b-powerpoint endpt mgmt suite 06-2008 14104802

31
Symantec TM Endpoint Management Suite Customer Presentation Manage. Secure. Recover.

Upload: maximiliano-salazar

Post on 21-Jul-2016

5 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: B-powerpoint Endpt Mgmt Suite 06-2008 14104802

SymantecTM Endpoint Management Suite Customer PresentationManage. Secure. Recover.

Page 2: B-powerpoint Endpt Mgmt Suite 06-2008 14104802

2

Agenda

Today’s IT Challenges11

Symantec’s Collaborative Architecture

SymantecTM Endpoint Management Suite

Connecting Symantec Technologies Today

Q & A

22

33

44

55

Page 3: B-powerpoint Endpt Mgmt Suite 06-2008 14104802

3

NaturalDisasters

InfrastructureFailures

HumanError

MaliciousThreats

Today’s IT Challenges

Information

Page 4: B-powerpoint Endpt Mgmt Suite 06-2008 14104802

Traditional Protection isn’t Good Enough Anymore

4

Source: SearchSecurity.TechTarget.com

Evil geniuses who attack us with zero-day attacks < 5%

System configuration represents 2/3 of all system weaknesses65%

30% can be resolved through patch management

30%

5%

Page 5: B-powerpoint Endpt Mgmt Suite 06-2008 14104802

A Secure Endpoint is a Well-managed Endpoint

5

95%Security problems can be solved by endpoint managementJohn Pescatore, Vice President, Gartner Inc.Source: http://searchsecurity.techtarget.com/news/interview/0,289202,sid14_gci905234,00.html

Page 6: B-powerpoint Endpt Mgmt Suite 06-2008 14104802

Symantec’s Collaborative Architecture

Page 7: B-powerpoint Endpt Mgmt Suite 06-2008 14104802

7

Open Collaborative Architecture: Connecting People and Technology

Backup & Recovery

Service Desk

Endpoint Security

Patch Management

Workflow Execution

Monitor statusClose incidentsDistribute patchesObtain change control approvalUpdate signaturesKick-off backup processTest patchesNotify risk management team

Comprehensive Network DiscoveryCommon Software Delivery ProcessCentralized ReportingRemote Administration

Configuration Management Database (CMDB)

Page 8: B-powerpoint Endpt Mgmt Suite 06-2008 14104802

Integration on Altiris Platform

8

Driving to Convergence

Solution

• Native integration• Single view of compliance• Consolidated status reporting• Pre-built workflow processes

CMDB

Situation

• Duplication of tasks • Gaps require manual processes• Multiple consoles and agents • Various data repositories• Overlapping policies

Page 9: B-powerpoint Endpt Mgmt Suite 06-2008 14104802

Symantec Leads the Way

July 2007 “The Forrester Wave™: Client Management Suites, Q3 2007”

Symantec’s acquisition of Altiris in Q2 2007 illustrates the impending requirements of integrated security and management—and that is exactly what Symantec delivers.

9Symantec Confidential

Weak Strategy Strong

Currentoffering

Strong

Market presence

BMC SoftwareIBM

Microsoft

Novell

LANDeskCA HP

Full vendor participation

ContendersStrong

Performers LeadersRiskyBets

Symantec

Natalie LambertSenior Analyst, Forrester

Symantec Offers the Most Mature Client Management Suite

Page 10: B-powerpoint Endpt Mgmt Suite 06-2008 14104802

10

IntroducingEndpoint Management Suite

• Inventory and discovery• Imaging and provisioning• Software delivery and

patch management• Remote administration

MANAGE

#1 in worldwide software distribution (IDC 2006)

Leader in client management suites (Forrester 2007)

Altiris® Client Management Suite™ 6.0

• Local and offsite backup• File and folder restore• Complete system recovery

RECOVER

#1 in worldwide data protection and recovery (IDC 2006)

Leader enterprise backup/recovery software (Gartner 2007)

Backup Exec™ System Recovery 8

• Antivirus and antispyware protection

• Firewall• Intrusion prevention• Application and device control

SECURE

#1 in worldwide secure content and threat management (IDC 2006)

Leader in endpoint protection platforms (Gartner 2007)

Symantec™ Endpoint Protection 11.0

Page 11: B-powerpoint Endpt Mgmt Suite 06-2008 14104802

Manage.

