Symantec TM Endpoint Management Suite Customer Presentation Manage. Secure. Recover.

31
Symantec TM Endpoint Management Suite Customer Presentation Manage. Secure. Recover.
  • date post

    19-Dec-2015
  • Category

    Documents

  • view

    235
  • download

    0

Transcript of Symantec TM Endpoint Management Suite Customer Presentation Manage. Secure. Recover.

SymantecTM Endpoint Management Suite Customer PresentationManage. Secure. Recover.

2

Agenda

Today’s IT Challenges11

Symantec’s Collaborative Architecture

SymantecTM Endpoint Management Suite

Connecting Symantec Technologies Today

Q & A

22

33

44

55

3

NaturalDisasters

InfrastructureFailures

HumanError

MaliciousThreats

Today’s IT Challenges

Information

Traditional Protection isn’t Good Enough Anymore

4

Source: SearchSecurity.TechTarget.com

Evil geniuses who attack us with zero-day attacks < 5%

System configuration represents 2/3 of all system weaknesses

65%

30% can be resolved through patch management

30%

5%

A Secure Endpoint is a Well-managed Endpoint

5

95%Security problems can be solved by endpoint management

John Pescatore, Vice President, Gartner Inc.Source: http://searchsecurity.techtarget.com/news/interview/0,289202,sid14_gci905234,00.html

John Pescatore, Vice President, Gartner Inc.Source: http://searchsecurity.techtarget.com/news/interview/0,289202,sid14_gci905234,00.html

Symantec’s Collaborative Architecture

7

Open Collaborative Architecture: Connecting People and Technology

Backup & Recovery

Service Desk

Endpoint Security

Patch Management

Workflow Execution

Monitor statusClose incidentsDistribute patchesObtain change control approvalUpdate signaturesKick-off backup processTest patchesNotify risk management team

Comprehensive Network DiscoveryCommon Software Delivery ProcessCentralized ReportingRemote Administration

Configuration Management Database (CMDB)

Integration on Altiris Platform

8

Driving to Convergence

Solution

• Native integration• Single view of compliance• Consolidated status reporting• Pre-built workflow processes

CMDB

Situation

• Duplication of tasks • Gaps require manual processes• Multiple consoles and agents • Various data repositories• Overlapping policies

Symantec Leads the Way

July 2007 “The Forrester Wave™: Client Management Suites, Q3 2007”

Symantec’s acquisition of Altiris in Q2 2007 illustrates the impending requirements of integrated security and management—and that is exactly what Symantec delivers.

9Symantec Confidential

WeakWeak StrategyStrategy StrongStrong

CurrentofferingCurrentoffering

StrongStrong

Market presenceMarket presence

BMC SoftwareBMC Software

IBMIBM

MicrosoftMicrosoft

NovellNovell

LANDeskLANDeskCACA HPHP

Full vendor participationFull vendor participation

ContendersContendersStrong

PerformersStrong

Performers LeadersLeadersRiskyBets

RiskyBets

SymantecSymantec

Natalie LambertSenior Analyst, Forrester

Symantec Offers the Most Mature Client Management SuiteSymantec Offers the Most Mature Client Management Suite

10

IntroducingEndpoint Management Suite

• Inventory and discovery

• Imaging and provisioning

• Software delivery and patch management

• Remote administration

MANAGE

#1 in worldwide software distribution (IDC 2006)

Leader in client management suites (Forrester 2007)

Altiris® Client Management Suite™ 6.0

• Local and offsite backup

• File and folder restore

• Complete system recovery

RECOVER

#1 in worldwide data protection and recovery (IDC 2006)

Leader enterprise backup/recovery software (Gartner 2007)

Backup Exec™ System Recovery 8

• Antivirus and antispyware protection

• Firewall

• Intrusion prevention

• Application and device control

SECURE

#1 in worldwide secure content and threat management (IDC 2006)

Leader in endpoint protection platforms (Gartner 2007)

Symantec™ Endpoint Protection 11.0

Manage.

How are you managing your Windows® desktops and laptops?

