoint Protection (SEP) ............................................................................................................................................................................................................................ 13

Appendix .......................................................................................................................................... 14

NAM Geography-Specific Offerings ......................................................................................................................................................................................................................................... 15

Information Management .......................................................................................................................................................................................................................................................... 15 Clearwell eDiscovery Platform ....................................................................................................................................................................................................................................... 15

Symantec NetBackup™ (NBU) ..................................................................................................................................................................................................................................... 15

Symantec Enterprise Vault™ (EV) ................................................................................................................................................................................................................................. 15 Storage Foundation High Availability (SFHA) ................................................................................................................................................................................................................ 16

Information Security .................................................................................................................................................................................................................................................................. 16 Control Compliance Suite (CCS) ................................................................................................................................................................................................................................... 16

Critical System Protection (CSP) ................................................................................................................................................................................................................................... 17 Data Loss Prevention (DLP) ........................................................................................................................................................................................................................................... 17

Managed Security Services (MSS) ................................................................................................................................................................................................................................ 18

Symantec Messaging Gateway (SMG) ......................................................................................................................................................................................................................... 18

Symantec Network Access Control (SNAC) .................................................................................................................................................................................................................. 18 Symantec Protection Center (SPC) ............................................................................................................................................................................................................................... 19

Symantec Protection Engine (SPE) ............................................................................................................................................................................................................................... 19 Symantec Protection Engine for NAS ............................................................................................................................................................................................................................ 19

Page 3: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 3

Symantec Security Program Assessment ..................................................................................................................................................................................................................... 20

Symantec Web Gateway (SWG) .................................................................................................................................................................................................................................... 20

User Protection and Productivity .............................................................................................................................................................................................................................................. 20

Altiris™ IT Management Suite from Symantec™ .......................................................................................................................................................................................................... 20

Symantec App Center.................................................................................................................................................................................................................................................... 22

Symantec Encryption Management Server (SEMS) ...................................................................................................................................................................................................... 22 Symantec Endpoint Protection (SEP) ............................................................................................................................................................................................................................ 23

Symantec Workspace Streaming (SWS) ....................................................................................................................................................................................................................... 23 Other Offering(s) ....................................................................................................................................................................................................................................................................... 23

SymRA for Business Critical Virtualization..................................................................................................................................................................................................................... 23 LAMC Geography-Specific Offerings ....................................................................................................................................................................................................................................... 24

Information Management .......................................................................................................................................................................................................................................................... 24

Storage Foundation High Availability (SFHA) ................................................................................................................................................................................................................ 24

Symantec Enterprise Vault™ (EV) ................................................................................................................................................................................................................................. 24 Symantec NetBackup™ (NBU) ..................................................................................................................................................................................................................................... 25

Information Security .................................................................................................................................................................................................................................................................. 25

Control Compliance Suite (CCS) ................................................................................................................................................................................................................................... 25

Critical System Protection (CSP) ................................................................................................................................................................................................................................... 25

Data Loss Prevention (DLP) ........................................................................................................................................................................................................................................... 25

Symantec Messaging Gateway (SMG) ......................................................................................................................................................................................................................... 26 Symantec Protection Center (SPC) ............................................................................................................................................................................................................................... 26

Symantec Protection Engine for NAS ............................................................................................................................................................................................................................ 26 Managed Security Services (MSS) ................................................................................................................................................................................................................................ 27

User Protection and Productivity .............................................................................................................................................................................................................................................. 27 Altiris™ IT Management Suite from Symantec™ .......................................................................................................................................................................................................... 27

Symantec App Center.................................................................................................................................................................................................................................................... 29 Symantec Encryption Management Server (SEMS) ...................................................................................................................................................................................................... 29

Symantec Endpoint Protection (SEP) ............................................................................................................................................................................................................................ 29

Symantec Workspace Streaming (SWS) ....................................................................................................................................................................................................................... 30

Other Offering(s) ....................................................................................................................................................................................................................................................................... 30

SymRA for Business Critical Virtualization..................................................................................................................................................................................................................... 30 APJ-Pacific Region-Specific Offerings ..................................................................................................................................................................................................................................... 31

Information Management .......................................................................................................................................................................................................................................................... 31 Data Insight (DI) ............................................................................................................................................................................................................................................................. 31

Symantec NetBackup™ Appliance ............................................................................................................................................................................................................................... 31

Security Information Manager ........................................................................................................................................................................................................................................ 31

Information Security .................................................................................................................................................................................................................................................................. 32 Control Compliance Suite (CCS) ................................................................................................................................................................................................................................... 32

Critical System Protection (CSP) ................................................................................................................................................................................................................................... 32 Data Loss Prevention (DLP) ........................................................................................................................................................................................................................................... 33

Information Security Practices and Assessments ......................................................................................................................................................................................................... 33

User Protection and Productivity .............................................................................................................................................................................................................................................. 34

PGP Encryption .............................................................................................................................................................................................................................................................. 34 Symantec Endpoint Protection (SEP) ............................................................................................................................................................................................................................ 34

Other Offering(s) ....................................................................................................................................................................................................................................................................... 34 Data Privacy Assessment .............................................................................................................................................................................................................................................. 34

APJ-Asia South Region-Specific Offerings............................................................................................................................................................................................................................... 35 Information Management .......................................................................................................................................................................................................................................................... 35

Symantec Enterprise Vault™ (EV) ................................................................................................................................................................................................................................. 35 Disaster Recovery Testing ............................................................................................................................................................................................................................................. 35

Symantec NetBackup™ (NBU) ..................................................................................................................................................................................................................................... 35

Page 4: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 4

Information Security .................................................................................................................................................................................................................................................................. 36

Business Process Analysis ............................................................................................................................................................................................................................................ 36

Control Compliance Suite (CCS) ................................................................................................................................................................................................................................... 36

Critical Systems Protection (CSP).................................................................................................................................................................................................................................. 36

Data Loss Prevention (DLP) ........................................................................................................................................................................................................................................... 37

Email Security Management .......................................................................................................................................................................................................................................... 37 Information Security Analysis, Architecture, Incidents, and Operations ...................................................................................................................................................................... 37

Symantec Security Information Manager (SSIM) .......................................................................................................................................................................................................... 40 User Protection and Productivity .............................................................................................................................................................................................................................................. 41

Altiris™ IT Management Suite from Symantec™ .......................................................................................................................................................................................................... 41 BYOD/BYOA................................................................................................................................................................................................................................................................... 42

Endpoint Encryption....................................................................................................................................................................................................................................................... 42

Endpoint Security ........................................................................................................................................................................................................................................................... 42

Symantec App Center.................................................................................................................................................................................................................................................... 43 Symantec Mobile Management ..................................................................................................................................................................................................................................... 43

APJ-Greater China Region (GCR)-Specific Offerings .............................................................................................................................................................................................................. 44

Information Management .......................................................................................................................................................................................................................................................... 44

Symantec Enterprise Vault™ (EV) ................................................................................................................................................................................................................................. 44

Clearwell eDiscovery Platform ....................................................................................................................................................................................................................................... 44

Backup and Disaster Recovery ..................................................................................................................................................................................................................................... 44 Storage Foundation High Availability (SFHA) ................................................................................................................................................................................................................ 44

Information Security .................................................................................................................................................................................................................................................................. 45 Control Compliance Suite (CCS) ................................................................................................................................................................................................................................... 45

Critical System Protection (CSP) ................................................................................................................................................................................................................................... 45 Managed Security Service (MSS) .................................................................................................................................................................................................................................. 45

Information Security Analysis, Architecture, and Operations ....................................................................................................................................................................................... 46 Symantec Network Access Control (SNAC) .................................................................................................................................................................................................................. 47

Symantec Security Information Manager (SSIM) .......................................................................................................................................................................................................... 47

Symantec Messaging Gateway (SMG) ......................................................................................................................................................................................................................... 47

Symantec Web Gateway (SWG) .................................................................................................................................................................................................................................... 47

Validation and Identity Protection (VIP) ......................................................................................................................................................................................................................... 47 User Protection and Productivity .............................................................................................................................................................................................................................................. 48

Altiris™ IT Management Suite from Symantec™ .......................................................................................................................................................................................................... 48 Mobile Security .............................................................................................................................................................................................................................................................. 48

Symantec Endpoint Protection (SEP) ............................................................................................................................................................................................................................ 49

Symantec Endpoint Encryption (SEE) ........................................................................................................................................................................................................................... 49

Symantec App Center.................................................................................................................................................................................................................................................... 49 APJ – Japan Region-Specific Offerings ................................................................................................................................................................................................................................... 50

Information Security .................................................................................................................................................................................................................................................................. 50 Information Security Advisory Services ......................................................................................................................................................................................................................... 50

Information Security Assessment Services ................................................................................................................................................................................................................... 50

User Protection and Productivity .............................................................................................................................................................................................................................................. 50

Altiris™ IT Management Suite from Symantec™ .......................................................................................................................................................................................................... 50 EMEA Region Specific Offerings .............................................................................................................................................................................................................................................. 52

Information Management .......................................................................................................................................................................................................................................................... 52 Symantec NetBackup™ Appliance ............................................................................................................................................................................................................................... 52

Cloud Readiness ............................................................................................................................................................................................................................................................ 52 Deduplication Assessment ............................................................................................................................................................................................................................................ 52

Information Storage Assessment ................................................................................................................................................................................................................................... 52 IT Disaster Recovery Program ....................................................................................................................................................................................................................................... 52

Next Generation Data Protection Assessment .............................................................................................................................................................................................................. 52

Page 5: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 5

Storage Assessment ...................................................................................................................................................................................................................................................... 52

Storage Foundation High Availability (SFHA) ................................................................................................................................................................................................................ 52

Information Security .................................................................................................................................................................................................................................................................. 53

Control Compliance Suite (CCS) ................................................................................................................................................................................................................................... 53

Critical System Protection (CSP) ................................................................................................................................................................................................................................... 53

Data Loss Prevention (DLP) ........................................................................................................................................................................................................................................... 53 Inform Risk Assessment ................................................................................................................................................................................................................................................ 53

Malicious Activity Assessment ....................................................................................................................................................................................................................................... 53 Security Analysis, Architecture, and Operations ........................................................................................................................................................................................................... 53

User Protection and Productivity .............................................................................................................................................................................................................................................. 54 Altiris™ IT Management Suite from Symantec™ .......................................................................................................................................................................................................... 54

Mobile Security Assessment .......................................................................................................................................................................................................................................... 54

Other Offerings ......................................................................................................................................................................................................................................................................... 55

Archive Assessment ...................................................................................................................................................................................................................................................... 55 Baseline IT Continuity .................................................................................................................................................................................................................................................... 55

Future State Architecture ............................................................................................................................................................................................................................................... 55

Storage Supply Chain Assessment ............................................................................................................................................................................................................................... 55

SymRA for Business Critical Virtualization..................................................................................................................................................................................................................... 55

Vulnerability Assessment ............................................................................................................................................................................................................................................... 55

Page 6: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 6

Chapter 1: How to use this Catalog

Purpose of this Service Catalog

This Global Consulting Services catalog has been constructed to assist Symantec’s valued customers in choosing the consulting service that best fits their needs. The services outlined in this catalog have been specifically constructed to assist customers interested in obtaining standardized services during all aspects of the solution lifecycle and are also flexible enough to provide customized services solutions. The services listed in this catalog may be delivered directly by Symantec Consulting Services or by an accredited Consulting Partner. Note: The offerings listed in this services catalog may not be available in all parts of the world; please see the section on Ordering and Requesting Services.

Intended Audience

This document is intended for use by both internal and external audiences to provide information as stated under Purpose of this Service Catalog. Symantec retains the right to make modifications and changes to this document without notifying users.

Format of Service Offering Listings

All services listed in this document are arranged by product family and adhere to the following structure: Name of Service | Type of Service

Description of Service

Product Peak Areas

The Consulting Service Offerings are placed into the following three product peak areas:

User Protection and Productivity Make it simple for me to be protected and productive at home and work.

Information Security Keep my business safe and compliant.

Information Management: Availability and Scalability Keep my business information and applications up and running.

Definition of terms

Name of service = common name used to describe this service

This is also the name of the service used in other service-related marketing collateral.

Type of service = Assess (A), Design (T), Transform (T), Operate (O), All (All)

NAM = North America geography

LAMC = Latin America and Caribbean geography

APJ = Asia, Pacific, and Japan geography

EMEA = Europe, Middle East, and Africa geography

Page 7: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 7

Ordering and Requesting Services

To order these services, contact Symantec directly by selecting one of the following e-mail addresses, depending on your location:

AMERICAS: [email protected]

APJ: [email protected]

EMEA: [email protected]

Note: The offerings listed in this services catalog may not be available at all times or in all geographies and regions.

Requesting Additional Services

Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product or solution, contact Symantec Technical Services Product Management using the following e-mail address: [email protected]

Additional Information

If you have questions concerning this Service Catalog, contact your regional Symantec Consulting Manager or use the appropriate e-mail alias listed in the Ordering and Requesting Services section.

Legal Notice

Copyright © 2013 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. In furnishing this documentation, Symantec undertakes no obligation to provide any products or services to you. A copy of Symantec’s standard terms and conditions governing the use of product and/or delivery of services described or mentioned herein will be provided for your review and consideration upon request. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. Symantec Corporation 350 Ellis Street Mountain View, CA 94043 USA http://www.symantec.com

Page 8: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 8

Chapter 2: ADTO Overview

Assess, Design, Transform, Operate (ADTO) methodology

The Symantec ADTO project methodology enables Symantec Technical Services and its partners to provide the delivery of services in a standardized manner. The ADTO model provides a scalable and cost-effective set of processes for implementing, monitoring, managing, and supporting Symantec offerings in a customer’s IT environment.

ADTO Phases defined

The ADTO model uses four phases of delivery that are common in the IT Industry. The phases are defined at a high level as follows:

Assess: Gain an understanding of the customer’s environment and solution requirements. This phase involves incorporating the initial sales activity, such as opportunity analysis, including scoping and high-level assessment, into the development of a well-defined and accurate Statement of Work.

Design: Understand the customer’s requirements to a level necessary for architecting and designing a solution. The Design phase involves using data-gathering and assessment efforts to deliver a Detailed Design and a Transformation Plan for customer acceptance.

Transform: Implement or upgrade the designed solution. This phase involves the implementation of the Detailed Design and execution of the Transformation Plan.

Operate: Provide operational services of the implemented solution. This phase involves the ongoing operational activities undertaken in accordance with the performance indicators listed in a Statement of Work.

Association with Service Offerings

The ADTO model provides a framework to position service offerings. Throughout the service catalog, references are made to the specific offering, and the phase of the ADTO framework with which it is associated. In certain instances, the consulting offering encompasses all phases of the ADTO model and the solution is labeled as applying to ALL.

ADTO

Model

Assess

De

sig

n

Transform

Op

era

te

Page 9: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 9

Service Type Translation Table

The following table provides a translation between former service types and the ADTO service type.

Former Service Type

ADTO Service Type Description of Service

Architecture and Design

Design Architecture and Design Consulting Services help customers engineer the right solution for the customer’s environment.

Custom ALL Any and all ADTO phases may apply. We provide customized services based upon the Statement of Work for a non-standard service.

Deployment Transform Upon the completion of Architecture and Design, consultants install and configure to the agreed design. This implementation routinely includes all core software elements and an agreed-upon number of clients or agents.

Health Check (Operational Assessment)

Operate Operational Assessments assess how Symantec products are performing within their environments and whether the implementation is performing as designed. The Operational Assessment service analyzes the performance, health, and risk of a deployed product. Consultants provide a number of suggested improvements required to bring a customer’s environment to operational standards. The Operational Assessment also analyzes the functionality of the product against the requirements of operational management and provides advice on any additional configuration that may be required.

Migration Transform Using consultants’ array of industry experience, migrations are performed from other products to the Symantec solution with minimal downtime and loss of functionality.

POC Assess A Proof of Concept (POC) helps a prospective customer make an informed decision and realize the benefits of the Symantec solution and products. A POC provides customers with the necessary due diligence and information, focusing on the customer’s requirements aligned with the Symantec solution.

Residency Operate For longer engagements, consultants augment services with on-site residency services. Residents typically assist customers in large-scale projects and with ongoing operational task support of the implemented solution.

Upgrade Transform From minor version updates to legacy installations, consultants upgrade the customer’s current installation and help maximize the organization’s Symantec investment.

Page 10: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 10

Chapter 3: Global Services Offerings

Information Management

ApplicationHA

ApplicationHA Implementation | Transform The Symantec ApplicationHA 6.0 Implementation offering is a consulting engagement that includes an assessment of business and technical requirements, planning and design of the ApplicationHA solution, deployment of the solution to align with business requirements, and knowledge transfer throughout the engagement.