How are you managing your Windows® desktops and laptops?

Page 12: B-powerpoint Endpt Mgmt Suite 06-2008 14104802

IT Lifecycle Management

12

Endpoint Security &

Management• Retirement• Procurement• Staging• Production

Transition &

MigrationProblem Resolution

Monitor &Track

BusinessContinuity

Patch Management

Asset Identification

Contract Management

Deployment & Configuration

Application Packaging & QA

Software Distribution & Virtualization

Endpoint Security

Page 13: B-powerpoint Endpt Mgmt Suite 06-2008 14104802

Altiris® Client Management Suite™ 6.0

13

Results

Inventory &Discovery

Imaging & Provisioning

Software Distribution & Patch Management

Altiris Client Management

Suite 6.0

Page 14: B-powerpoint Endpt Mgmt Suite 06-2008 14104802

14

Key Ingredients for Management

Inventory and Discovery

Populates CMDB with comprehensive data for discoverable assets

Aggregates data across environment in real time

Assists with software license management

Helps forecast growth requirements

Inventory &Discovery

Results

GM Brazil > Reduced annual software license expenses by 44 percent within 45 days, equaling a 1,000 percent ROI

Reed Smith > Reduced inventory time from one month to minutes

Page 15: B-powerpoint Endpt Mgmt Suite 06-2008 14104802

Key Ingredients for Management

Imaging and Provisioning

Comprehensive deployment capabilities Image-based or scripted OS install Ongoing updates/re-provisioning Tools for hands-free and PC user

personality migrations Facilitates implementation of

standardized desktop configurations Reduces risks associated with

desktop changes

Results

Triple S > Reduced migration time by 85 percent

U.S. Air Force > Responded to new hardware imaging requests in 88 percent less time

Inventory &Discovery

Imaging & Provisioning

Page 16: B-powerpoint Endpt Mgmt Suite 06-2008 14104802

16

Key Ingredients for Management

Inventory &Discovery

Imaging & Provisioning

Software Distribution & Patch Management

Software Distribution and Patch Management

Implements policy-based software management Distribute applications, updates,

code, files to target systems Proactively manage software updates to

minimize security risks Automates patch distribution with

one-click creation of collections and policies

Bandwidth-sensitive systems management for the mobile workforce and roaming worker

Results Horizon > Improved software

delivery success rate from 60 percent to 90+ percent

Edwards Lifesciences > Able to patch their 2,000 PCs in less than two hours

Page 17: B-powerpoint Endpt Mgmt Suite 06-2008 14104802

Secure.

How are you protecting yourself from external threats?

Page 18: B-powerpoint Endpt Mgmt Suite 06-2008 14104802

Corporate Network is Continually Exposed

WirelessNetworks

WebApplications

Guests

Consultants

IPsec VPN

EmployeesWorking at Home

WANs& Extranets

SSL VPN

Internet Kiosks& Shared

Computers

Page 19: B-powerpoint Endpt Mgmt Suite 06-2008 14104802

19

Symantec Endpoint Protection 11.0

Antivirus & Antispyware

Firewall

IntrusionPrevention

Device and Application Control

Reduced Cost,

Complexity & Risk Exposure

Increased Protection, Control &

Manageability

Results

Symantec Endpoint Protection 11.0

Page 20: B-powerpoint Endpt Mgmt Suite 06-2008 14104802

20

Key Ingredients for Endpoint Protection

20

Spyware, RootkitsViruses, Trojans, Worms

Antivirus

World’s leading antivirus solution Most (37) consecutive VB100 Awards

Antispyware

Best rootkit detection and removal VxMS = superior rootkit protection

Antivirus & Antispyware

Source: Thompson Cyber Security Labs, August 2006

Page 21: B-powerpoint Endpt Mgmt Suite 06-2008 14104802

21

Key Ingredients for Endpoint Protection

Worms, Spyware

Firewall

Industry-leading endpoint firewall technology

Gartner Magic Quadrant “Leader” four consecutive years

Rules-based firewall can dynamically adjust port settings to block threats from spreading