IT Lifecycle Management

12

Endpoint Security &

Management• Retirement• Procurement• Staging• Production

Transition &

MigrationProblem Resolution

Monitor &Track

BusinessContinuity

Patch Management

Asset Identification

Contract Management

Deployment & Configuration

Application Packaging & QA

Software Distribution & Virtualization

Endpoint Security

Altiris® Client Management Suite™ 6.0

13

Results

Inventory &Discovery

Inventory &Discovery

Imaging & ProvisioningImaging &

Provisioning

Software Distribution & Patch ManagementSoftware Distribution & Patch Management

Altiris Client Management

Suite 6.0

14

Key Ingredients for Management

Inventory and Discovery

Populates CMDB with comprehensive data for discoverable assets

Aggregates data across environment in real time

Assists with software license management

Helps forecast growth requirements

Inventory &Discovery

Inventory &Discovery

Results

GM Brazil > Reduced annual software license expenses by 44 percent within 45 days, equaling a 1,000 percent ROI

Reed Smith > Reduced inventory time from one month to minutes

GM Brazil > Reduced annual software license expenses by 44 percent within 45 days, equaling a 1,000 percent ROI

Reed Smith > Reduced inventory time from one month to minutes

Key Ingredients for Management

Imaging and Provisioning

Comprehensive deployment capabilities Image-based or scripted OS install Ongoing updates/re-provisioning Tools for hands-free and PC user

personality migrations Facilitates implementation of

standardized desktop configurations Reduces risks associated with

desktop changes

Results

Triple S > Reduced migration time by 85 percent

U.S. Air Force > Responded to new hardware imaging requests in 88 percent less time

Triple S > Reduced migration time by 85 percent

U.S. Air Force > Responded to new hardware imaging requests in 88 percent less time

Inventory &Discovery

Inventory &Discovery

Imaging & ProvisioningImaging &

Provisioning

16

Key Ingredients for Management

Inventory &Discovery

Inventory &Discovery

Imaging & ProvisioningImaging &

Provisioning

Software Distribution & Patch ManagementSoftware Distribution & Patch Management

Software Distribution and Patch Management

Implements policy-based software management Distribute applications, updates,

code, files to target systems Proactively manage software updates to

minimize security risks Automates patch distribution with

one-click creation of collections and policies

Bandwidth-sensitive systems management for the mobile workforce and roaming worker

Results

Horizon > Improved software delivery success rate from 60 percent to 90+ percent

Edwards Lifesciences > Able to patch their 2,000 PCs in less than two hours

Horizon > Improved software delivery success rate from 60 percent to 90+ percent

Edwards Lifesciences > Able to patch their 2,000 PCs in less than two hours

Secure.

How are you protecting yourself from external threats?

Corporate Network is Continually Exposed

WirelessNetworks

WebApplications

Guests

Consultants

IPsec VPN

EmployeesWorking at Home

WANs& Extranets

SSL VPN

Internet Kiosks& Shared

Computers

19

Symantec Endpoint Protection 11.0

Antivirus & AntispywareAntivirus & Antispyware

FirewallFirewall

IntrusionPreventionIntrusion

Prevention

Device and Application Control

Device and Application Control

Reduced Cost,

Complexity & Risk Exposure

Increased Protection, Control &

Manageability

Results

Symantec Endpoint Protection 11.0

20

Key Ingredients for Endpoint Protection

20

Spyware, RootkitsSpyware, RootkitsViruses, Trojans, WormsViruses, Trojans, Worms

Antivirus

World’s leading antivirus solution Most (37) consecutive VB100 Awards

Antispyware

Best rootkit detection and removal VxMS = superior rootkit protection

Antivirus & AntispywareAntivirus & Antispyware

Source: Thompson Cyber Security Labs, August 2006

21

Key Ingredients for Endpoint Protection

Worms, SpywareWorms, Spyware

Firewall

Industry-leading endpoint firewall technology

Gartner Magic Quadrant “Leader” four consecutive years

Rules-based firewall can dynamically adjust port settings to block threats from spreading