Data Insight (DI)

Data Insight (DI) Implementation | Transform The Data Insight installation assists customers in the planning, design, and deployment of Data Insight. Consultants design the solution architecture and hardware requirements for implementation based on file server and filer count, number of physical locations, and average number of shares per file server. The base software package is installed and verified. Consultants configure indexer settings, users, custom AD attributes, exclusion rules, custom reports, anomaly detection, and DFS mappings to meet the customer’s requirements.

Symantec Enterprise Vault™ (EV)

Enterprise Vault (EV) Upgrade | Transform The EV Upgrade offering consists of a pre-upgrade assessment, an upgrade of EV components to the latest version, and verification and implementation of the new functionality. Enterprise Vault Assessment | Operate This offering provides a thorough review of the customer’s EV environment, including storage, server, and resource usage; error logs; outstanding issues; and architecture, policies, and use scenarios. Consultants also identify and compare settings to standards and make recommendations. In addition, they validate security and archiving configurations against business and legal requirements. Enterprise Vault Implementation | Transform The EV Implementation offering includes providing solution, implementation, and configuration design; aligning the technology to the environment; and installing, configuring, and deploying the EV solution. Consultants install a new EV environment or additional components to an existing EV environment. This offering is typically paired with a solution design and often includes lab validation, HA/DR configuration of the environment, and pilot roll-out, depending on the needs of the customer.

Symantec NetBackup™ (NBU)

NetBackup Appliance Implementation | ALL The NetBackup Appliance Implementation service provides a structured solution to deploy NBU Appliance hardware and software in the customer's data protection infrastructure. This service includes planning, assessment, design validation, configuration, and integration into the NetBackup domain. It also includes functional acceptance testing. Note: This service offering is not available within the region of Japan.

Page 11: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 11

NetBackup Assessment | Operate The NetBackup (NBU) Assessment service provides the following: a current view of the customer’s environment; a review of the customer’s data protection problems, goals, and strategic direction; a review of how data protection problems impact the customer today and the long-term implications; an identification of gaps between the current data protection environment and an environment that supports the recommended next-generation data protection solutions; an identification of risks with existing backup infrastructure, policies or practices; recommendations for the backup infrastructure to optimize NetBackup technologies for the specific requirements; and knowledge transfer throughout the engagement. NetBackup Catalog Manipulation | ALL NetBackup Catalog Manipulation has the potential for being a high-risk activity and, if not planned and executed accurately, may lead to catastrophic data loss for customers. No two customer environments are identical; therefore, each Catalog Manipulation engagement is unique. In addition, NetBackup Catalog Manipulation tasks are not supported by Symantec Technical Support. Consultants require access to specific documentation and tools necessary for tailoring the steps based on the customer’s requirements. NetBackup Catalog Manipulation includes renaming and replacing the NetBackup Server, domain merge and split operations, and Master Server Cluster transitions. NetBackup Implementation | Transform The NetBackup (NBU) Implementation offering provides the validation of the customer design against customer requirements; the installation and configuration of NetBackup infrastructure to support the design; the implementation of Symantec standards to leverage core NBU features; and operational knowledge transfer throughout the engagement. NetBackup Upgrade | Transform The NetBackup (NBU) Upgrade offering provides an upgrade from an installed NBU version to the requested version; the creation of a detailed upgrade plan; the creation of a detailed blackout plan; testing and validation of core NBU functionality after the upgrade; and knowledge transfer throughout the engagement.

Storage Foundation High Availability (SFHA)

Storage Foundation High Availability (SFHA) Assessment | Operate The Storage Foundation HA Assessment service helps Storage Foundation HA customers to achieve sustained and cost effective levels of availability to satisfy their business needs and reduce costs by optimizing their HA infrastructure and supporting operations. This service provides customers with an in-depth technical assessment of their Symantec software environments, and a review of their supporting architectures, processes, governance, skills, and service levels. In addition, it identifies potential risks, opportunities for lowering costs, and methods for improving service levels. Storage Foundation High Availability (SFHA) Implementation | Transform The Veritas Storage Foundation HA 6.0 Implementation offering is a consulting engagement that includes an assessment of business and technical requirements; planning and designing the SF/HA solution; deployment of the solution to align with business requirements; and knowledge transfer throughout the engagement. Storage Foundation High Availability (SFHA) Upgrade | Transform The Veritas Storage Foundation HA 6.0 Upgrade offering provides an upgrade from the installed SFHA version to the requested version; the creation of a detailed upgrade plan; the creation of a detailed blackout plan; testing and validation of core SFHA functionality after the upgrade; and knowledge transfer throughout the engagement.

Page 12: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 12

Information Security

Control Compliance Suite (CCS)

Control Compliance Suite Health Check | Operate This offering provides expert assistance in evaluating the customer’s Symantec Control Compliance Suite (CCS) implementation against current business requirements and industry best practices. The goal of the Health Check is to provide recommendations for improving security policies and alerting in the customer’s environment and to assist in the development and implementation of a risk-mitigation strategy. Control Compliance Suite Implementation | Transform The CCS Implementation offering includes an assessment of business drivers and technical requirements; infrastructure design; configuration design that aligns with business and IT requirements; and pilot testing to ensure the solution meets desired-state objectives. The CCS Implementation service is comprised of a set of on-site solution enablement services that provide business assessment, technology assessment, and design, testing, and pilot deployment assistance for the complete feature set or specific components of CCS. This provides flexibility in scoping the required effort based on the customer’s needs and current focus. The assessment and design activities provide a full solution design, while the pilot activities are generally limited to a subset of the production environment.

Critical System Protection (CSP)

Critical System Protection (CSP) Implementation | Transform Introducing security-related products requires significant experience and product knowledge. CSP is more than simply host-based intrusion and prevention. It has advanced features, such as file integrity monitoring (FIM), configuration monitoring, and file system and admin lock-down, which are capable of providing real-time visibility and control into compliance in a single real-time monitoring and prevention solution. Consultants guide the customer through the deployment from start to finish.

Data Loss Prevention (DLP)

Data Loss Prevention – High-Level Architecture | Design The DLP High-Level Architecture service assists customers with their security management architecture and provides a content-aware data loss protection solution that discovers, monitors, and protects confidential data across both enterprise platforms and mobility platforms. Upon completion of this service, customers receive a high-level architecture document based on their organizational needs and divisional policy and direction. Data Loss Prevention Health Check | Operate The Symantec DLP Health Check includes both a technical system and business program assessment. The system health check includes the review of all DLP system components deployed in the customer’s environment. Possible components include Network Monitor, SMTP Prevent, Web Prevent, Network Discover, and Endpoint. The program health check provides a review of policy coverage, incident response, remediation and workflow, employee communications, and reporting. Both system and program recommendations are provided. System recommendations provide guidance on improvements to server configuration, scalability for future upgrades, and improved use of detection technology. Program recommendations concentrate on maturing the customer’s DLP program, focusing on enterprise and policy coverage, employee security awareness, remediation workflow, metrics and reporting, and security governance. Data Loss Prevention Upgrade | Transform The DLP upgrade assists customers in the planning, design, upgrade, configuration, and testing of a later version of Symantec DLP. Consultants develop and document a plan for the controlled upgrade and fallback recovery plan for each component of Symantec DLP software, including an Oracle database upgrade and an operating system refresh of affected servers. Customers complete pre-upgrade backups of all essential components. Consultants perform the upgrade and complete system validation and testing. Customers are provided with documentation for all system settings that were configured during the upgrade.

Page 13: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 13

User Protection and Productivity

PGP Encryption

PGP Implementation | Transform The PGP Implementation service is comprised of a set of on-site solution enablement services that provide assessment, design, testing, and pilot deployment assistance for PGP’s complete feature set. This provides flexibility in scoping the required effort based on the customer’s needs and current focus. The assessment and design activities provide a full solution design, while the pilot activities are generally limited to a subset of the production environment.

Symantec Endpoint Protection (SEP)

Symantec Endpoint Protection Implementation | Transform The SEP Implementation offering is a consulting engagement that includes an assessment of business and technical requirements, infrastructure design, and deployment of a solution to align with business requirements. This service provides expert assistance in initiating the deployment of SEP. The SEP Implementation service is comprised of a set of on-site solution-enablement services that provide assessment, design, testing, and pilot deployment assistance for SEP’s complete feature set and for components of SEP. Symantec Endpoint Protection Assessment | Operate The SEP Assessment service analyzes the performance, health, and risk of a deployed product and suggests a number of improvements required to bring a customer’s environment to operational standards. Symantec Endpoint Protection Competitive Replacement | ALL This service provides expert assistance in initiating the migration from non-Symantec endpoint protection solutions to Symantec Endpoint Protection (SEP). The SEP Competitive Replacement service includes an assessment of business requirements and the current technical solution, the design of a SEP solution, validation of the solution in a test environment, migration of production users, and knowledge transfer to operations staff in support of the handover.

Page 14: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 14

Appendix

Page 15: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 15

NAM Geography-Specific Offerings

Information Management

Clearwell eDiscovery Platform

Clearwell System Planning, Installation, and Configuration Services | ALL The Clearwell System Planning, Installation, and Configuration Services offering provides planning and implementation of the Clearwell eDiscovery Platform within the customer’s existing IT infrastructure, customization of the Clearwell eDiscovery Platform to correspond with the customer’s specific IT environmental needs (server configuration, LDAP integration, A/V exemption configuration, etc.), testing and verification of Clearwell modules (Legal Hold Module, Identification and Collections Module, Processing Module, Analysis and Review Module). Clearwell eDiscovery Workflow Development Services | ALL The Clearwell eDiscovery Workflow Development Services offering provides Clearwell eDiscovery Workflow process development or redevelopment with key stakeholders in both the Legal and IT departments responsible for the various steps in the new business process. It also provides the definition and alignment of roles and responsibilities based on customer needs and industry or field standards; the identification of new processes and adjustments to existing processes required to use the new technology; consulting and staff augmentation regarding preservation, case creation, litigation holds, collections, data ingestion, processing, error remediation, review, and data export and production; and customer-specific workflow documentation that maps processes, owners, and responsibilities of jointly-defined (IT and Legal) corresponding workflows. Clearwell Case Management Services | ALL The Clearwell Case Management Services offering provides the creation of sample eDiscovery matter in Clearwell to ensure understanding of the Clearwell eDiscovery workflow, live matter consultations, the creation of Clearwell cases using customer-provided data, guidance and review of all decision points within Clearwell eDiscovery Workflow and Clearwell Platform, and general project management support as requested.

Symantec NetBackup™ (NBU)

Data Protection Architecture and Design | Design This service provides expert assistance in developing a long-term solution to resolve data protection challenges that may significantly degrade the ability of an IT organization to protect and assure access to critical business information. Our overall approach is to focus on developing a solution incorporating current and planned investments. The goal of the design is to provide a high-level roadmap for implementing and enhancing the customer’s current backup environment. Data Protection Migration | Transform Catalog migration and merge activities consist of tasks, such as moving catalogs from one OS to another, moving a non-cluster configuration to a cluster master configuration, and performing host name changes.

Symantec Enterprise Vault™ (EV)

Enterprise Vault Design Refresh | Design The EV Design Refresh service offering provides recommendations for updating the architecture, and upgrading and configuring Symantec Enterprise Vault. Enterprise Vault Environmental Architecture and Design | Design The EV Environmental Architecture and Design service provides recommendations for architecture, installation, and configuration of Symantec Enterprise Vault. The design is the result of technical feedback, environmental data analysis, and extensive discussions with the customer to determine the most appropriate Enterprise Vault design, configuration, and policy settings.

Page 16: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 16

Enterprise Vault Staff Augmentation | Operate The EV Staff Augmentation service provides a full-time expert consultant, either onsite or remote. This expert can be used for daily operations, monitoring and maintaining the environment, assisting with knowledge transfer to the customer’s staff, assisting in the initial end-user roll out, or helping recover lost knowledge when the in-house expert is no longer available. Enterprise Vault Upgrade / Hardware Migration | Transform The Enterprise Vault Upgrade / Hardware Migration service assists customers in bringing their environments up to the current version. It provides readiness and prep phases prior to the upgrade. Lab validation is an option. With the EV 10 hardware requirements, often a hardware refresh or migration is part of the project. The lab and prep work is performed during business hours and the upgrade is scheduled for off-hours down time. Down time is kept to a minimum, often less than an hour, depending on the number of servers in the environment. This service is often paired with a full Health Check or a Design Refresh. Enterprise Vault Data Migration | Custom EV Data Migration is an ingestion project for EV, typically coming from a competitor’s product, but sometimes from PSTs where Chain of Custody reports are required. This service assists the customer in the decommissioning of their legacy archiving platform. Business Policy Workshop (BPW) | ALL In this two-part workshop, consultants share recommended best practices for policy development and creation. Customers receive full assistance with implementing the recommended set of information retention and deletion policies. These policies help the organization comply fully with their documented business regulations and laws. These policies also help optimize storage infrastructure utilization to reduce overall storage costs and support a defensible and repeatable eDiscovery process.

Storage Foundation High Availability (SFHA)

Storage and Availability Management Architecture and Design | Design The Storage and Availability Management Architecture and Design service focuses on developing a long-term solution that addresses the concerns and obstacles Enterprise IT organizations face regarding the availability of their critical business applications. This service assists with application environment challenges, future growth, SLA goals, application continuance, and application disaster recovery. Storage and Availability Management Deployment | Transform This customized service offering assists the customer in the implementation of Storage Foundation features or the upgrade of existing environments. Storage and Availability Management Health Check | Operate The Storage and Availability Management Health Check service provides expert assistance in evaluating the customer’s high availability implementation against current business requirements and industry best practices, providing direction to assist in meeting Service Level Agreements (SLAs) and application availability objectives.

Information Security

Control Compliance Suite (CCS)

Control Compliance Suite Assessment | Operate Introducing the CCS solution requires a thorough requirements definition and qualification process that must be passed before device on-boarding can begin. Consultants perform an audit of the target environment to identify devices, validate models and software versions against the CCS-supported products list, validate the device configuration against CCS baselines, validate existing controls and policies against Symantec best practices, and conduct proof of concept and scoping services. Control Compliance Suite Migration | Transform The Control Compliance Suite Migration service consists of the migration of an existing CCS installation to the requested version of CCS.

Page 17: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 17

Control Compliance Suite Upgrade | Transform From minor version upgrades to legacy installations, consultants provide the CCS infrastructure and upgrade solution to the customer’s current installation and help to maximize the organization’s returns from its existing CCS investment. Consultants prepare the customer’s existing environment for the upgrade.

Critical System Protection (CSP)

Critical System Protection Health Check | Operate The Symantec Critical System Protection Health Check service provides expert assistance in evaluating the customer’s CSP implementation against current business requirements and industry standards. The goal of the Health Check is to provide options and recommendations for improving the security policies and alerting in the customer’s environment and to assist in the development and implementation of a risk-mitigation strategy. A detailed report that outlines issues found, with suggested recommendations, is provided. Critical System Protection Upgrade | Transform From minor version upgrades to legacy installations, consultants provide the CSP infrastructure and agent upgrade solution to the customer’s current installation and help to maximize the organization’s returns from its existing SCSP investment. Consultants prepare the customer’s existing environment for the upgrade.

Data Loss Prevention (DLP)

Data Loss Prevention Advisory Services | ALL Symantec DLP Advisory services are designed to assist organizations in the development of a Data Protection Program strategy. Each engagement begins with a discovery phase, where consultants review key business objectives, stakeholders, success criteria, and roles and responsibilities for the engagement. Consultants provide a project plan and time-line for the proposed start and completion of the strategy sessions, including key milestones. The analysis phase includes a review of the current security landscape based on the customer’s risk profile, vertical industries, and the customer’s geographical presence. Business unit and stakeholder interviews are conducted and business processes and current policies are documented. Data Loss Prevention Enablement | Transform This offering provides customers with a full implementation of Symantec DLP from a technical and operational perspective. Symantec DLP consultants provide a documented implementation and system integration plan, including technical goals, success criteria, and roles and responsibilities. After planning, the consultants assist the customer in implementing the Symantec DLP application and its components on customer-provided hardware. After implementation, system component testing and tuning is provided. In conjunction with technical planning, consultants begin the business advisory portion of the engagement by planning and designing the DLP rule sets, risk reduction targets, incident response workflow, reporting and metrics, and employee communications. After the technical implementation, consultants assist the customer in the implementation of the policies, processes, reports, and communication plan, as previously defined. Consultants also provide a DLP program road map to assist the customer in further maturing their program and reducing operational risk. Data Loss Prevention Expert Resident | Operate With the Data Loss Prevention Expert Resident service, consultants provide DLP administration for day-to-day activities, scheduled maintenance, and optimization of the DLP environment. Administration includes, but is not limited to, the design, configuration, documentation, and management of incident response rules, policies, reports, and user roles. Consultants provide guidance on data analysis and strategic direction. Program status and progress reports are provided and communicated to team members, business owners, and stakeholders on a weekly or quarterly basis. Data Loss Prevention IT Analytics Install | Transform The DLP IT Analytics installation begins with the review of customer business objectives. Consultants review the configuration of the server hardware designated for the IT Analytics server to determine readiness for the installation of IT Analytics. The IT Analytics server and content packs are installed along with the initial cube and report. The consultant performs initial cube processing and creates up to two processing schedules. Cube contents and functionality are tested and verified. The consultant also transfers knowledge on OLAP cube fundamentals, use of pivot tables, reports, dashboards, and key performance indicators available within IT Analytics for DLP. A final report, including documentation of current-state configuration of IT Analytics for DLP and recommendations based on initial analysis of activities to be performed in support of identified business objectives, is provided.