Antivirus & Antispyware

Firewall

Page 22: B-powerpoint Endpt Mgmt Suite 06-2008 14104802

22

Key Ingredients for Endpoint Protection

0-Day, Key Logging

Intrusion Prevention

Combines NIPS (network) and HIPS (host)

Generic Exploit Blocking (GEB)—One signature to proactively protect against all variants

Granular application access control TruScan™—Proactive threat scanning

technology; very low (0.0049%) false-positive rate

Detects 1,000 new threats per month that are not detected by leading antivirus engines

Antivirus & Antispyware

Firewall

IntrusionPrevention

25M Installations

Fewer than 50 false positives for every 1M PCs

Page 23: B-powerpoint Endpt Mgmt Suite 06-2008 14104802

Slurping, IP Theft

Key Ingredients for Endpoint Protection

Device and Application Control

Prevents data leakage Restrict Access to devices (USB keys,

backup drives) Whitelisting—Allow only “trusted”

applications to run

Device and Application Control

W32.SillyFDC Targets removable

memory sticks Spreads by copying itself onto

removable drives such as USB memory sticks

Automatically runs when the device is next connected to a computer

Antivirus & Antispyware

Firewall

IntrusionPrevention

Page 24: B-powerpoint Endpt Mgmt Suite 06-2008 14104802

Recover.

How quickly can you recover from a loss or disaster?

Page 25: B-powerpoint Endpt Mgmt Suite 06-2008 14104802

The Cost of System Failure

• Sales transactions • Manufacturing data• Email and other business data• Employee productivity• Company reputation

25

What would you lose if a system crashed?

Page 26: B-powerpoint Endpt Mgmt Suite 06-2008 14104802

26

Symantec Backup Exec System Recovery 8 Desktop Edition

Local or OffsiteBackup

Complete System Recovery

File or Folder Restore

Symantec Backup ExecSystem Recovery 8

Reduced downtime and

data loss

Increased end-user

productivity

Results

Page 27: B-powerpoint Endpt Mgmt Suite 06-2008 14104802

27

Key Ingredients for Endpoint Recovery

Local or Offsite Backup

Create real-time, while-you-work recovery points of the entire system and save to any disk storage device

Supports full and incremental backups to save disk space and increase backup performance

Select from multiple compression options: none, standard, medium, or high

Select from multiple encryption options: 128-bit, 192-bit, or 256-bit AES

Automatically copy recovery points (backups) to a network share, FTP server, or external hard drive to enhance disaster recovery efforts

Intelligently and uniquely identifies and communicates to USB drives, successfully running backup jobs even if the drive letter for the device changes

Local or OffsiteBackup

Page 28: B-powerpoint Endpt Mgmt Suite 06-2008 14104802

Key Ingredients for Endpoint Protection

Complete System Recovery

Rapid recovery of entire systems, even to dissimilar hardware or virtual environments, breaks the barrier of incompatible storage controllers and hardware abstraction layers

Volumes can be resized during a restore, making hard-drive upgrades or full hardware migrations quick and easy

File or Folder Restore

Recovers individual files and folders in seconds from either recovery points or file/folder backups

Enables end-user recovery of files and folders via Google Desktop™ or Backup Exec Retrieve using a common Web-browser interface for fast and simple recovery, without IT intervention

Local or OffsiteBackup

Complete System Recovery

File or Folder Restore

Page 29: B-powerpoint Endpt Mgmt Suite 06-2008 14104802

29

Altiris Console Integration

• Centralized management of agents

• Centralized distribution of clients

• Create backup policies and apply to desired systems

• Leverage other components within the management framework

ThreatCon Integration

• Integrates with Symantec ThreatCon and DeepSight™ Threat Management System*

Connecting Symantec Technologies Today

* Only requires Internet connection. Does not require Symantec Endpoint Protection Manager

Page 30: B-powerpoint Endpt Mgmt Suite 06-2008 14104802

Symantec Endpoint Management Suite

Symantec continues to drive innovationthrough unique technology convergence and integration

Page 31: B-powerpoint Endpt Mgmt Suite 06-2008 14104802

Thank You!

Copyright © 2008 Symantec Corporation. All rights reserved.  Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries.  Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising.  All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law.  The information in this document is subject to change without notice.

31