Antivirus & AntispywareAntivirus & Antispyware

FirewallFirewall

22

Key Ingredients for Endpoint Protection

0-Day, Key Logging0-Day, Key Logging

Intrusion Prevention

Combines NIPS (network) and HIPS (host)

Generic Exploit Blocking (GEB)—One signature to proactively protect against all variants

Granular application access control TruScan™—Proactive threat scanning

technology; very low (0.0049%) false-positive rate

Detects 1,000 new threats per month that are not detected by leading antivirus engines

Antivirus & AntispywareAntivirus & Antispyware

FirewallFirewall

IntrusionPreventionIntrusion

Prevention

25M Installations25M Installations

Fewer than 50 false positives for every 1M PCs

Fewer than 50 false positives for every 1M PCs

Slurping, IP TheftSlurping, IP Theft

Key Ingredients for Endpoint Protection

Device and Application Control

Prevents data leakage Restrict Access to devices (USB keys,

backup drives) Whitelisting—Allow only “trusted”

applications to run

Device and Application Control

Device and Application Control

W32.SillyFDC

Targets removable memory sticks

Spreads by copying itself onto removable drives such as USB memory sticks

Automatically runs when the device is next connected to a computer

Antivirus & AntispywareAntivirus & Antispyware

FirewallFirewall

IntrusionPreventionIntrusion

Prevention

Recover.

How quickly can you recover from a loss or disaster?

The Cost of System Failure

• Sales transactions

• Manufacturing data

• Email and other business data

• Employee productivity

• Company reputation

25

What would you lose if a system crashed?What would you lose if a system crashed?

26

Symantec Backup Exec System Recovery 8 Desktop Edition

Local or OffsiteBackup

Local or OffsiteBackup

Complete System Recovery

Complete System Recovery

File or Folder Restore

File or Folder Restore

Symantec Backup ExecSystem Recovery 8

Reduced downtime and

data loss

Increased end-user

productivity

Results

27

Key Ingredients for Endpoint Recovery

Local or Offsite Backup

Create real-time, while-you-work recovery points of the entire system and save to any disk storage device

Supports full and incremental backups to save disk space and increase backup performance

Select from multiple compression options: none, standard, medium, or high

Select from multiple encryption options: 128-bit, 192-bit, or 256-bit AES

Automatically copy recovery points (backups) to a network share, FTP server, or external hard drive to enhance disaster recovery efforts

Intelligently and uniquely identifies and communicates to USB drives, successfully running backup jobs even if the drive letter for the device changes

Local or OffsiteBackup

Local or OffsiteBackup

Key Ingredients for Endpoint Protection

Complete System Recovery

Rapid recovery of entire systems, even to dissimilar hardware or virtual environments, breaks the barrier of incompatible storage controllers and hardware abstraction layers

Volumes can be resized during a restore, making hard-drive upgrades or full hardware migrations quick and easy

File or Folder Restore

Recovers individual files and folders in seconds from either recovery points or file/folder backups

Enables end-user recovery of files and folders via Google Desktop™ or Backup Exec Retrieve using a common Web-browser interface for fast and simple recovery, without IT intervention

Local or OffsiteBackup

Local or OffsiteBackup

Complete System Recovery

Complete System Recovery

File or Folder Restore

File or Folder Restore

29

Altiris Console Integration

• Centralized management of agents

• Centralized distribution of clients

• Create backup policies and apply to desired systems

• Leverage other components within the management framework

ThreatCon Integration

• Integrates with Symantec ThreatCon and DeepSight™ Threat Management System*

Connecting Symantec Technologies Today

* Only requires Internet connection. Does not require Symantec Endpoint Protection Manager

Symantec Endpoint Management Suite

Symantec continues to drive innovationthrough unique technology convergence and integration

Symantec continues to drive innovationthrough unique technology convergence and integration

Thank You!

Copyright © 2008 Symantec Corporation. All rights reserved.  Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries.  Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising.  All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law.  The information in this document is subject to change without notice.

31