Page 18: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 18

Managed Security Services (MSS)

Managed Security Services Assessment | Operate The Managed Security Services Assessment service analyzes the performance, health, and risk of a deployed product. With this offering, consultants provide a number of suggested improvements required to bring the customer’s environment to operational standards. The MSS Assessment also analyzes the functionality of the product against the requirements of operational management and provides advice on any additional configuration that may be required. Managed Security Services Deployment | Transform Introducing the MSS solution requires a thorough requirements definition and qualification process that must be passed before device on‐boarding can begin. Consultants perform an audit of the target environment to identify devices, validate models and software versions against the MSS-supported products list, validate the device configuration against MSS baselines, validate existing controls and policies against standards, and conduct proof of concept and scoping services.

Symantec Messaging Gateway (SMG)

Symantec Messaging Gateway Assessment | Operate Successful organizations integrate Symantec Messaging Protection into their existing security program and leverage the software to manage the risk associated with a constantly evolving messaging landscape that can include multiple threats from malicious software and wasteful SPAM. The SMG Assessment service analyzes the performance, health, and risk of a deployed product and provides a number of suggested improvements required to bring the customer’s environment to operational standards. Symantec Messaging Gateway Deployment | Transform This service is intended for a new installation of SMG technology to an organization not currently using SPAM filtering or gateway malware scanning products. This service installs, configures, and recommends SMG services specific to the customer’s unique needs. Symantec Messaging Gateway Migration | Transform Using consultants’ array of industry experience, migrations are performed from other messaging security products to Symantec Messaging Gateway with minimal downtime and loss of functionality. Symantec Messaging Gateway Upgrade | Transform SMG Upgrade is a customized service that safely upgrades an existing SMG environment to the current release. In addition, any new functionality is explained and deployed, where needed.

Symantec Network Access Control (SNAC)

Symantec Network Access Control Assessment | Operate Organizations implement Symantec Network Access Control to provide an additional layer of network protection to enhance gateway and LAN-based security solutions by evaluating company-owned and guest endpoints to ensure they meet a predefined set of criteria before accessing critical network resources. The consulting team guides the customer through the assessment and health check, from start to finish. The SNAC Assessment service analyzes the performance, health, and risk of a deployed product and provides a number of suggested improvements required to bring the customer’s environment to operational standards. Symantec Network Access Control Deployment | Transform With the SNAC Deployment offering, consultants work with the customer to perform the installation and configuration of Symantec Network Access Control. Symantec Network Access Control Migration | Transform Migrating from one security product to another requires significant experience and product knowledge. Consultants have performed numerous migrations and are familiar with several competitor products to ensure a clean removal prior to implementing SNAC. Symantec Network Access Control Upgrade | Transform Consultants have performed numerous upgrades from installed releases of SNAC to the most recent version of SNAC. The consultants have the experience and knowledge to properly prepare the customer’s existing environment for the upgrade to SNAC.

Page 19: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 19

Symantec Protection Center (SPC)

Symantec Protection Center Customization | ALL The Symantec Protection Center Customization offering provides the requested customization to the customer’s SPC environment. Symantec Protection Center Deployment | Transform With the SPC Deployment offering, consultants work with the customer to perform the installation and configuration of Symantec Protection Center. Symantec Protection Center Migration | Transform Migrating from one security product to another requires significant experience and product knowledge. Consultants have performed numerous migrations and are familiar with both Symantec and third-party products to ensure a clean removal of current software prior to migrating to Symantec Protection Center. Symantec Protection Center Upgrade | Transform This offering performs SPC upgrades from other security management and reporting platforms. Consultants have the experience and knowledge to properly prepare the customer’s existing environment for the upgrade to SPC. Symantec Protection Center Assessment | Operate Organizations implement Symantec Protection Center (SPC), a powerful data collection and analytics platform, for its centralized security management console. SPC enables organizations to identify emerging threats, prioritize tasks, and accelerate time to protection based on relevant, actionable intelligence. The SPC Assessment service analyzes the performance, health, and risk of a deployed product and provides a number of suggested improvements required to bring the customer’s environment to operational standards.

Symantec Protection Engine (SPE)

Secure File Sharing – Symantec Protection Engine for Network Attached Storage | ALL This service provides increased scanning performance and improved detection capabilities for protection against multi-blended threats. Protection Engine includes Symantec's industry-leading malware protection for fast, scalable, and reliable content scanning services, helping organizations protect their data and storage systems against the ever-growing malware threat landscape.

Symantec Protection Engine for NAS

Symantec Protection Engine for NAS Assessment | Operate Symantec Protection Engine (SPE) for Network Attached Storage (NAS) is a complimentary component to the SEP Anti-Virus infrastructure. Consultants guide the customer through the assessment and health check, from start to finish. The SPE for NAS Assessment service analyzes the performance, health, and risk of a deployed product and provides a number of suggested improvements required to bring the customer’s environment to operational standards. Symantec Protection Engine for NAS – Customization | ALL With the Symantec Protection Engine for NAS Customization service, consultants deploy customized SPE technology, based on enterprise-specific needs and environment. Symantec Protection Engine supports multiple platforms and protects many of the market-leading storage vendor devices, and can be deployed considering both fault tolerance and performance. Symantec Protection Engine for NAS – Installation | Transform With the Symantec Protection Engine for NAS Installation service, consultants deploy customized SPE technology, based on enterprise-specific needs and environment. This service is intended for a new installation of SPE technology to an organization not yet using any security solution on their Network Attached Storage devices. This service installs, configures, and recommends SPE services specific to the unique needs of the customer. Symantec Protection Engine for NAS – Migration | Migration Using consultants’ array of industry experience, migrations are performed from other NAS security products to Symantec Protection Engine with minimal downtime and loss of functionality.

Page 20: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 20

Symantec Protection Engine for NAS – Upgrade | Transform Symantec Protection Engine for NAS Upgrade is a customized service that upgrades an existing SPE environment to the currently-released version. In addition, any new functionality is explained and deployed, where needed.

Symantec Security Program Assessment

Symantec Security Program Assessment | ALL The Symantec Security Program Assessment service evaluates the maturity of the customer’s information security program, providing an understanding of anticipated exposure to the information security risk likely to result from gaps within that program. The service is designed to support enterprise executives by evaluating, prioritizing, and managing their portfolio of security controls. It maps current security capabilities, establishes the desired state of security maturity, and develops an overall program strategy and prioritized roadmap for achieving enterprise information security goals.

Symantec Web Gateway (SWG)

Symantec Web Gateway Assessment | Operate The Symantec Web Gateway Assessment service provides the customer with a review of the existing SWG solution. A consultant reviews the implementation and operation of the technology against industry and Symantec standards, and provides recommendations to resolve issues or concerns. Symantec Web Gateway Deployment | Deployment The Symantec Web Gateway Deployment service provides a new installation of SWG technology to an organization not yet using any security solution on their network perimeter. This service installs, configures, and recommends SWG services specific to the unique needs of the customer. Symantec Web Gateway Migration | Transform Using consultants’ array of industry experience, migrations are performed from other Web content filtering security products to Symantec Web Gateway with minimal downtime and loss of functionality. Symantec Web Gateway Upgrade | Transform Symantec Web Gateway Upgrade is a customized service that upgrades an existing SWG environment to the currently-released version. In addition, any new functionality is explained and deployed, where needed.

User Protection and Productivity

Altiris™ IT Management Suite from Symantec™

Asset Management Suite (AMS) Assessment | Operate With the Asset Management Suite Assessment service, consultants analyze AMS and perform a Services Strategy and Assessment, during which they associate the goals of an IT project with business objectives. In addition, consultants perform a health check to ensure that business value is being derived from the tool and they provide recommendations on how to move to an operational state with the desired capability and maturity level. Asset Management Suite (AMS) Deployment | Transform For new AMS installations, consultants provide installation and configuration support and make AMS recommendations that are specific to the unique needs of the customer. With the Asset Management Suite Deployment service, consultants work with the customer to perform the installation and configuration of AMS. Asset Management Suite (AMS) Migration | Transform With the Asset Management Suite Migration service, consultants perform and validate a risk-free migration. Similar to performing an installation, migrating from one systems management product to another requires substantial know-how and product knowledge. Consultants have performed numerous migrations and are familiar with several competitor products, which ensures a successful low-risk migration to Asset Management Suite.

Page 21: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 21

Asset Management Suite (AMS) Upgrade | Transform The Asset Management Suite Upgrade service provides customers with assistance in planning and completing the upgrade process for AMS. Customers receive a detailed breakdown of the upgrade process and related tasks. Consultants have performed numerous successful upgrades, while preserving CMDB and legacy processes. Client Management Suite (CMS) Assessment | Operate The Client Management Suite Assessment service is a consulting engagement that combines a technical and business review to assess the current state of the CMS environment, review the alignment of the environment with business requirements, and recommend changes to ensure that alignment. Consultants perform a health check to ensure that business value is being derived from CMS and they provide recommendations to move to an operational state with the desired capability and maturity level. Client Management Suite (CMS) Implementation | Transform The Client Management Suite Implementation service is a consulting engagement that provides customers with an assessment of their current environment and applicable IT, business, and technical requirements. Consultants design and configure a solution based on the identified business drivers, and provide a pilot implementation of CMS that includes next-step recommendations. This service also includes knowledge transfer to customer staff on the solution’s key configurations and design concepts, as well as operational standards and key maintenance routines. Client Management Suite (CMS) Upgrade | Transform The CMS Upgrade service offering is a consultative engagement that includes: Re-evaluation/Assessment of Business drivers, Technical requirements, and existing CMS implementation. Specification and plan for upgrading to new version of CMS; Pilot testing to validate migration plan and solution design; and knowledge transfer throughout the engagement. Consulting services has performed numerous successful upgrades while preserving CMDB and legacy processes.

Client Management Suite Migration | Transform With the Client Management Suite Migration service, consultants perform and validate a risk-free migration. Similar to performing an installation, migrating from one systems management product to another requires substantial know-how and product knowledge. Consultants have performed numerous migrations and are familiar with several competitor products, which ensures a successful low-risk migration to CMS. ServiceDesk (SD) Assessment | Operate With the ServiceDesk Assessment service, consultants analyze SD and perform a Services Strategy and Assessment, where they associate the goals of an IT project with business objectives. In addition, consultants perform a health check to ensure that business value is being derived from the tool and they provide recommendations on how to move to an operational state with the desired capability and maturity level. ServiceDesk (SD) Deployment | Transform Introducing new technologies requires substantial experience and expert product knowledge. With the ServiceDesk Deployment service, consultants work with the customer to perform the installation and configuration of SD. ServiceDesk (SD) Migration | Migration With the ServiceDesk Migration service, consultants perform and validate a risk-free migration. Similar to performing an installation, migrating from one systems management product to another requires substantial know-how and product knowledge. Consultants have performed numerous migrations and are familiar with several competitor products, which ensures a successful low-risk migration to SD. ServiceDesk (SD) Upgrade | Transform The ServiceDesk Upgrade service provides customers with assistance in planning and completing the upgrade process for SD. Customers receive a detailed breakdown of the upgrade process. Symantec Workflow (WF) Solution Assessment | Operate With the Symantec Workflow Solution Assessment service, consultants analyze Workflow and perform a Services Strategy and Assessment, where they associate the goals of an IT project with business objectives. In addition, consultants perform a health check to ensure that business value is being derived from the tool and they provide recommendations on how to move to an operational state with the desired capability and maturity level.

Page 22: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 22

Symantec Workflow (WF) Solution Deployment | Transform Introducing new technologies requires substantial experience and expert product knowledge. With the Symantec Workflow Solution Deployment service, consultants work with the customer to perform the installation and configuration of Workflow. Symantec Workflow (WF) Solution Migration | Transform With the Symantec Workflow Migration service, consultants perform and validate a risk-free migration. Similar to performing an installation, migrating from one systems management product to another requires substantial know-how and product knowledge. Consultants have performed numerous migrations and are familiar with several competitor products, which ensures a successful low-risk migration to Workflow. Symantec Workflow (WF) Solution Upgrade | Transform The Symantec Workflow Solution Upgrade service provides customers with assistance in planning and completing the upgrade process for Workflow. Customers receive a detailed breakdown of the upgrade process.

Symantec App Center

Symantec App Center Assessment | Operate The Symantec App Center Assessment service provides customers with a thorough understanding of how to manage mobile applications by delivering an in-depth assessment of requirements, aligning requirements to corresponding mobile platforms, and designing and implementing mobile application management practices. Consultants are available to guide the customer through the assessment and health check, from start to finish. This service analyzes the performance, health, and risk of a deployed product and suggests improvements required to bring the customer’s environment to operational standards. Symantec App Center Deployment | Transform With the Symantec App Center Deployment service, consultants work with the customer to perform the installation and configuration of Symantec App Center. Symantec App Center Migration | Transform With the Symantec App Center migration service, consultants perform and validate a risk-free migration. Migrating from one system management product to another requires substantial know-how and product knowledge. Consultants have substantial experience in performing migrations and are familiar with a broad range of non-Symantec products, which reduces risk and ensures a successful migration to App Center Solution. Symantec App Center Upgrade | Transform The Symantec App Center Upgrade service provides customers with assistance in planning and completing the upgrade process. Customers receive a detailed breakdown of the upgrade process. Consultants have performed numerous successful upgrades, while preserving developed apps, policies, and organizational structure.

Symantec Encryption Management Server (SEMS)

Symantec Encryption Management Server Installation and Deployment | Transform The Symantec Encryption Management Server Installation and Deployment service assists customers with the design and implementation of SEMS. Consultants design the solution architecture based on several factors, including customer use cases, disaster recovery requirements, and targeted devices. The consultant provides knowledge transfer and overall training on the SEMS environment to identified customer personnel. Symantec Encryption Management Server Upgrade | Transform The Symantec Encryption Management Server Upgrade service assists customers with the migration to a newer version of SEMS within their existing environment. Consultants review the upgrade path and provide a plan to complete the upgrade during the customer-defined change window. The consultant executes the plan and ensures that all services are working properly at the conclusion of the upgrade.

Page 23: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 23

Symantec Endpoint Protection (SEP)

Symantec Endpoint Protection Migration | Transform With the Symantec Endpoint Protection Migration service, consultants perform and validate a migration to SEP. Migrating from one security product to another requires significant experience and product knowledge. Consultants have performed numerous migrations and are familiar with several competitor products, which ensures a clean removal prior to installing SEP. Symantec Endpoint Protection Upgrade | Transform The SEP Upgrade service offering provides customers with assistance in planning and completing the upgrade process for SEP. Customers receive a detailed breakdown of the upgrade process.

Symantec Workspace Streaming (SWS)

Symantec Workspace Streaming Assessment | Operate With the Symantec Workspace Streaming Assessment service, consultants analyze SWS and perform a Services Strategy and Assessment, where they associate the goals of an IT project with business objectives. In addition, consultants perform a health check to ensure that business value is being derived from the tool with and they provide recommendations on how to move to an operational state with the desired capability and maturity level. Symantec Workspace Streaming Deployment | Transform With the Symantec Workspace Streaming Deployment service, consultants work with the customer to perform the installation and configuration of SWS. Symantec Workspace Streaming Migration | Transform With the Symantec Workspace Streaming Migration service, consultants perform and validate a risk-free migration. Similar to performing an installation, migrating from one systems management product to another requires substantial know-how and product knowledge. Consultants have performed numerous migrations and are familiar with several competitor products, which ensures a successful low-risk migration to SWS. Symantec Workspace Streaming Upgrade | Upgrade The Symantec Workspace Streaming Upgrade service provides customers with assistance in planning and completing the upgrade process for SWS. Customers receive with a detailed breakdown of the upgrade process.

Other Offering(s)

SymRA for Business Critical Virtualization

SymRA for Business Critical Virtualization | ALL SymRA for Business Critical Virtualization facilitates faster deployments of Microsoft® applications on VMware® virtualization server platforms, such as Microsoft SQL Server, Exchange, and SharePoint. These specialized solutions enable organizations to meet the demands for application performance, availability, security, and cost with server virtualization solutions. These solutions follow industry-standard enterprise architecture development methods, as defined by The Open Group Architecture Framework (TOGAF), to accelerate adoption into your production environment. Consultants help increase the business value and return on investment from Symantec virtualization server software to effectively accelerate next phase deployments of virtualization initiatives.

