Upload
maximiliano-salazar
View
4
Download
1
Embed Size (px)
Citation preview
SymantecTM Endpoint Management Suite Customer PresentationManage. Secure. Recover.
2
Agenda
Today’s IT Challenges11
Symantec’s Collaborative Architecture
SymantecTM Endpoint Management Suite
Connecting Symantec Technologies Today
Q & A
22
33
44
55
3
NaturalDisasters
InfrastructureFailures
HumanError
MaliciousThreats
Today’s IT Challenges
Information
Traditional Protection isn’t Good Enough Anymore
4
Source: SearchSecurity.TechTarget.com
Evil geniuses who attack us with zero-day attacks < 5%
System configuration represents 2/3 of all system weaknesses65%
30% can be resolved through patch management
30%
5%
A Secure Endpoint is a Well-managed Endpoint
5
95%Security problems can be solved by endpoint managementJohn Pescatore, Vice President, Gartner Inc.Source: http://searchsecurity.techtarget.com/news/interview/0,289202,sid14_gci905234,00.html
Symantec’s Collaborative Architecture
7
Open Collaborative Architecture: Connecting People and Technology
Backup & Recovery
Service Desk
Endpoint Security
Patch Management
Workflow Execution
Monitor statusClose incidentsDistribute patchesObtain change control approvalUpdate signaturesKick-off backup processTest patchesNotify risk management team
Comprehensive Network DiscoveryCommon Software Delivery ProcessCentralized ReportingRemote Administration
Configuration Management Database (CMDB)
Integration on Altiris Platform
8
Driving to Convergence
Solution
• Native integration• Single view of compliance• Consolidated status reporting• Pre-built workflow processes
CMDB
Situation
• Duplication of tasks • Gaps require manual processes• Multiple consoles and agents • Various data repositories• Overlapping policies
Symantec Leads the Way
July 2007 “The Forrester Wave™: Client Management Suites, Q3 2007”
Symantec’s acquisition of Altiris in Q2 2007 illustrates the impending requirements of integrated security and management—and that is exactly what Symantec delivers.
9Symantec Confidential
Weak Strategy Strong
Currentoffering
Strong
Market presence
BMC SoftwareIBM
Microsoft
Novell
LANDeskCA HP
Full vendor participation
ContendersStrong
Performers LeadersRiskyBets
Symantec
Natalie LambertSenior Analyst, Forrester
Symantec Offers the Most Mature Client Management Suite
10
IntroducingEndpoint Management Suite
• Inventory and discovery• Imaging and provisioning• Software delivery and
patch management• Remote administration
MANAGE
#1 in worldwide software distribution (IDC 2006)
Leader in client management suites (Forrester 2007)
Altiris® Client Management Suite™ 6.0
• Local and offsite backup• File and folder restore• Complete system recovery
RECOVER
#1 in worldwide data protection and recovery (IDC 2006)
Leader enterprise backup/recovery software (Gartner 2007)
Backup Exec™ System Recovery 8
• Antivirus and antispyware protection
• Firewall• Intrusion prevention• Application and device control
SECURE
#1 in worldwide secure content and threat management (IDC 2006)
Leader in endpoint protection platforms (Gartner 2007)
Symantec™ Endpoint Protection 11.0
Manage.
How are you managing your Windows® desktops and laptops?
IT Lifecycle Management
12
Endpoint Security &
Management• Retirement• Procurement• Staging• Production
Transition &
MigrationProblem Resolution
Monitor &Track
BusinessContinuity
Patch Management
Asset Identification
Contract Management
Deployment & Configuration
Application Packaging & QA
Software Distribution & Virtualization
Endpoint Security
Altiris® Client Management Suite™ 6.0
13
Results
Inventory &Discovery
Imaging & Provisioning
Software Distribution & Patch Management
Altiris Client Management
Suite 6.0
14
Key Ingredients for Management
Inventory and Discovery
Populates CMDB with comprehensive data for discoverable assets
Aggregates data across environment in real time
Assists with software license management
Helps forecast growth requirements
Inventory &Discovery
Results
GM Brazil > Reduced annual software license expenses by 44 percent within 45 days, equaling a 1,000 percent ROI
Reed Smith > Reduced inventory time from one month to minutes
Key Ingredients for Management
Imaging and Provisioning
Comprehensive deployment capabilities Image-based or scripted OS install Ongoing updates/re-provisioning Tools for hands-free and PC user
personality migrations Facilitates implementation of
standardized desktop configurations Reduces risks associated with
desktop changes
Results
Triple S > Reduced migration time by 85 percent
U.S. Air Force > Responded to new hardware imaging requests in 88 percent less time
Inventory &Discovery
Imaging & Provisioning
16
Key Ingredients for Management
Inventory &Discovery
Imaging & Provisioning
Software Distribution & Patch Management
Software Distribution and Patch Management
Implements policy-based software management Distribute applications, updates,
code, files to target systems Proactively manage software updates to
minimize security risks Automates patch distribution with
one-click creation of collections and policies
Bandwidth-sensitive systems management for the mobile workforce and roaming worker
Results Horizon > Improved software
delivery success rate from 60 percent to 90+ percent
Edwards Lifesciences > Able to patch their 2,000 PCs in less than two hours
Secure.