Page 24: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 24

LAMC Geography-Specific Offerings

Information Management

Storage Foundation High Availability (SFHA)

Storage and Availability Management Architecture and Design | Design The Storage and Availability Management Architecture and Design service focuses on developing a long-term solution that addresses the concerns and obstacles Enterprise IT organizations face regarding the availability of their critical business applications. This service assists with application environment challenges, future growth, SLA goals, application continuance, and application disaster recovery. Storage and Availability Management Deployment | Transform This customized service offering assists the customer in the implementation of Storage Foundation features or the upgrade of existing environments. Storage and Availability Management Health Check | Operate The Storage and Availability Management Health Check service provides expert assistance in evaluating the customer’s high availability implementation against current business requirements and industry best practices, providing direction to assist in meeting Service Level Agreements (SLAs) and application availability objectives.

Symantec Enterprise Vault™ (EV)

Enterprise Vault Design Refresh | Design The EV Design Refresh service offering provides recommendations for updating the architecture, and upgrading and configuring Symantec Enterprise Vault. Enterprise Vault Environmental Architecture and Design | Design The EV Environmental Architecture and Design service provides recommendations for architecture, installation, and configuration of Symantec Enterprise Vault. The design is the result of technical feedback, environmental data analysis, and extensive discussions with the customer to determine the most appropriate Enterprise Vault design, configuration, and policy settings. Enterprise Vault Staff Augmentation | Operate The EV Staff Augmentation service provides a full-time expert consultant, either onsite or remote. This expert can be used for daily operations, monitoring and maintaining the environment, assisting with knowledge transfer to the customer’s staff, assisting in the initial end-user roll out, or helping recover lost knowledge when the in-house expert is no longer available. Enterprise Vault Upgrade / Hardware Migration | Transform The Enterprise Vault Upgrade / Hardware Migration service assists customers in bringing their environments up to the current version. It provides readiness and prep phases prior to the upgrade. Lab validation is an option. With the EV 10 hardware requirements, often a hardware refresh or migration is part of the project. The lab and prep work is performed during business hours and the upgrade is scheduled for off-hours down time. Down time is kept to a minimum, often less than an hour, depending on the number of servers in the environment. This service is often paired with a full Health Check or a Design Refresh. Enterprise Vault Environmental Architecture and Design | ALL The EV Environmental Architecture and Design service provides recommendations for architecture, installation, and configuration of Symantec Enterprise Vault. The design is the result of technical feedback, environmental data analysis, and extensive discussions with the customer to determine the most appropriate Enterprise Vault design, configuration, and policy settings.

Page 25: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 25

Symantec NetBackup™ (NBU)

Data Protection Architecture and Design | Design This service provides expert assistance in developing a long-term solution to resolve data protection challenges that may significantly degrade the ability of an IT organization to protect and assure access to critical business information. Our overall approach is to focus on developing a solution incorporating current and planned investments. The goal of the design is to provide a high-level roadmap for implementing and enhancing the customer’s current backup environment. Data Protection Migration | Transform Catalog migration and merge activities consist of moving catalogs from one OS to another, moving a non-cluster configuration to a cluster master configuration, performing host name changes, etc.

Information Security

Control Compliance Suite (CCS)

Control Compliance Suite Assessment | Operate Introducing the CCS solution requires a thorough requirements definition and qualification process that must be passed before device on-boarding can begin. Consultants perform an audit of the target environment to identify devices, validate models and software versions against the CCS-supported products list, validate the device configuration against CCS baselines, validate existing controls and policies against Symantec best practices, and conduct proof of concept and scoping services. Control Compliance Suite Migration | Transform The Control Compliance Suite Migration service consists of the migration of an existing CCS installation to the requested version of CCS. Control Compliance Suite Upgrade | Transform From minor version upgrades to legacy installations, consultants provide the CCS infrastructure and upgrade solution to the customer’s current installation and help to maximize the organization’s returns from its existing CCS investment. Consultants prepare the customer’s existing environment for the upgrade.

Critical System Protection (CSP)

Critical System Protection Health Check | Operate The Symantec Critical System Protection Health Check service provides expert assistance in evaluating the customer’s CSP implementation against current business requirements and industry standards. The goal of the Health Check is to provide options and recommendations for improving the security policies and alerting in the customer’s environment and to assist in the development and implementation of a risk-mitigation strategy. A detailed report that outlines issues found, with suggested recommendations, is provided. Critical System Protection Upgrade | Transform From minor version upgrades to legacy installations, consultants provide the CSP infrastructure and agent upgrade solution to the customer’s current installation and help to maximize the organization’s returns from its existing SCSP investment. Consultants prepare the customer’s existing environment for the upgrade.

Data Loss Prevention (DLP)

Data Loss Prevention Advisory Services | ALL Symantec DLP Advisory services are designed to assist organizations in the development of a Data Protection Program strategy. Each engagement begins with a discovery phase, where consultants review key business objectives, stakeholders, success criteria, and roles and responsibilities for the engagement. Consultants provide a project plan and time-line for the proposed start and completion of the strategy sessions, including key milestones. The analysis phase includes a review of the current security landscape based on the customer’s risk profile, vertical industries, and the customer’s geographical presence. Business unit and stakeholder interviews are conducted and business processes and current policies are documented.

Page 26: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 26

Data Loss Prevention Enablement | Transform This offering provides customers with a full implementation of Symantec DLP from a technical and operational perspective. Symantec DLP consultants provide a documented implementation and system integration plan, including technical goals, success criteria, and roles and responsibilities. After planning, the consultants assist the customer in implementing the Symantec DLP application and its components on customer-provided hardware. After implementation, system component testing and tuning is provided. In conjunction with technical planning, consultants begin the business advisory portion of the engagement by planning and designing the DLP rule sets, risk reduction targets, incident response workflow, reporting and metrics, and employee communications. After the technical implementation, consultants assist the customer in the implementation of the policies, processes, reports, and communication plan, as previously defined. Consultants also provide a DLP program road map to assist the customer in further maturing their program and reducing operational risk. Data Loss Prevention Expert Resident | Operate With the Data Loss Prevention Expert Resident service, consultants provide DLP administration for day-to-day activities, scheduled maintenance, and optimization of the DLP environment. Administration includes, but is not limited to, the design, configuration, documentation, and management of incident response rules, policies, reports, and user roles. Consultants provide guidance on data analysis and strategic direction. Program status and progress reports are provided and communicated to team members, business owners, and stakeholders on a weekly or quarterly basis. Data Loss Prevention IT Analytics Install | Transform The DLP IT Analytics installation begins with the review of customer business objectives. Consultants review the configuration of the server hardware designated for the IT Analytics server to determine readiness for the installation of IT Analytics. The IT Analytics server and content packs are installed along with the initial cube and report. The consultant performs initial cube processing and creates up to two processing schedules. Cube contents and functionality are tested and verified. The consultant also transfers knowledge on OLAP cube fundamentals, use of pivot tables, reports, dashboards, and key performance indicators available within IT Analytics for DLP. A final report, including documentation of current-state configuration of IT Analytics for DLP and recommendations based on initial analysis of activities to be performed in support of identified business objectives, is provided.

Symantec Messaging Gateway (SMG)

Symantec Messaging Gateway Assessment | Operate Successful organizations integrate Symantec Messaging Protection into their existing security program and leverage the software to manage the risk associated with a constantly evolving messaging landscape that can include multiple threats from malicious software and wasteful SPAM. The SMG Assessment service analyzes the performance, health, and risk of a deployed product and provides a number of suggested improvements required to bring the customer’s environment to operational standards. Symantec Messaging Gateway Deployment | Transform This service is intended for a new installation of SMG technology to an organization not currently using SPAM filtering or gateway malware scanning products. This service installs, configures, and recommends SMG services specific to the customer’s unique needs.

Symantec Protection Center (SPC)

Symantec Protection Center Assessment | Operate Organizations implement Symantec Protection Center (SPC), a powerful data collection and analytics platform, for its centralized security management console. SPC enables organizations to identify emerging threats, prioritize tasks, and accelerate time to protection based on relevant, actionable intelligence. The SPC Assessment service analyzes the performance, health, and risk of a deployed product and provides a number of suggested improvements required to bring the customer’s environment to operational standards.

Symantec Protection Engine for NAS

Symantec Protection Engine for NAS Assessment | Operate Symantec Protection Engine (SPE) for Network Attached Storage (NAS) is a complimentary component to the SEP Anti-Virus infrastructure. Consultants guide the customer through the assessment and health check, from start to finish. The SPE for NAS Assessment service analyzes the performance, health, and risk of a deployed product and provides a number of suggested improvements required to bring the customer’s environment to operational standards.

Page 27: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 27

Managed Security Services (MSS)

Managed Security Services Assessment | Operate The Managed Security Services Assessment service analyzes the performance, health, and risk of a deployed product. With this offering, consultants provide a number of suggested improvements required to bring the customer’s environment to operational standards. The MSS Assessment also analyzes the functionality of the product against the requirements of operational management and provides advice on any additional configuration that may be required. Managed Security Services Deployment | Transform Introducing the MSS solution requires a thorough requirements definition and qualification process that must be passed before device on‐boarding can begin. Consultants perform an audit of the target environment to identify devices, validate models and software versions against the MSS-supported products list, validate the device configuration against MSS baselines, validate existing controls and policies against standards, and conduct proof of concept and scoping services. Managed Security Services Staff Augmentation | Residency The Managed Security Services Staff Augmentation service provides a full-time expert consultant, either onsite or remote. This expert can be used for daily operations, monitoring and maintaining the environment, assisting with knowledge transfer to the customer’s staff, assisting in the initial end-user roll out, or helping recover lost knowledge when the in-house expert is no longer available.

User Protection and Productivity

Altiris™ IT Management Suite from Symantec™

Asset Management Suite (AMS) Assessment | Operate With the Asset Management Suite Assessment service, consultants analyze AMS and perform a Services Strategy and Assessment, during which they associate the goals of an IT project with business objectives. In addition, consultants perform a health check to ensure that business value is being derived from the tool and they provide recommendations on how to move to an operational state with the desired capability and maturity level. Asset Management Suite (AMS) Deployment | Transform For new AMS installations, consultants provide installation and configuration support and make AMS recommendations that are specific to the unique needs of the customer. With the Asset Management Suite Deployment service, consultants work with the customer to perform the installation and configuration of AMS. Asset Management Suite (AMS) Migration | Transform With the Asset Management Suite Migration service, consultants perform and validate a risk-free migration. Similar to performing an installation, migrating from one systems management product to another requires substantial know-how and product knowledge. Consultants have performed numerous migrations and are familiar with several competitor products, which ensures a successful low-risk migration to Asset Management Suite. Asset Management Suite (AMS) Upgrade | Transform The Asset Management Suite Upgrade service provides customers with assistance in planning and completing the upgrade process for AMS. Customers receive a detailed breakdown of the upgrade process and related tasks. Consultants have performed numerous successful upgrades, while preserving CMDB and legacy processes. Client Management Suite (CMS) Assessment | Operate The Client Management Suite Assessment service is a consulting engagement that combines a technical and business review to assess the current state of the CMS environment, review the alignment of the environment with business requirements, and recommend changes to ensure that alignment. Consultants perform a health check to ensure that business value is being derived from CMS and they provide recommendations to move to an operational state with the desired capability and maturity level.

Page 28: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 28

Client Management Suite (CMS) Implementation | Transform The Client Management Suite Implementation service is a consulting engagement that provides customers with an assessment of their current environment and applicable IT, business, and technical requirements. Consultants design and configure a solution based on the identified business drivers, and provide a pilot implementation of CMS that includes next-step recommendations. This service also includes knowledge transfer to customer staff on the solution’s key configurations and design concepts, as well as operational standards and key maintenance routines. Client Management Suite (CMS) Upgrade | Transform The Client Management Suite Upgrade service is a consulting engagement that includes the re-evaluation and assessment of business drivers, technical requirements, and the existing CMS implementation; specification and planning for the upgrade to the new version of CMS; pilot testing to validate the migration plan and solution design; and knowledge transfer throughout the engagement. Consultants have performed numerous upgrades while preserving CMDB and legacy processes.

Client Management Suite (CMS) Migration | Transform With the Client Management Suite Migration service, consultants perform and validate a risk-free migration. Similar to performing an installation, migrating from one systems management product to another requires substantial know-how and product knowledge. Consultants have performed numerous migrations and are familiar with several competitor products, which ensures a successful low-risk migration to CMS. ServiceDesk (SD) Assessment | Operate With the ServiceDesk Assessment service, consultants analyze SD and perform a Services Strategy and Assessment, where they associate the goals of an IT project with business objectives. In addition, consultants perform a health check to ensure that business value is being derived from the tool and they provide recommendations on how to move to an operational state with the desired capability and maturity level. ServiceDesk (SD) Deployment | Transform Introducing new technologies requires substantial experience and expert product knowledge. With the ServiceDesk Deployment service, consultants work with the customer to perform the installation and configuration of SD. ServiceDesk (SD) Migration | Migration With the ServiceDesk Migration service, consultants perform and validate a risk-free migration. Similar to performing an installation, migrating from one systems management product to another requires substantial know-how and product knowledge. Consultants have performed numerous migrations and are familiar with several competitor products, which ensures a successful low-risk migration to SD. ServiceDesk (SD) Upgrade | Transform The ServiceDesk Upgrade service provides customers with assistance in planning and completing the upgrade process for SD. Customers receive a detailed breakdown of the upgrade process. Symantec Workflow (WF) Solution Assessment | Operate With the Symantec Workflow Solution Assessment service, consultants analyze Workflow and perform a Services Strategy and Assessment, where they associate the goals of an IT project with business objectives. In addition, consultants perform a health check to ensure that business value is being derived from the tool and they provide recommendations on how to move to an operational state with the desired capability and maturity level. Symantec Workflow (WF) Solution Deployment | Transform Introducing new technologies requires substantial experience and expert product knowledge. With the Symantec Workflow Solution Deployment service, consultants work with the customer to perform the installation and configuration of Workflow. Symantec Workflow (WF) Solution Migration | Transform With the Symantec Workflow Migration service, consultants perform and validate a risk-free migration. Similar to performing an installation, migrating from one systems management product to another requires substantial know-how and product knowledge. Consultants have performed numerous migrations and are familiar with several competitor products, which ensures a successful low-risk migration to Workflow.

Page 29: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 29

Symantec Workflow (WF) Solution Upgrade | Transform The Symantec Workflow Solution Upgrade service provides customers with assistance in planning and completing the upgrade process for Workflow. Customers receive a detailed breakdown of the upgrade process.

Symantec App Center

Symantec App Center Assessment | Operate The Symantec App Center Assessment service provides customers with a thorough understanding of how to manage mobile applications by delivering an in-depth assessment of requirements, aligning requirements to corresponding mobile platforms, and designing and implementing mobile application management practices. Consultants are available to guide the customer through the assessment and health check, from start to finish. This service analyzes the performance, health, and risk of a deployed product and suggests improvements required to bring the customer’s environment to operational standards. Symantec App Center Deployment | Transform With the Symantec App Center Deployment service, consultants work with the customer to perform the installation and configuration of Symantec App Center. Symantec App Center Migration | Transform With the Symantec App Center migration service, consultants perform and validate a risk-free migration. Migrating from one system management product to another requires substantial know-how and product knowledge. Consultants have substantial experience in performing migrations and are familiar with a broad range of non-Symantec products, which reduces risk and ensures a successful migration to App Center Solution. Symantec App Center Upgrade | Transform The Symantec App Center Upgrade service provides customers with assistance in planning and completing the upgrade process. Customers receive a detailed breakdown of the upgrade process. Consultants have performed numerous successful upgrades, while preserving developed apps, policies, and organizational structure.

Symantec Encryption Management Server (SEMS)

Symantec Encryption Management Server Installation and Deployment | Transform The Symantec Encryption Management Server Installation and Deployment service assists customers with the design and implementation of SEMS. Consultants design the solution architecture based on several factors, including customer use cases, disaster recovery requirements, and targeted devices. The consultant provides knowledge transfer and overall training on the SEMS environment to identified customer personnel. Symantec Encryption Management Server (SEMS) Upgrade | Upgrade The Symantec Encryption Management Server Upgrade service assists customers with the migration to a newer version of SEMS within their existing environment. Consultants review the upgrade path and provide a plan to complete the upgrade during the customer-defined change window. The consultant executes the plan and ensures that all services are working properly at the conclusion of the upgrade.

Symantec Endpoint Protection (SEP)

Symantec Endpoint Protection Migration | Transform With the Symantec Endpoint Protection Migration service, consultants perform and validate a migration to SEP. Migrating from one security product to another requires significant experience and product knowledge. Consultants have performed numerous migrations and are familiar with several competitor products, which ensures a clean removal prior to installing SEP. Symantec Endpoint Protection Upgrade | Transform The SEP Upgrade service offering provides customers with assistance in planning and completing the upgrade process for SEP. Customers receive a detailed breakdown of the upgrade process.

Page 30: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 30

Symantec Workspace Streaming (SWS)

Symantec Workspace Streaming Assessment | Operate With the Symantec Workspace Streaming Assessment service, consultants analyze SWS and perform a Services Strategy and Assessment, where they associate the goals of an IT project with business objectives. In addition, consultants perform a health check to ensure that business value is being derived from the tool with and they provide recommendations on how to move to an operational state with the desired capability and maturity level. Symantec Workspace Streaming Deployment | Transform With the Symantec Workspace Streaming Deployment service, consultants work with the customer to perform the installation and configuration of SWS. Symantec Workspace Streaming Migration | Transform With the Symantec Workspace Streaming Migration service, consultants perform and validate a risk-free migration. Similar to performing an installation, migrating from one systems management product to another requires substantial know-how and product knowledge. Consultants have performed numerous migrations and are familiar with several competitor products, which ensures a successful low-risk migration to SWS. Symantec Workspace Streaming Upgrade | Upgrade The Symantec Workspace Streaming Upgrade service provides customers with assistance in planning and completing the upgrade process for SWS. Customers receive with a detailed breakdown of the upgrade process.

Other Offering(s)

SymRA for Business Critical Virtualization

SymRA for Business Critical Virtualization | ALL SymRA for Business Critical Virtualization facilitates faster deployments of Microsoft® applications on VMware® virtualization server platforms, such as Microsoft SQL Server, Exchange, and SharePoint. These specialized solutions enable organizations to meet the demands for application performance, availability, security, and cost with server virtualization solutions. These solutions follow industry-standard enterprise architecture development methods, as defined by The Open Group Architecture Framework (TOGAF), to accelerate adoption into your production environment. Consultants help increase the business value and return on investment from Symantec virtualization server software to effectively accelerate next phase deployments of virtualization initiatives.

Page 31: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 31

APJ-Pacific Region-Specific Offerings

Information Management

Data Insight (DI)

Data Insight – Detailed Design | Design With the Data Insight Detailed Design service, consultants provide customers with comprehensive architecture documents appropriate for data governance, optimization, data risk identification, and data management across multiple supported platforms. Data Insight – High-Level Architecture | Design With the Data Insight High Level Architecture service, consultants provide customers with a data governance solution that provides visibility into the customer’s unstructured data and reports on who is accessing the data, when, and how. Upon completion of this service, customers receive a high-level architecture document based on their organizational needs and divisional policy and direction.

Symantec NetBackup™ Appliance

NetBackup and Appliances – Data Migration | ALL With the NetBackup and Appliances Data Migration offering, consultants convert customer data that resides in offline media, such as tape, and migrate that data to the backup and recovery implementation. This ensures a comprehensive data management strategy. NetBackup and Appliances – Deployment (Pilot) | Transform With the NetBackup and Appliances Deployment (Pilot) offering, consultants deploy NetBackup for the customer. The base offering for deployment services starts with a pilot consisting of one master server and two media servers. Consultants also deploy up to four base NetBackup clients and are available to provide additional deployment services, as required by the customer. NetBackup and Appliances – Detailed Design | Design With the NetBackup and Appliances Detailed Design service, consultants provide the customer with a comprehensive solution design that has been customized to meet the backup scheduling, service level, data retention, duplication, replication, and recovery obligations, as driven by the customer’s requirements and policy. NetBackup and Appliances – High-Level Architecture | Design With the NetBackup and Appliances High-Level Architecture service, consultants provide customers with a blueprint for their backup, recovery, deduplication, and data protection requirements. Upon completion of this service, customers receive a high-level architecture document based on their organizational needs and divisional policy and direction. NetBackup and Appliances – Operational Health Check | Operate With the NetBackup and Appliances Operational Health Check service, consultants review backup and recovery configurations and operations to ensure Symantec proprietary solutions remain capable of meeting expected levels of service and performance. At this time, consultants may make recommendations for additional consulting service engagements if the customer requirements have changed.

Security Information Manager

Security Information Manager – Detailed Design | Design With the Security Information Manager Detailed Design service, consultants provide the customer with a solution that combines organizational data, security event information, and threat intelligence, and produces a meaningful context for their security event log data. Security Information Manager – High-Level Architecture | Design With the Security Information Manager High-Level Architecture service, consultants provide customers with a real-time incident and event management solution that enables customers to centralize and analyze large amounts of diverse log data. Upon completion of this service, customers receive a high-level architecture document, based on their organizational needs and divisional policy and direction.

Page 32: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 32

Security Information Manager – Operational Health Check |Operate After deployment, Symantec offers the Security Information Manager Operational Health Check service to customers who wish to re-assess the productivity of Security Information Manager. Consultants provide insight into the overall health and configuration of the customer's Security Information Manager and agent infrastructure. In addition, the customer receives a detailed report that describes any issues that were found, along with recommendations for their resolution. Security Information Manger – Deployment (Pilot) | Transform With the Security Information Manager Deployment (Pilot) offering, consultants deploy and configure Symantec Security Information Manager for the customer. Consultants may also deploy up to two off-box agents and configure up to ten collector sensors. Consultants are also available to provide additional deployment services, as required by the customer. Security Information Manager Proof of Concept | Assess Symantec provides Proof of Concept (POC) services for Security Information Manager. A POC enables the customer to make an informed selection and realize the benefits of Security Information Manager prior to purchasing the full product set. A POC for Security Information Manager provides customers with the necessary due diligence and information, focusing on the customer’s security requirements aligned with the Symantec solution. In addition, a Security Information Manager POC enables the customer to partner with the consultant to evaluate a subset of Security Information Manager features.

Information Security

Control Compliance Suite (CCS)

Control Compliance Suite Assessment | Operate Introducing the CCS solution requires a thorough requirements definition and qualification process that must be passed before device on-boarding can begin. Consultants perform an audit of the target environment to identify devices, validate models and software versions against the CCS-supported products list, validate the device configuration against CCS baselines, validate existing controls and policies against Symantec best practices, and conduct proof of concept and scoping services.

Critical System Protection (CSP)

Critical System Protection Health Check | Operate The Critical System Protection Health Check service provides expert assistance in evaluating the customer’s CSP implementation against current business requirements and industry standards. The goal of the Health Check is to provide options and recommendations for improving the security policies and alerting in the customer’s environment and to assist in the development and implementation of a risk-mitigation strategy. A detailed report that outlines issues found, with suggested recommendations, is provided. Critical System Protection – Detailed Design | Design With the Critical System Protection Detailed Design service, consultants provide the customer with a blueprint that leverages Symantec Critical System Protection to secure the customer’s physical and virtual data centers. Critical System Protection – High-Level Architecture | Design With the Critical System Protection High-Level Architecture service, consultants provide customers with a solution that meets the customer’s compliance and security requirements. Upon completion of this service, customers receive a high-level architecture document based on their organizational needs and divisional policy and direction. Critical Systems Protection – Proof of Concept | Assess Symantec provides Proof of Concept (POC) services for Critical System Protection. A POC enables the customer to make an informed selection and realize the benefits of Critical System Protection prior to purchasing the full product set. A POC for Critical System Protection provides customers with the necessary due diligence and information, focusing on the customer’s security requirements aligned with the Symantec solution. In addition, a Critical System Protection POC enables the customer to partner with the consultant to evaluate a subset of Critical System Protection features.

Page 33: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 33

Data Loss Prevention (DLP)

Data Loss Prevention Proof of Concept | Assess Symantec provides Proof of Concept (POC) Services for Data Loss Prevention. A POC enables the customer to make an informed selection and realize the benefits of Data Loss Prevention prior to purchasing the full product set. A POC for Data Loss Prevention provides customers with the necessary due diligence and information, focusing on the customer’s security management requirements aligned with the Symantec solution. A Data Loss Prevention POC completes a risk assessment that gathers requirements and prioritizes data security needs, monitors the prospective network for data loss, and presents a summary of any significant business risks. Data Loss Prevention – Detailed Design | Design With the DLP Detailed Design service, Symantec consultants provide customers with a program that evaluates data breach and regulatory compliance and deploys the monitoring and protection mechanisms wherever data is stored across the network, storage, endpoint, and mobile systems. Data Loss Prevention – Strategic Consultant | ALL Engaging with a DLP Strategic Consultant enables customers to focus on Symantec’s point products and provides customers with end-to-end services for large aspects of their IT portfolio. A customer can choose to review their security monitoring and data protection policies with consultants for advice on how to protect and proactively manage their data loss exposure, risk, and regulatory compliance.

Information Security Practices and Assessments

Operational Firewall Security Health Check |Operate The Operational Firewall Security Health Check service assesses the overall effectiveness of a customer’s firewall policies. The policy is assessed to ensure that it is configured optimally and that there are no weak points that could compromise the protection it is providing. The customer receives a full report detailing the key security findings along with recommendations on how to fix any issues that are found. Operational Penetration Security Assessments | Operate Symantec offers the following Operational Penetration Security Assessments: network perimeter assessment, internal vulnerability assessment, Web application security assessment, database security assessment, source code review and binary analysis, PCI quarterly scans and an annual security review. The customer receives a full report detailing the key security findings along with recommendations on how to fix any issues that are found. Operational Web Application Firewall Security Health Check | Operate The Operational Web Application Firewall (WAF) Security Health Check service provides a complete overview of the security health of the customer’s WAF. The customer receives a full report giving them assurance that the investment is providing optimum protections and that the important assets are adequately protected. Remediation guidance is provided, along with how to remedy any issues that are identified. Security Incident and Event Management | ALL The Security Incident and Event Management service enables customers to focus on Symantec’s point products and provides customers with end-to-end services for large aspects of their IT portfolio. The customer can choose to review their security information and event management practices and policies with consultants for advice on how to meet necessary compliance and regulatory requirements. In addition, consultants provide practical recommendations for risk mitigation. Solution Architecture Review | ALL A complete review of an organization's security solution architecture, the Solution Architecture review identifies the key risks across business, people, and technology and makes recommendations on how to improve the customer’s enterprise architecture in line with industry standards. Symantec Security Program Assessment | ALL The Symantec Security Program Assessment service provides customers with an enterprise-wide view for executives by evaluating, prioritizing, and managing their portfolio of security controls. It maps current security capabilities, establishes the desired state of security maturity, and develops an overall program strategy and prioritized roadmap for achieving enterprise information security goals.

Page 34: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 34

User Protection and Productivity

PGP Encryption

PGP Encryption – Deployment | Transform The PGP Encryption Deployment service assists customers in deploying PGP Encryption using the Symantec Encryption Management Server, which can manage multiple PGP encryption applications from a single console. A consultant configures the management console with the policies, logging, monitoring, and reporting parameters, as designed. The consultant assists the customer in rolling out PGP to group endpoints, file shares, and removable media as required. PGP Encryption – Detailed Design | Design With the PGP Encryption Detailed Design service, consultants provide the customer with an encryption blueprint targeted to provide transparent encryption and decryption of data across a range of file share and e-mail suite products. PGP Encryption – High-Level Architecture | Design With the PGP Encryption High-Level Architecture service, consultants provide customers with a data encryption solution intended to keep data secure while meeting compliance objectives and protecting the organization’s e-mail, file shares, hard disks, and removable media. Upon completion of this service, customers receive a high-level architecture document, based on their organizational needs and divisional policy and direction.

Symantec Endpoint Protection (SEP)

Symantec Endpoint Protection Proof of Concept | Assess Symantec provides Proof of Concept (POC) services for Symantec Endpoint Protection. A POC enables the customer to make an informed selection and realize the benefits of Symantec Endpoint Protection prior to purchasing the full product set. A POC for Symantec Endpoint Protection provides customers with the necessary due diligence and information, focusing on the customer’s security requirements aligned with the Symantec solution. In addition, a Symantec Endpoint Protection POC enables the customer to partner with the consultant to evaluate a subset of Symantec Endpoint Protection features. Symantec Endpoint Protection – Detailed Design | Design With the Symantec Endpoint Protection Detailed Design service, consultants provide the customer with a set of technical and policy requirements for delivery of Symantec’s Endpoint Protection. Symantec Endpoint Protection – High-Level Architecture | Design With the SEP High-Level Architecture service, consultants provide customers with the reassurance that the solution fulfills the customer’s security requirements, while maximizing the full potential of Symantec Endpoint Protection technologies. Upon completion of this service, customers receive a high-level architecture document based on their organizational needs and divisional policy and direction. Symantec Endpoint Security – Strategic Consultant | ALL Engaging with a Symantec Endpoint Security Strategic consultant enables customers to focus on Symantec’s point products and provides customers with end-to-end services for large aspects of their IT portfolio. A customer can choose to review their Endpoint Security practices and policies with consultants for advice on how to meet the necessary compliance and regulatory requirements. In addition, consultants provide practical recommendations for risk mitigation.

Other Offering(s)

Data Privacy Assessment

Data Privacy Assessment | ALL The Data Privacy Assessment service analyzes an organization’s data privacy obligations in relation to the Australian privacy law. It highlights and prioritizes the scope of work that is required in order to comply with the act.

Page 35: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 35

APJ-Asia South Region-Specific Offerings

Information Management

Symantec Enterprise Vault™ (EV)

Custom Filtering for EV Exchange Archiving | ALL The Custom Filtering for EV Exchange Archiving service offering provides rules for items that are to be archived or deleted and enables advanced features for auto-decision rules, including the required retention period. Consultants create up to five rules that enable filtering for all types of Exchange Server archiving (User and Journal mailbox). Custom Reports using EV Reporting Services | ALL The Custom Reports using EV Reporting Services offering is for customers who require additional reporting capabilities within the EV framework. Consultants create up to three customized SQL report for customer stakeholders, based on user requirements, including scheduled reports for SQL reporting servers with SMTP. Custom Reports using OpsCenter Analytics | ALL The Custom Reports using OpsCenter Analytics service is for customers who require additional reporting capabilities beyond the EV framework. Consultants create up to two customized reports for customer stakeholders, based on user requirements, that leverage the OpsCenter Analytics framework. These reports include scheduled reports for SQL reporting servers with SMTP. Data Classification Advisory Services | ALL The Data Classification Advisory Services offering assists the customer with the development of Data Classification Policies and templates that position the customer for adoption of Data Classification enabling technologies, especially in archival and data loss prevention. Enterprise Vault Server Backup Integration | ALL The Enterprise Vault Server Backup Integration service assists customers with their backup requirements for their Enterprise Vault (EV) setup. This offering includes both pre- and post-backup scripts and SQL native backup to SQL server disk. Enterprise Vault – PST Migration Pack (20 mailboxes) | Transform This offering provides a pilot exercise that is used to educate customers on how to migrate PSTs for centralized control of e-mail archives in EV. This offering includes pre-engagement tasks, setup and configuration, and migration of PSTs to Archive.

Disaster Recovery Testing

Disaster Recovery Testing Support Service | ALL This service assists the customer with planning and preparing for a disaster recovery test, and provides assurance during the disaster recovery tests. Depending on the scale of the disaster recovery, this offering is based on time and materials (5-day blocks).

Symantec NetBackup™ (NBU)

NetBackup Custom Services | ALL This offering provides custom services related to standard data protection tasks, such as health check, pre-upgrade planning, catalog manipulation, and migration assessment for NetBackup projects. Customized consulting engagements are scoped for consistency, analysis and repair, NetBackup server hardware migration, NetBackup server rename, and NetBackup Windows relocation or move. Enterprise Classification Advisory | ALL This service is delivered for a period of three to four weeks, depending on the customer’s objectives and requirements. Consultants provide a comprehensive approach to classifications from an Enterprise perspective, considering business requirements, IT operation models, and legacy polices. This service covers various classification methods, such as information/data/asset classifications, security, operations, and management. The customer receives recommendations that include principles and polices of fundamental classifications, which can be applied to various IT functions, such as security, IT service, and asset management.

Page 36: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 36

Information Security

Business Process Analysis

Business Process Analysis Program | ALL This service is delivered for a period of two to four weeks, depending on the customer’s objectives and requirements. The consultant analyzes potential risks that may exist in business processes using various mechanisms, and provides recommendations and action plans. This service can be used with security solutions implementation projects, such as DLP, EV, and PGP.