How are you protecting yourself from external threats?
Corporate Network is Continually Exposed
WirelessNetworks
WebApplications
Guests
Consultants
IPsec VPN
EmployeesWorking at Home
WANs& Extranets
SSL VPN
Internet Kiosks& Shared
Computers
19
Symantec Endpoint Protection 11.0
Antivirus & Antispyware
Firewall
IntrusionPrevention
Device and Application Control
Reduced Cost,
Complexity & Risk Exposure
Increased Protection, Control &
Manageability
Results
Symantec Endpoint Protection 11.0
20
Key Ingredients for Endpoint Protection
20
Spyware, RootkitsViruses, Trojans, Worms
Antivirus
World’s leading antivirus solution Most (37) consecutive VB100 Awards
Antispyware
Best rootkit detection and removal VxMS = superior rootkit protection
Antivirus & Antispyware
Source: Thompson Cyber Security Labs, August 2006
21
Key Ingredients for Endpoint Protection
Worms, Spyware
Firewall
Industry-leading endpoint firewall technology
Gartner Magic Quadrant “Leader” four consecutive years
Rules-based firewall can dynamically adjust port settings to block threats from spreading
Antivirus & Antispyware
Firewall
22
Key Ingredients for Endpoint Protection
0-Day, Key Logging
Intrusion Prevention
Combines NIPS (network) and HIPS (host)
Generic Exploit Blocking (GEB)—One signature to proactively protect against all variants
Granular application access control TruScan™—Proactive threat scanning
technology; very low (0.0049%) false-positive rate
Detects 1,000 new threats per month that are not detected by leading antivirus engines
Antivirus & Antispyware
Firewall
IntrusionPrevention
25M Installations
Fewer than 50 false positives for every 1M PCs
Slurping, IP Theft
Key Ingredients for Endpoint Protection
Device and Application Control
Prevents data leakage Restrict Access to devices (USB keys,
backup drives) Whitelisting—Allow only “trusted”
applications to run
Device and Application Control
W32.SillyFDC Targets removable
memory sticks Spreads by copying itself onto
removable drives such as USB memory sticks
Automatically runs when the device is next connected to a computer
Antivirus & Antispyware
Firewall
IntrusionPrevention
Recover.
How quickly can you recover from a loss or disaster?
The Cost of System Failure
• Sales transactions • Manufacturing data• Email and other business data• Employee productivity• Company reputation
25
What would you lose if a system crashed?
26
Symantec Backup Exec System Recovery 8 Desktop Edition
Local or OffsiteBackup
Complete System Recovery
File or Folder Restore
Symantec Backup ExecSystem Recovery 8
Reduced downtime and
data loss
Increased end-user
productivity
Results
27
Key Ingredients for Endpoint Recovery
Local or Offsite Backup
Create real-time, while-you-work recovery points of the entire system and save to any disk storage device
Supports full and incremental backups to save disk space and increase backup performance
Select from multiple compression options: none, standard, medium, or high
Select from multiple encryption options: 128-bit, 192-bit, or 256-bit AES
Automatically copy recovery points (backups) to a network share, FTP server, or external hard drive to enhance disaster recovery efforts
Intelligently and uniquely identifies and communicates to USB drives, successfully running backup jobs even if the drive letter for the device changes
Local or OffsiteBackup
Key Ingredients for Endpoint Protection
Complete System Recovery
Rapid recovery of entire systems, even to dissimilar hardware or virtual environments, breaks the barrier of incompatible storage controllers and hardware abstraction layers
Volumes can be resized during a restore, making hard-drive upgrades or full hardware migrations quick and easy
File or Folder Restore
Recovers individual files and folders in seconds from either recovery points or file/folder backups
Enables end-user recovery of files and folders via Google Desktop™ or Backup Exec Retrieve using a common Web-browser interface for fast and simple recovery, without IT intervention
Local or OffsiteBackup
Complete System Recovery
File or Folder Restore
29
Altiris Console Integration
• Centralized management of agents
• Centralized distribution of clients
• Create backup policies and apply to desired systems
• Leverage other components within the management framework
ThreatCon Integration
• Integrates with Symantec ThreatCon and DeepSight™ Threat Management System*
Connecting Symantec Technologies Today
* Only requires Internet connection. Does not require Symantec Endpoint Protection Manager
Symantec Endpoint Management Suite
Symantec continues to drive innovationthrough unique technology convergence and integration
Thank You!
Copyright © 2008 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
31