Control Compliance Suite (CCS)

Control Compliance Suite Assessment | Operate Introducing the CCS solution requires a thorough requirements definition and qualification process that must be passed before device on-boarding can begin. Consultants perform an audit of the target environment to identify devices, validate models and software versions against the CCS-supported products list, validate the device configuration against CCS baselines, validate existing controls and policies against Symantec standards, and conduct proof of concept and scoping services. Continuous Compliance Operations | ALL The Continuous Compliance Operations service is used for executive reporting and baselining. This service provides on-premise CCS management compliance operations handling, reporting and exception management, SME details on non-compliance and invalid data, and interpreting recommendations for operations. Control Compliance Suite Technical Compliance Operations Management | Operate The Control Compliance Suite Technical Compliance Operations Management service is used for executive reporting and baselining. This service provides on-premise CCS management compliance operations handling, reporting and exception management, SME details on non-compliance and invalid data, and interpreting recommendations for operations. Compliance Suite Solution Design | Design The Compliance Suite Solution Design service is offered for small to medium businesses and large enterprises. Design configuration parameters are provided based on the customer's policy needs. The customer receives configuration, sizing, and placement recommendations. This service is also applicable for individual components. Compliance Suite Solution Deployment | Transform With the Compliance Suite Solution Deployment service, consultants conduct a standard solution deployment using standard guidelines. They deploy the configuration parameters and policies based on the customer's requirements. This service includes staging, testing, and reporting, which ensures the product performance and policy functioning meet the customer’s requirements. Compliance Suite Solution Upgrade | Transform With the Compliance Suite Solution Upgrade service, consultants conduct a standard solution upgrade and they deploy configuration parameters and policies based on the customer's upgrade requirements. This service includes testing and reporting, which ensures the product performance and policy functioning meet the customer’s requirements, with minimal impact to operations. Compliance Hardening Guidelines Definition and Enablement | ALL The Compliance Hardening Guidelines Definition and Enablement service provides a conversion of the customer’s processes for baselining and hardening. This service interprets the processes that are used in the CCS solution.

Critical Systems Protection (CSP)

Critical System Protection Health Check | Operate The Critical System Protection Health Check service provides expert assistance in evaluating the customer’s CSP implementation against current business requirements and industry standards. The goal of the Health Check is to provide options and recommendations for improving the security policies and alerting in the customer’s environment and to assist in the development and implementation of a risk-mitigation strategy. A detailed report that outlines issues found, with suggested recommendations, is provided.

Page 37: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 37

Critical Systems Protection – Host Security Solution Enablement | Design The CSP Host Security Solution Enablement service designs a CSP setup in the customer’s environment and identifies the agents to be deployed and the existing policies to be configured to meet the customer’s objectives. This service is offered to small to medium businesses and enterprise customers.

Data Loss Prevention (DLP)

Data Loss Prevention Advisory and Business Enablement for Policies | ALL The Data Loss Prevention Advisory and Business Enablement for Policies service provides controls based on the information classification program and the defined protective measures to be implemented. The customer is provided with technical control definitions and interface points for information protection. Data Loss Prevention Solution Design | Design The Data Loss Prevention Solution Design service is offered for small to medium businesses and large enterprises. Design configuration parameters are provided based on the customer's policy needs. The customer receives configuration, sizing, and placement recommendations. Data Loss Prevention Solution FlexResponse Customization | Custom With the Data Loss Prevention Solution FlexResponse Customization service, consultants customize FlexResponse using DLP APIs to integrate actions on policy triggers (violations/observations) for upstream or downstream activities to be performed in the customer’s environment.

Email Security Management

Email Security Management Assessment (Infrastructure and Rules) |Operate With the Email Security Management Assessment (Infrastructure and Rules) offering, consultants conduct a health check for existing users against standard guidelines, and they deploy the configuration parameters and policies based on the customer's requirements. Email Security Management Design | Design The Email Security Management Design service is offered for small to medium businesses and large enterprises. Design configuration parameters are provided based on the customer's policy needs. The customer also receives appliance configuration recommendations. Email Security Management Enablement | Transform With the Email Security Management Enablement offering, consultants conduct a standard solution deployment using standard guidelines, and they deploy the configuration parameters and policies based on the customer's requirements. This service includes testing and reporting, which ensures the product performance and policy functioning meet the customer’s requirements. Email Security Management Upgrade | Transform With the Email Security Management Upgrade service, consultants conduct a standard solution upgrade and deploy configuration parameters and policies based on the customer's upgrade requirements. This service includes testing and reporting, which ensures the product performance and policy functioning meet the customer’s requirements, with minimal impact to operations.

Information Security Analysis, Architecture, Incidents, and Operations

Advanced Malware and Threat Intelligence Service (Remote) | ALL The Advanced Malware and Threat Intelligence Service offering provides advanced intelligence to customers for specific binaries and network traffic dumps. The service is delivered through a SRL (Security Response Liaison) who accepts information, and responds with telemetry data on malware, infection statistics, etc. This service is based off tokens purchased, and delivered remotely for a minimum of one year. CIO/CISO Leadership Program | ALL The CIO/CISO Leadership Program service is designed to help CIOs and CISOs perform their roles more efficiently, aligning with business objectives. This flexible service consists of various modules, such as industry trend sessions, workshops, and discussions. In addition, consultants introduce mechanisms for CIOs and CISOs to communicate with key stakeholders and demonstrate IT and security value to board and management teams.

Page 38: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 38

Denial of Service Testing Simulated Attacks | ALL The Denial of Service Testing Simulated Attacks service structures and conducts simulated attacks on the customer’s environment using a simulation of acceptable and unacceptable packet flow, and reviews the results. Host Security Continuous Compliance Monitoring Enablement | ALL With this outcome-based service, consultants consolidate CCS Standards Manager (SM) and Symantec Critical Systems Protection (SCSP) using a common set of policies and reports that are generated and linked through Symantec WorkFlow. This service provides a point-in-time snapshot of compliance violations when critical change incidents are observed through monitoring the infrastructure. Information Classification Program for Sensitive information Protection |ALL This service is an advisory service that defines an Information Classification program to be used in conjunction with the implementation of data protection and information leakage prevention. This service is dependent on the information type (structured) and the number of business units or types under scope. Information Exposure Assessment | Assess This service is provided through interviews and scans of the customer’s environment to identify residue of sensitive information in undesirable locations and in violation of internal and external policies. Information Leakage Prevention Operations Management| Operate The Information Leakage Prevention Operations Management service is for on-premise DLP management, incident handling, tuning, reporting, changing policies for exceptions, and driving down policy false positives. This service is typically used in the first year of service delivery. IT Governance, Risk Management, and Compliance (IT GRC) | ALL This service is delivered for a period of four weeks, depending on the customer’s needs, to access the current posture of IT GRC in the organization, based on their maturity model and standards. In addition, this program provides practical and comprehensive recommendations to improve the maturity of IT GRC in the organization, considering business requirements, market demands, and compliance. Key Management Process Enablement | ALL The Key Management Process Enablement service assists customers in establishing a process to transition current Key Management to Managed PKI, including documentation of current key management, identification of current key usage, revocation processes for keys, and key misuse reporting. Malicious Activity Assessment | Assess The Malicious Activity Assessment service is a Proof of Concept conducted to identify the missing security pieces within the customer's environment that are not being detected or adequately reported, but that result in security events at egress points. This service is delivered for a period of three to five man-days, depending on customer size. Malware Analysis Service using On-Premise Automated Malware Analysis | ALL Using Symantec SmartHarness, this service delivers automated analysis and classification of the malware binaries submitted for analysis. Combined with the malware analysis, this service generates information on the intended use of the binary. Managed Security Onsite Enablement | Transform Managed Security Onsite Enablement is an on-site service that helps customers consolidate log information to be communicated back to the MSS Security Operations Center (SOC). Changes are performed locally in the customer's environment or at distributed monitoring locations, and result in a MSS monitoring outcome. Mobile Security Assessment Deep Dive | ALL The Mobile Security Assessment Deep Dive service provides a security view of the entire mobile security program in the customer's environment. This service can be delivered along with an Enterprise Security Architecture (ESA), or as an after activity on the mobility element of ESA.

Page 39: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 39

Payment Card Industry (PCI) Readiness Assessment | Assess The PCI Readiness Assessment is an outcome-based service. This service provides the customer with a PCI QSA view of gaps in meeting PCI requirements. PCI readiness is typically based on scope, and the preliminary assessment of controls and domains can be conducted using a sampling mechanism. However, the assessment can also be customized, based on the customer’s unique requirements. PCI Trusted Advisory Service| ALL The PCI Trusted Advisory service provides the customer with guidance on how to manage gaps for meeting PCI requirements. The PCI Trusted Advisory service is based on the scope of the implementation and the outcome is based on the preliminary assessment of the controls and domains. Perimeter Security VA and PT Assessment | ALL The Perimeter Security VA and PT Assessment service conducts a two-stage exercise to assess vulnerabilities and potential aggregation of vulnerabilities to actually perform an attack. The attack is limited to network, perimeter, and hosting (server and database) infrastructure. The scope is limited to a set of 20 IPs externally, and can scale higher, if required. The second stage of this service performs offensive activity, which leaves a residue on the customer's environment in a documented and logged format. This demonstrates a potential attack without compromising data integrity on the customer’s side. If required, the customer receives information on cleanup and reversal. Personal Data Privacy Act (PDPA) Gap Assessment | Assess The Personal Data Privacy Act (PDPA) Gap Assessment assesses the customer’s readiness for PDPA and provides a roadmap for implementation. Public Key Infrastructure (PKI) Enablement | ALL The PKI Enablement service sets up the PKI Enterprise Gateway and integrates it within the customer’s environment in order to transmit authentication information. Secure Code Review | ALL The Secure Code Review service performs a source code review for memory leaks, unencrypted sessions, sensitive information access flow, and storage and recovery of critical information. Security Customer Case Study Reference for Similar Industry | Assess Based on the customer’s requirements, this service is delivered as a two-hour presentation that highlights the similar maturity, security gaps, and remedial actions observed in the industry. The objective of this service is to highlight key concerns and build interest in the detailed SSPA service for the customer. Security Incident Analysis SME | Operate The Security Incident Analysis SME is an on-site resident for large-scale Security Information and Event Management (SIEM) platform deployments. This consultant assists with incident analysis, rule management, platform reporting, investigative information gathering, and executive reporting. Security Incident Response Management and Retainer | ALL This service is targeted towards customers who have invested in technology for incident or event aggregation, but lack the processes to effectively address an incident. This service assesses the current incident response, provides recommendations for missing gaps, including asset inventory management for incident response advice. The retainer is to help address three incidents for up to nine days of man-effort after the structure of the service. Security Investment Roadmap Management | ALL Based on the customer’s requirements, the Security Investment Roadmap Management service is delivered for a period of ten days. This service highlights the investment gaps, and provides remedial actions to meet the desired state of the customer's environment. This service is delivered to the C-level leadership team to help them make decisions on parameters, such as complexity to adopt, benefit to security posture, time to enable, and total cost of ownership.

Page 40: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 40

Security Operations Center (SOC) Enablement Advisory | ALL This service is delivered to new Security Operations Center customers. The SOC Enablement Advisory service defines the target state of Level 3-5 and assists the customer with documents, artifacts, processes, plans, and schedules, as well as service offerings delivered from SOC. Security Organization Consulting | ALL The Security Organization Consulting service provides comprehensive advice on security organization issues and provides recommendations on reporting mechanisms, and organizational structure. Security Program Assessment | ALL The Security Program Assessment service (Enterprise Security Architecture or ESA) is delivered for a period of four to six weeks, depending on the customer’s requirements. This service analyzes the maturity of the customer's security program, defines a set of recommendations, and builds a gap remediation report. Security Program Assessment Lite | Assess The Security Program Assessment service (Enterprise Security Architecture Lite) is delivered for a period of three to five days, depending on the customer’s requirements. This service analyzes the maturity of the customer's security program. Social Engineering Assessment | ALL The Social Engineering Assessment service analyzes the replicating infrastructure and processes in the customer’s environment and the hosting resources and infrastructure in a parallel environment. The scope of the exercise defines the effort, but the engagement duration is limited to five days for information gathering and assessment. Social engineering may need additional resources to simulate the call center environment. Virtualization Infrastructure Security Assessment Deep Dive | ALL The Virtualization Infrastructure Security Assessment Deep Dive service provides a security view of the entire virtualization platform (management and clients) in the customer's environment. This service can be delivered along with an Enterprise Security Architecture, or as an after activity on the virtualization element of ESA. Web Security Management Enablement | Design Web Security Management Enablement is offered as a service for small to medium businesses and large enterprises. Consultants provide design configuration parameters based on the customer's policy needs, and configuration of appliances based on their recommendations.

Symantec Security Information Manager (SSIM)

SSIM Rules Review and Assessment | Operate The SSIM Rules Review and Assessment service performs SSIM rules analysis based on past triggers, the customer's policy on monitored information, observed new threat vectors, consolidation of collection information, reporting, and upstream and downstream reporting requirements. Custom Collector Development | ALL The Custom Collector Development service provides custom applications and new technology integration in SSIM, including event mapping, rules generation, report generation, configuration of limited components onboard Security Information and Event Management (SIEM) infrastructure, and establishment of processes for future on-boarding.

Page 41: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 41

User Protection and Productivity

Altiris™ IT Management Suite from Symantec™

Asset Management Suite (AMS) Assessment | Operate Consultants analyze AMS and perform a Services Strategy and Assessment, during which they associate the goals of an IT project with business objectives. In addition, consultants perform a health check to ensure that business value is being derived from the tool and they provide recommendations on how to move to an operational state with the desired capability and maturity level. Asset Management Suite (AMS) Deployment | Transform For new AMS installations, consultants provide installation and configuration support and make AMS recommendations that are specific to the unique needs of the customer. Consultants partner with the customer to perform the installation of Asset Management Suite. Asset Management Suite (AMS) Migration | Transform With the AMS Migration service, consultants perform and validate a risk-free migration. Similar to performing an installation, migrating from one systems management product to another requires substantial know-how and product knowledge. Consultants have performed numerous migrations and are familiar with several competitor products, which ensures a successful low-risk migration to Asset Management Suite. Asset Management Suite (AMS) Upgrade | Transform The AMS Upgrade service provides customers with assistance in planning and completing the upgrade process for AMS. Customers receive a detailed breakdown of the upgrade process and related tasks. Consultants have performed numerous successful upgrades, while preserving CMDB and legacy processes. Client Management Suite (CMS) Assessment | Operate The CMS Assessment offering is a consulting engagement that combines a technical and business review to assess the current state of the CMS environment; review the alignment of the environment with business requirements and best practices; and recommend changes to ensure that alignment. Consultants perform a health check to ensure that business value is being derived from CMS and they provide recommendations to move to an operational state with the desired capability and maturity level. Client Management Suite (CMS) Implementation | Transform The CMS Implementation offering is a consulting engagement that provides customers with an assessment of their current environment and applicable IT, business, and technical requirements. Consultants design and configure a solution based on the identified business drivers, and provide a pilot implementation of Client Management Suite (CMS) that includes next-step recommendations. This service also includes knowledge transfer to customer staff on the solution’s key configurations and design concepts, as well as operational standards and key maintenance routines. Client Management Suite (CMS) Upgrade | Transform The CMS Upgrade offering is a consulting engagement that includes the re-evaluation and assessment of business drivers, technical requirements, and the existing CMS implementation; specification and planning for the upgrade to the new version of CMS; pilot testing to validate the migration plan and solution design; and knowledge transfer throughout the engagement. Consultants have performed numerous upgrades while preserving CMDB and legacy processes.

Client Management Suite (CMS) Design and Pilot | Design The CMS Design and Pilot service is intended to fast-track customers to adopt the Altiris Client Management Solution by providing requirements validation workshops and design, architecture, and pilot deployments. This enables customers with a large installation base to perform a self-deployment using the knowledge acquired during the pilot. The customer benefits from the delivery methodology, which maximizes their experience with the solution. CMS and ServiceDesk Design and Pilot | Design The CMS and ServiceDesk Design and Pilot service is intended to fast-track customers to adopt the Altiris Client Management and ServiceDesk Solutions by providing requirements validation workshops and design, architecture, and pilot deployments. This enables customers with a large installation base to perform a self-deployment using the knowledge acquired during the pilot. The customer benefits from the delivery methodology, which maximizes their experience with the solution.

Page 42: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 42

CMS, AMS, and ServiceDesk Design and Pilot | Design The CMS, AMS, and ServiceDesk Design and Pilot service is intended to fast-track customers to adopt the Altiris Client Management, Asset Management, and ServiceDesk Solutions by providing requirements validation workshops and design, architecture, and pilot deployments. This enables customers with a large installation base to perform a self-deployment using the knowledge acquired during the pilot. The customer benefits from the delivery methodology, which maximizes their experience with the solution. ITMS (CMS, AMS) Design and Pilot | Design The ITMS (CMS, AMS) Design and Pilot service is intended to fast-track customers to adopt the Client Management and Asset Management Solutions by providing requirements validation workshops and design, architecture, and pilot deployments. This enables customers with a large installation base to perform a self-deployment using the knowledge acquired during the pilot. The customer benefits from the delivery methodology, which maximizes their experience with the solution. ServiceDesk Design and Pilot | Design The ServiceDesk Design and Pilot service is intended to fast-track customers to adopt the Altiris ServiceDesk Solution by providing requirements validation workshops and design, architecture, and pilot deployments. This enables customers with a large installation base to perform a self-deployment using the knowledge acquired during the pilot. The customer benefits from the delivery methodology, which maximizes their experience with the solution. Server Management Solution (SMS) Design and Pilot | Design The Server Management Solution (SMS) Design and Pilot service is intended to fast-track customers to adopt the Altiris Server Management Solution by providing requirements validation workshops and design, architecture, and pilot deployments. This enables customers with a large installation base to perform a self-deployment using the knowledge acquired during the pilot. The customer benefits from the delivery methodology, which maximizes their experience with the solution.

BYOD/BYOA

BYOD/BYOA Advisory Program | ALL

This advisory program was developed to facilitate wide-ranging discussions about the customer’s BYOD/BYOA as well as endpoint management strategy and polices. It provides comprehensive recommendations and action items regarding BYOD/BYOA, which consist of technology, process, awareness, and strategy domains.

Endpoint Encryption

Endpoint Encryption Management Design | Design Endpoint Encryption Management Design is offered as a service for small to medium businesses and large enterprises. Design configuration parameters are provided based on the customer's policy needs, and placement of infrastructure. Endpoint Encryption Management Deployment | Transform Endpoint Encryption Management Deployment is offered as a service for small to medium businesses and large enterprises. Design configuration parameters are provided based on the customer's policy needs, and placement of infrastructure. In addition, consultants perform staging, testing, agent validation, and policy deployment to ensure minimal impact to the operational abilities of the customer’s environment. Endpoint Encryption Process Enablement for Enterprises | ALL The Endpoint Encryption Process Enablement for Enterprises advisory service provides procedural requirements for embarking on a data protection program using device and information encryption. Consultants identify sensitive data, protect it, and define integration points and outcomes to be achieved using the technology components.

Endpoint Security

Endpoint Security Management Advisory Service | Operate The Endpoint Security Management Advisory Service is a value-added offering for large enterprises with significant detection or infection noise on endpoints. This service recommends policy and configuration changes aimed at bringing endpoint security management to a manageable level.

Page 43: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 43

Endpoint Security Management Enablement | Design Endpoint Security Management Enablement is offered as a service for very large enterprise or government engagements only. Consultants structure the placement of components and configuration parameters based on the customer's policy needs. Endpoint Security Management Upgrade | Transform Endpoint Security Management Upgrade is offered as a service for very large enterprise or government engagements only. Consultants structure the upgrade to ensure minimal impact to the operational abilities of the existing deployed solution.

Symantec App Center

Symantec App Center Design and Pilot | Design The Symantec App Center Design and Pilot service is intended to fast-track customers to adopt the App Center solution by providing requirements validation workshops and design, architecture, and pilot deployments. This enables customers with a large installation base to perform a self-deployment using the knowledge acquired during the pilot. The customer benefits from the delivery methodology, which maximizes their experience with the solution.

Symantec Mobile Management

Symantec Mobile Management and App Center Design and Pilot | Design The Symantec Mobile Management and App Center Design and Pilot service is intended to fast-track customers to adopt the Mobile Management and App Center solution by providing requirements validation workshops and design, architecture, and pilot deployments. This enables customers with a large installation base to perform a self-deployment using the knowledge acquired during the pilot. The customer benefits from the delivery methodology, which maximizes their experience with the solution. Symantec Mobile Management and Mobile Security Design and Pilot | Design The Symantec Mobile Management and Mobile Security Design and Pilot service is intended to fast-track customers to adopt the Mobile Management and Mobile Security solution by providing requirements validation workshops and design, architecture, and pilot deployments. This enables customers with a large installation base to perform a self-deployment using the knowledge acquired during the pilot. The customer benefits from the delivery methodology, which maximizes their experience with the solution. Symantec Mobile Management Design and Pilot | Design The Symantec Mobile Management Design and Pilot service is intended to fast-track customers to adopt the Mobile Device Management solution by providing requirements validation workshops and design, architecture, and pilot deployments. This enables customers with a large installation base to perform a self-deployment using the knowledge acquired during the pilot. The customer benefits from the delivery methodology, which maximizes their experience with the solution. Symantec Mobile Management Suite Design and Pilot | Design The Symantec Mobile Management Suite Design and Pilot service is intended to fast-track customers to adopt the Mobile Management, App Center, and Mobile Security solutions by providing requirements validation workshops and design, architecture, and pilot deployments. This enables customers with a large installation base to perform a self-deployment using the knowledge acquired during the pilot. The customer benefits from the delivery methodology, which maximizes their experience with the solution. Symantec Mobile Security Design and Pilot | Design The Symantec Mobile Security Design and Pilot service is intended to fast-track customers to adopt the Mobile Security solution by providing requirements validation workshops and design, architecture, and pilot deployments. This enables customers with a large installation base to perform a self-deployment using the knowledge acquired during the pilot. The customer benefits from the delivery methodology, which maximizes their experience with the solution.

Page 44: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 44

APJ-Greater China Region (GCR)-Specific Offerings

Information Management

Symantec Enterprise Vault™ (EV)

Enterprise Vault / eDiscovery – Analysis and Implementation | Transform With the Enterprise Vault / eDiscovery – Analysis and Implementation offering, consultants perform the following tasks: project preparation and data gathering; presenting a Sizing Design Workshop for mailbox archiving and PST migration; review of server sizing; review of Operating System, Exchange and Network Architecture; connecting and creating storage space; EV server installation and configuration; verification of mailbox archiving and PST migration; enabling users for mailbox archive; PST migration; enabling EV journaling (optional); assisting the customer to enable Exchange Journaling; enabling EV Journaling to journal one mail store; and Discovery accelerator installation (optional).

Clearwell eDiscovery Platform

Clearwell System Planning, Installation, and Configuration Services | ALL The Clearwell System Planning, Installation, and Configuration Services offering provides planning and implementation of the Clearwell eDiscovery Platform within the customer’s existing IT infrastructure, customization of the Clearwell eDiscovery Platform to correspond with the customer’s specific IT environmental needs (server configuration, LDAP integration, A/V exemption configuration, etc.), testing and verification of Clearwell modules (Legal Hold Module, Identification and Collections Module, Processing Module, Analysis and Review Module). Clearwell eDiscovery Workflow Development Services | ALL The Clearwell eDiscovery Workflow Development Services offering provides Clearwell eDiscovery Workflow process development or redevelopment with key stakeholders in both the Legal and IT departments responsible for the various steps in the new business process. It also provides the definition and alignment of roles and responsibilities based on customer needs and industry or field standards; the identification of new processes and adjustments to existing processes required to use the new technology; consulting and staff augmentation regarding preservation, case creation, litigation holds, collections, data ingestion, processing, error remediation, review, and data export and production; and customer-specific workflow documentation that maps processes, owners, and responsibilities of jointly-defined (IT and Legal) corresponding workflows. Clearwell Case Management Services | ALL The Clearwell Case Management Services offering provides the creation of sample eDiscovery matter in Clearwell to ensure understanding of the Clearwell eDiscovery workflow, live matter consultations, the creation of Clearwell cases using customer-provided data, guidance and review of all decision points within Clearwell eDiscovery Workflow and Clearwell Platform, and general project management support as requested.

Backup and Disaster Recovery

Disaster Recovery Testing Support Service | ALL This Disaster Recovery Testing Support Service assists the customer with planning for and preparing their Disaster Recovery tests. Consultants also provide assurance during their DR tests. Backup Advisory Service With the Backup Advisory service, consultants assess backup requirements and the environment; propose a backup and archive management methodology based on data lifecycle management; design the backup service catalog, data classification mechanism, and backup management policy; design the backup audit process and integration with ITIL (Information Technology Infrastructure Library).

Storage Foundation High Availability (SFHA)

High Availability (HA) Cluster Analysis and Implementation | ALL With the High Availability Cluster Analysis and Implementation service, the consultant provides HA – System HA cluster solution design, implementation, failover testing, validation and procedure setup. In addition, the implementation is integrated with the Management console.

Page 45: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 45

Offsite clustering for Disaster Recovery (DR) | ALL With the Offsite clustering for Disaster Recovery service, consultants design a Global or Metro clustering solution and implement the solution and integrate it with the customer’s disaster recovery program (DRP) as a vital component. Consultants also perform testing and validation of the system fail over and recovery and participate in and provide guidance during disaster recovery drills. Storage Advisory Service The Symantec Storage Advisory Service provides an overview of the efficiency of a client's current storage environment and identifies ways to optimize their IT operations so that they can improve storage utilization, solve storage bottlenecks and achieve storage high availability. Consultants assess and optimize storage utilization, storage performance, I/O data flow, storage bottlenecks, and storage high availability. In addition, consultants design the storage service catalog, storage management policy, storage processes, and integration with ITIL.

Information Security

Control Compliance Suite (CCS)

Control Compliance Suite Assessment | Operate Introducing the CCS solution requires a thorough requirements definition and qualification process that must be passed before device on-boarding can begin. Consultants perform an audit of the target environment to identify devices, validate models and software versions against the CCS-supported products list, validate the device configuration against CCS baselines, validate existing controls and policies against Symantec best practices, and conduct proof of concept and scoping services. Control Compliance Vulnerability Discovery and Management | Design This service provides design, planning, and enablement of Vulnerability Management for the IT organization. Consultants perform asset discovery for vulnerability checking; vulnerability scanning setup; and vulnerability priority and categorization for remediation. Consultants also produce a report for management.

Critical System Protection (CSP)

Critical System Protection Health Check | Operate The Critical System Protection Health Check service provides expert assistance in evaluating the customer’s CSP implementation against current business requirements and industry standards. The goal of the Health Check is to provide options and recommendations for improving the security policies and alerting in the customer’s environment and to assist in the development and implementation of a risk-mitigation strategy. A detailed report that outlines issues found, with suggested recommendations, is provided. Critical System Protection Solution | Design With this service, consultants design, plan and enable the CSP solution. Consultants also design policies for the customer’s environment, tune policies to minimize false positive alerts, perform integration with the security incident management system, and generate reports.

Managed Security Service (MSS)

Managed Security Service On-Boarding Services | ALL The MSS On-Boarding service provides the customer with assistance in enabling Symantec MSS Services. Consultants set up the Log Collection Platform (LCP) and provide network configuration assistance. Managed Security Service Enablement | ALL The MSS Enablement service assists the customer with MSS on-boarding tasks. Consultants set up the Log Collect Platform (LCP). A resident consultant is available for MSS and remediation tasks. Mobile Security Assessment | Operate With the Mobile Security Assessment service, consultants assess mobile policies, guidelines, and standards, and provide recommendations. Consultants also provide recommendations for mobile app development; assess device management (BYOD) and app management; and perform mobile app (Android and iOS) penetration tests.

Page 46: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 46

Information Security Analysis, Architecture, and Operations

Customization of Checks in Standard Manager to Meet Enterprise Needs | ALL With this service, the consultant reviews the Standards and Checks that are set and maps them with specific or customer-requested standards for technical security checks. The consultant also creates a new Check template for scanning and sets new Checks in the agent policy for the next scan. Detailed Attack Investigation | ALL With the Detailed Attack Investigation service, consultants perform evidence collection, provide a procedure for evidence collection, and perform an analysis of the logs. Security Program Assessment for Enterprise | ALL This service provides an assessment of the maturity of the security level. Consultants produce a report and present the gaps between the desired level and current level. They also provide a security solution roadmap for immediate, mid-term and long-term actions. Security Operations Center (SOC) Integration | ALL The Security Operations Center Integration service integrates and documents the incident handling process with SOC. After six months, consultants perform a correlation rules review and an incident severity setup review. A resident consultant is available for security incident handling. Security Operations Center (SOC) Support and SOC Second-Level Analysis Services | ALL Security Operations Center Support and SOC Second-Level Analysis Services offering provides incident analysis support for SOC customers. Symantec Security Awareness | ALL The Symantec Security Awareness service provides a security awareness knowledge sharing session for users, IT security managers, and administrators. IT Control and Policy Mapping | ALL The IT Control and Policy Mapping service identifies security control statements and security policies, maps policies to control statements, and integrates the mapping in the dashboard. IT Security Control Policy Management | Design With the IT Security Control Policy Management service, consultants perform architecture design and enable the CCS framework. They also consolidate the customer’s policies and enable policy access. Malware Incident Response and Analysis Services | ALL With the Malware Incident Response and Analysis Services offering, consultants perform virus checking and Trojan horse analysis, considering a specific target attack or virus with both Symantec and non-Symantec products. Consultants also analyze logs, Microsoft Office documents, and Web pages, and perform virus sample analysis. The customer receives recommendations and mediation procedures. Vulnerability Assessment and Penetration Tests (Web) | ALL The Vulnerability Assessment and Penetration Tests service provides a vulnerability assessment on external or internal Web servers and penetration tests on external Web servers based on OWASP. The customer receives recommendations and management reports. Vulnerability Handling Process Design | Operate With the Vulnerability Handling Process Design service, consultants assess the current vulnerability management process, review the change management process, and design vulnerability remediation processes. A resident consultant is available for vulnerability remediation or operation tasks.

Page 47: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 47

Symantec Network Access Control (SNAC)

Symantec Network Access Control Assessment | Operate Organizations implement Symantec Network Access Control to provide an additional layer of network protection to enhance gateway and LAN-based security solutions by evaluating company-owned and guest endpoints to ensure they meet a predefined set of criteria before accessing critical network resources. The consulting team guides the customer through the assessment and health check, from start to finish. The SNAC Assessment service analyzes the performance, health, and risk of a deployed product and provides a number of suggested improvements required to bring the customer’s environment to operational standards. Symantec Network Access Control Deployment | Transform With the SNAC Deployment offering, consultants work with the customer to perform the installation and configuration of Symantec Network Access Control. Symantec Network Access Control Migration | Transform Migrating from one security product to another requires significant experience and product knowledge. Consultants have performed numerous migrations and are familiar with several competitor products to ensure a clean removal prior to implementing SNAC. Symantec Network Access Control Upgrade | Transform Consultants have performed numerous upgrades from installed releases of SNAC to the most recent version of SNAC. The consultants have the experience and knowledge to properly prepare the customer’s existing environment for the upgrade to SNAC.

Symantec Security Information Manager (SSIM)

SSIM Collector Development | ALL With the SSIM Collector Development service, consultants develop SSIM collectors that are not in the support list, collect logs from the customer for SSIM log collection, test and QA the collector, and implement the collector. SSIM Solution | Design With the SSIM Solution service, consultants create an architecture design considering geographic location, function, and operation process criteria. They enable the SSIM solution for the customer’s environment, design SIM correlation rules, and perform the alert severity setup.

Symantec Messaging Gateway (SMG)

Symantec Messaging Gateway Implementation | Design With the Symantec Messaging Gateway Implementation service, consultants create an architecture design for SMG and implement the solution. Consultants set up SMG content filters and anti-spam and anti-virus policy settings. In addition, consultants set up LiveUpdate and report generation.

Symantec Web Gateway (SWG)

Symantec Web Gateway Implementation | Design With the Symantec Web Gateway Implementation service, consultants create an architecture design (inline, proxy or inline and proxy) for SWG and implement the solution. Consultants perform Web gateway security setup and configuration, including URL filtering, application controls, malware content scanning, report generation, and integration with DLP.

Validation and Identity Protection (VIP)

User Validation and Identity Protection | Operate With the User Validation and Identity Protection service, consultants perform an assessment of the customer’s environment, policies, and group structure. In addition, consultants define access control for user groups, implement the solution, and test and verify the solution.

Page 48: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 48

User Protection and Productivity

Altiris™ IT Management Suite from Symantec™

Asset Management Suite (AMS) Assessment | Operate With the Asset Management Suite Assessment service, consultants analyze AMS and perform a Services Strategy and Assessment, during which they associate the goals of an IT project with business objectives. In addition, consultants perform a health check to ensure that business value is being derived from the tool and they provide recommendations on how to move to an operational state with the desired capability and maturity level. Asset Management Suite (AMS) Deployment | Transform For new AMS installations, consultants provide installation and configuration support and make AMS recommendations that are specific to the unique needs of the customer. With the Asset Management Suite Deployment service, consultants work with the customer to perform the installation and configuration of AMS. Asset Management Suite (AMS) Migration | Transform With the Asset Management Suite Migration service, consultants perform and validate a risk-free migration. Similar to performing an installation, migrating from one systems management product to another requires substantial know-how and product knowledge. Consultants have performed numerous migrations and are familiar with several competitor products, which ensures a successful low-risk migration to Asset Management Suite. Asset Management Suite (AMS) Upgrade | Transform The Asset Management Suite Upgrade service provides customers with assistance in planning and completing the upgrade process for AMS. Customers receive a detailed breakdown of the upgrade process and related tasks. Consultants have performed numerous successful upgrades, while preserving CMDB and legacy processes. Client Management Suite (CMS) Assessment | Operate The Client Management Suite Assessment service is a consulting engagement that combines a technical and business review to assess the current state of the CMS environment, review the alignment of the environment with business requirements, and recommend changes to ensure that alignment. Consultants perform a health check to ensure that business value is being derived from CMS and they provide recommendations to move to an operational state with the desired capability and maturity level. Client Management Suite (CMS) Implementation | Transform The Client Management Suite Implementation service is a consulting engagement that provides customers with an assessment of their current environment and applicable IT, business, and technical requirements. Consultants design and configure a solution based on the identified business drivers, and provide a pilot implementation of CMS that includes next-step recommendations. This service also includes knowledge transfer to customer staff on the solution’s key configurations and design concepts, as well as operational standards and key maintenance routines. Client Management Suite (CMS) Upgrade | Transform The Client Management Suite Upgrade service is a consulting engagement that includes the re-evaluation and assessment of business drivers, technical requirements, and the existing CMS implementation; specification and planning for the upgrade to the new version of CMS; pilot testing to validate the migration plan and solution design; and knowledge transfer throughout the engagement. Consultants have performed numerous upgrades while preserving CMDB and legacy processes.

Mobile Security

Enterprise Mobility Architecture Design and Solution Implementation | Transform With the Enterprise Mobility Architecture Design and Solution Implementation service, consultants collect Mobile Application Management (MAM) and Mobile Device Management (MDM) requirements, perform MAM and MDM planning, and implement the solution. Consultants set up policies, configure and set up controls on MDM and MAM, and perform an App Store setup. In addition, consultants perform Active Directory integration, DLP for mobile integration (if a DLP solution exists), PKI integration, and assist with mobile phone profile settings.

Page 49: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 49

Symantec Endpoint Protection (SEP)

Symantec Endpoint Protection Solution Implementation | Transform With the Symantec Endpoint Protection Solution Implementation service, consultants collect customer information and requirements and perform an architecture design. Consultants set up LiveUpdate, SEP policies, and report customization. In addition, they integrate SEP with SIM, if it is installed.

Symantec Endpoint Encryption (SEE)

Symantec Endpoint Encryption Solution Implementation | Operate With the Symantec Endpoint Encryption Solution Implementation service, consultants perform an assessment of the customer’s environment, policies, and group structure. They define access control for management servers, review the customer’s security policy and procedures affecting systems and application security, and review the customer’s installation methods and suitability for initial installation. In addition, consultants perform server and policy design, required account and group provisioning, SEE server installation, encryption configuration and policy tuning, and customer package preparation and installation.

Symantec App Center

Symantec App Center Assessment | Operate The Symantec App Center Assessment service provides customers with a thorough understanding of how to manage mobile applications by delivering an in-depth assessment of requirements, aligning requirements to corresponding mobile platforms, and designing and implementing mobile application management practices. Consultants are available to guide the customer through the assessment and health check, from start to finish. This service analyzes the performance, health, and risk of a deployed product and suggests improvements required to bring the customer’s environment to operational standards. Symantec App Center Deployment | Transform With the Symantec App Center Deployment service, consultants work with the customer to perform the installation and configuration of Symantec App Center. Symantec App Center Migration | Transform With the Symantec App Center migration service, consultants perform and validate a risk-free migration. Migrating from one system management product to another requires substantial know-how and product knowledge. Consultants have substantial experience in performing migrations and are familiar with a broad range of non-Symantec products, which reduces risk and ensures a successful migration to App Center Solution. Symantec App Center Upgrade | Transform The Symantec App Center Upgrade service provides customers with assistance in planning and completing the upgrade process. Customers receive a detailed breakdown of the upgrade process. Consultants have performed numerous successful upgrades, while preserving developed apps, policies, and organizational structure.

Page 50: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 50

APJ – Japan Region-Specific Offerings

Information Security

Information Security Advisory Services

Policy Development The Policy Development service investigates the customer's current security standards and seeks areas for improvement. Consultants create documents or update the customer's existing documents, as required. Security Audit The Security Audit service audits the customer's security program based on industry standards, the customer's security policy, and any other aspect the customer has requested. Consultants perform the service, and address any disjunctions along with the recommended countermeasures.

Information Security Assessment Services

Web Application/Network Assessment The Web Application/Network Assessment service performs a technical assessment of the customer's Web applications and IP addresses. Unlike tool-based assessment services, consultants analyze the applications and hosts to detect high-risk vulnerabilities within them. Consultants provide the vulnerability detection methodology, the attack scenario and business impact, and the recommended countermeasures. Mobile Application Assessment The Mobile Application Assessment service performs a technical assessment of the customer's mobile applications and corresponding servers. Consultants reverse-engineer the applications in order to detect high-risk vulnerabilities that may have a huge impact when exploited by hackers. Consultants provide the vulnerability detection methodology, the attack scenario and business impact, and the recommended countermeasures. Currently, Android and iOS platforms are supported. Custom Assessment The Custom Assessment service assesses the customer's unique system and requirements. Consultants first define the attack scenario and the corresponding risks. Consultants then perform attacks as a desk check or as a real attack. Finally, consultants provide the vulnerability detection methodology, the attack scenario and business impact, and the recommended countermeasures.

User Protection and Productivity

Altiris™ IT Management Suite from Symantec™

Asset Management Suite (AMS) Assessment | Operate With the Asset Management Suite Assessment service, consultants analyze AMS and perform a Services Strategy and Assessment, during which they associate the goals of an IT project with business objectives. In addition, consultants perform a health check to ensure that business value is being derived from the tool and they provide recommendations on how to move to an operational state with the desired capability and maturity level. Asset Management Suite (AMS) Deployment | Transform For new AMS installations, consultants provide installation and configuration support and make AMS recommendations that are specific to the unique needs of the customer. With the Asset Management Suite Deployment service, consultants work with the customer to perform the installation and configuration of AMS. Asset Management Suite (AMS) Migration | Transform With the Asset Management Suite Migration service, consultants perform and validate a risk-free migration. Similar to performing an installation, migrating from one systems management product to another requires substantial know-how and product knowledge. Consultants have performed numerous migrations and are familiar with several competitor products, which ensures a successful low-risk migration to Asset Management Suite.

Page 51: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 51

Asset Management Suite (AMS) Upgrade | Transform The Asset Management Suite Upgrade service provides customers with assistance in planning and completing the upgrade process for AMS. Customers receive a detailed breakdown of the upgrade process and related tasks. Consultants have performed numerous successful upgrades, while preserving CMDB and legacy processes. Client Management Suite (CMS) Assessment | Operate The Client Management Suite Assessment service is a consulting engagement that combines a technical and business review to assess the current state of the CMS environment, review the alignment of the environment with business requirements, and recommend changes to ensure that alignment. Consultants perform a health check to ensure that business value is being derived from CMS and they provide recommendations to move to an operational state with the desired capability and maturity level. Client Management Suite (CMS) Implementation | Transform The Client Management Suite Implementation service is a consulting engagement that provides customers with an assessment of their current environment and applicable IT, business, and technical requirements. Consultants design and configure a solution based on the identified business drivers, and provide a pilot implementation of CMS that includes next-step recommendations. This service also includes knowledge transfer to customer staff on the solution’s key configurations and design concepts, as well as operational standards and key maintenance routines. Client Management Suite (CMS) Upgrade | Transform The Client Management Suite Upgrade service is a consulting engagement that includes the re-evaluation and assessment of business drivers, technical requirements, and the existing CMS implementation; specification and planning for the upgrade to the new version of CMS; pilot testing to validate the migration plan and solution design; and knowledge transfer throughout the engagement. Consultants have performed numerous upgrades while preserving CMDB and legacy processes.

Page 52: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 52

EMEA Region Specific Offerings

Information Management

Symantec NetBackup™ Appliance

Appliance Firmware Upgrade | Transform With the Appliance Firmware Upgrade service, customers receive on-site support for a major upgrade to the appliance firmware.

Cloud Readiness

Cloud Readiness Assessment | Operate The Cloud Readiness Assessment service performs a gap analysis of the customer’s current architectures versus the customer’s cloud-based strategic vision.

Deduplication Assessment

Deduplication Assessment | Operate The Deduplication Assessment service reviews an existing backup environment to assess the potential impact of introducing deduplication technology.

Information Storage Assessment

Information Storage Assessment (CCS/DI) | ALL The Information Storage Assessment service provides an analysis of server data consumption, array utilization and user file creation and usage. Consultants perform a comprehensive assessment that analyzes block-based and file-based data stores.

IT Disaster Recovery Program

IT Disaster Recovery Program | ALL The IT Disaster Recovery Program service performs a gap analysis of the customer’s understanding of IT changes to meet IT continuity requirements.

Next Generation Data Protection Assessment

Next Generation Data Protection Assessment | Operate The Next Generation Data Protection Assessment service provides a clear insight into the effectiveness of an existing backup and recovery service. Based on qualitative and quantitative information, it delivers a broad and balanced view, from both process and technology perspectives.

Storage Assessment

Storage Assessment (VOMA) | Operate The Storage Assessment service provides an analysis of server data consumption, array utilization and user file creation and usage. Consultants perform a comprehensive assessment that analyzes block-based and file-based data stores.

Storage Foundation High Availability (SFHA)

VCS Custom Agent | Transform The VCS Custom Agent service develops an agent to address specific application requirements.

Page 53: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 53

Information Security

Control Compliance Suite (CCS)

Control Compliance Suite Assessment | Operate Introducing the CCS solution requires a thorough requirements definition and qualification process that must be passed before device on-boarding can begin. Consultants perform an audit of the target environment to identify devices, validate models and software versions against the CCS-supported products list, validate the device configuration against CCS baselines, validate existing controls and policies against Symantec best practices, and conduct proof of concept and scoping services.

Critical System Protection (CSP)

Critical System Protection Assessment | Operate Leading organizations leverage Symantec Critical System Protection (CSP) to secure their physical and virtual data centers. This service provides expert assistance in evaluating the customer’s CSP implementation against current business requirements and industry standards. The health check provides options and recommendations for improving the security policies and alerting in the customer’s environment and assists in the development and implementation of a risk-mitigation strategy. The customer receives a detailed report that outlines any issues that were found, with recommendations.

Data Loss Prevention (DLP)

DLP Risk Assessment | Operate The DLP Risk Assessment service identifies areas of very high, high, medium, and low risk of data across endpoint, network, and storage systems by data type, based on an evaluation of potential severity and actual frequency of data loss. Consultants determine whether the customer has correctly provisioned their security infrastructure using their existing solutions and highlight any weaknesses or gaps in the customer’s infrastructure. Consultants create and implement data security policies to discover, monitor, and protect confidential data wherever it is stored or used.

Inform Risk Assessment

Inform Risk Assessment | Operate Inform Risk Assessment is an information assurance cost/risk planning program that can assist customers in their business planning process.

Malicious Activity Assessment

Malicious Activity Assessment | Operate The Malicious Activity Assessment service assesses the volume of malicious activity in the network and the impact to the organization. Consultants provide the data needed to assess the risk exposure and identify areas for improved protection.

Security Analysis, Architecture, and Operations

Security Architecture Review | ALL The Security Architecture Review service performs a gap analysis of the customer’s enterprise security deployment against Symantec standards and guidelines. Security Operations Center (SOC) Assessment and Design| ALL The Security Operations Center Assessment and Design service provides a gap analysis of the customer’s Security Operations Center against Symantec’s standards and guidelines. Consultants perform a technical and organizational analysis of SOC Security Services levels. Consultants evaluate the requirements and controls, in order to measure the current level of security according to the CMM (Capability Maturity Model) and perform a gap analysis against the Symantec SOC MS model. In addition, consultants define a security roadmap, which improves the SOC services and prioritizes the security investments, and they provide an executive summary that is useful for top management.

Page 54: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 54

User Protection and Productivity

Altiris™ IT Management Suite from Symantec™

Asset Management Suite (AMS) Assessment | Operate With the Asset Management Suite Assessment service, consultants analyze AMS and perform a Services Strategy and Assessment, during which they associate the goals of an IT project with business objectives. In addition, consultants perform a health check to ensure that business value is being derived from the tool and they provide recommendations on how to move to an operational state with the desired capability and maturity level. Asset Management Suite (AMS) Deployment | Transform For new AMS installations, consultants provide installation and configuration support and make AMS recommendations that are specific to the unique needs of the customer. With the Asset Management Suite Deployment service, consultants work with the customer to perform the installation and configuration of AMS. Asset Management Suite (AMS) Migration | Transform With the Asset Management Suite Migration service, consultants perform and validate a risk-free migration. Similar to performing an installation, migrating from one systems management product to another requires substantial know-how and product knowledge. Consultants have performed numerous migrations and are familiar with several competitor products, which ensures a successful low-risk migration to Asset Management Suite. Asset Management Suite (AMS) Upgrade | Transform The Asset Management Suite Upgrade service provides customers with assistance in planning and completing the upgrade process for AMS. Customers receive a detailed breakdown of the upgrade process and related tasks. Consultants have performed numerous successful upgrades, while preserving CMDB and legacy processes. Client Management Suite (CMS) Assessment | Operate The Client Management Suite Assessment service is a consulting engagement that combines a technical and business review to assess the current state of the CMS environment, review the alignment of the environment with business requirements, and recommend changes to ensure that alignment. Consultants perform a health check to ensure that business value is being derived from CMS and they provide recommendations to move to an operational state with the desired capability and maturity level. Client Management Suite (CMS) Implementation | Transform The Client Management Suite Implementation service is a consulting engagement that provides customers with an assessment of their current environment and applicable IT, business, and technical requirements. Consultants design and configure a solution based on the identified business drivers, and provide a pilot implementation of CMS that includes next-step recommendations. This service also includes knowledge transfer to customer staff on the solution’s key configurations and design concepts, as well as operational standards and key maintenance routines. Client Management Suite (CMS) Upgrade | Transform The CMS Upgrade service offering is a consultative engagement that includes: Re-evaluation/Assessment of Business drivers, Technical requirements, and existing CMS implementation. Specification and plan for upgrading to new version of CMS; Pilot testing to validate migration plan and solution design; and knowledge transfer throughout the engagement. Consulting services has performed numerous successful upgrades while preserving CMDB and legacy processes.

Mobile Security Assessment

Mobile Security Assessment | Operate The Mobile Security Assessment service provides a holistic approach to governance, intelligence, and infrastructure – across 15 core elements that provide a 360

o view of mobile security capabilities. Consultants identify security issues within application source code

using both automated and manual reviews. This service focuses on identifying issues with authentication and authorization, data validation, session management, encryption, auditing and logging, and business logic. It can be performed in conjunction with a penetration assessment to provide a deeper view of potential vulnerabilities and is usually conducted during the development or testing phases of the software lifecycle.

Page 55: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 55

Other Offerings

Archive Assessment

Archive Assessment | ALL The Archive Assessment service determines the projected benefits of introducing archiving and eDiscovery as part of the information lifecycle management.

Baseline IT Continuity

Baseline IT Continuity Assessment | ALL The Baseline IT Continuity Assessment service is a rapid workshop or interview and tool-based review of the current IT Continuity (ITC) capabilities that helps customers quickly determine whether their current HA and DR technology and supporting processes will operate as designed in the event of a failure. It also determines whether customers have over-provisioned recovery infrastructure and provides quantitative and qualitative data to determine how cost and effort may be taken out of the existing HA and DR infrastructure while still mitigating the risks of unplanned downtime.

Future State Architecture

Future State Architecture | Design The Future State Architecture service provides a gap analysis of the customer’s current architectures against the customer’s strategic vision. This is a structured services engagement that determines a customer’s data centre “future state” requirements and vision. Consultants review and analyze the customer’s current (tactical) and future (strategic) business requirements, capture the current state data centre architecture, and deliver a future state vision. Customers receive a supporting roadmap to achieve the vision.

Storage Supply Chain Assessment

Storage Supply Chain Assessment (CCS + DPMA) | ALL The Storage Supply Chain Assessment service leverages Command Central Storage combined with operational assessment workshops to identify opportunities to optimize the customer’s storage and data protection infrastructure.

SymRA for Business Critical Virtualization

SymRA for Business Critical Virtualization | ALL SymRA for Business Critical Virtualization facilitates faster deployments of Microsoft® applications on VMware® virtualization server platforms, such as Microsoft SQL Server, Exchange, and SharePoint. These specialized solutions enable organizations to meet the demands for application performance, availability, security, and cost with server virtualization solutions. These solutions follow industry-standard enterprise architecture development methods, as defined by The Open Group Architecture Framework (TOGAF), to accelerate adoption into your production environment. Documented best practices help increase the business value and return on investment from Symantec virtualization server software to effectively accelerate next phase deployments of virtualization initiatives.

Vulnerability Assessment

Vulnerability Assessment | Operate The Vulnerability Assessment service provides a gap analysis of the customer’s existing VA processes and tools compared to Symantec standards and guidelines.

Page 56: Symantec Technical Services · Symantec Technical Services strives to provide services for anticipated customer needs. If you do not see a service offering for a specific product

© 2013 Symantec Corporation. All rights reserved. 56

About Symantec

Symantec is a global leader in providing security; storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored.

For specific country offices and contact numbers, please visit our website.

Symantec Corporation

World Headquarters

350 Ellis Street Mountain View, CA 94043 USA (650) 527-8000 www.symantec.com

Copyright © 2013 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. XX/09