Presentation is loading. Please wait.

Presentation is loading. Please wait.

SymantecTM Endpoint Management Suite Customer Presentation Manage

Similar presentations


Presentation on theme: "SymantecTM Endpoint Management Suite Customer Presentation Manage"— Presentation transcript:

1 SymantecTM Endpoint Management Suite Customer Presentation Manage
SymantecTM Endpoint Management Suite Customer Presentation Manage. Secure. Recover.

2 Agenda Today’s IT Challenges 1 Symantec’s Collaborative Architecture 2
SymantecTM Endpoint Management Suite Connecting Symantec Technologies Today Q & A 2 3 4 5

3 Infrastructure Failures
Today’s IT Challenges Malicious Threats Human Error Information Natural Disasters Infrastructure Failures Today’s IT challenges are coming from all aspects of real life. It is not just security threats coming through your firewall or hackers attacking your wireless network. It can be as simple as a human error that occurs during a system patch update or a migration of servers or networks. Mistakes happen… Some however can be catastrophic. Such as the 700,000 customers that lost power (last year – needs updating!) in Los Angeles due to a technician error. Infrastructure problems plague organizations around the globe when it comes to dealing with or responding to natural disasters. Katrina is an unfortunate prime example of how things should have been handled better. Then there are unpredictable natural disasters such as earth quakes in South East Asia, Japan and California. All of these IT challenges put our information at risk. Hardware, OS’s, applications and data are exposed to great risk if our ability to reach, transact, confirm, validate and recover the information in real time is compromised. 3 3

4 Traditional Protection isn’t Good Enough Anymore
5% Evil geniuses who attack us with zero-day attacks < 5% 30% can be resolved through patch management 30% System configuration represents 2/3 of all system weaknesses 65% The industry analyst Gartner released a report stating that just under 5% of security is a result of evil geniuses attacking us with zero day attacks…only a very small part of the big picture Around 30% result from patch management issues And the vast majority, 65% are a result of weaknesses due to system configuration “65% of attacks exploit misconfigured systems…. 30% exploit known vulnerabilities where there's a patch out…. Only 5% exploit things we didn't know where there was a problem.” Address 65% by checking that things are configured correctly and you've just eliminated 2/3 of your problem. “Focus on patch management and forcing software vendors to write better software and you've got the other 30% taken care of.” “Then, later on, worry about the 5% of evil geniuses who are attacking us with zero-day attacks." John Pescatore, Vice President, Gartner Inc. Source: SearchSecurity.TechTarget.com Source: SearchSecurity.TechTarget.com 4 4

5 A Secure Endpoint is a Well-managed Endpoint
95% Security problems can be solved by endpoint management Proof point - Based on information from Analysts 95% of security problems can be solved by endpoint management!! John Pescatore, Vice President, Gartner Inc. Source: 5 5

6 Symantec’s Collaborative Architecture
6

7 Open Collaborative Architecture: Connecting People and Technology
Monitor status Close incidents Workflow Execution Distribute patches Obtain change control approval Update signatures Endpoint Security Patch Management Kick-off backup process Test patches Backup & Recovery Service Desk Notify risk management team The Altiris collaborative platform architecture will protect today’s technology investment by allowing your implemented solution to expand in line with your future needs and growth. The foundation of the Altiris platform is the Configuration Management Database or CMDB. A central database where all configuration information resides providing a comprehensive view of an enterprise. The Altiris CMDB provides a common resource model and information repository streamlining the management and reporting of devices in the enterprise. The Altiris CMDB is built on Microsoft SQL Server Comprehensive Network Discovery Common Software Delivery Process Centralized Reporting Remote Administration Configuration Management Database (CMDB)

8 Driving to Convergence
Solution Native integration Single view of compliance Consolidated status reporting Pre-built workflow processes CMDB Situation Integration on Altiris Platform Without an integrated approach combining systems management, security, and backup and recovery capabilities it is difficult for organizations to achieve visibility into and control over their entire endpoint environment resulting in unnecessary exposure to security and compliance risks. Symantec believes that a secure endpoint is a well-managed endpoint.  As you saw in a previous slide according to industry analyst Gartner around 95% of today’s security problems can be solved by using endpoint management[1]. Symantec understands this point and recognizes that it takes multiple technologies to fully protect endpoints. This is why Symantec is combining industry-leading management, security and recovery solutions on the Altiris collaborative platform architecture. This approach will help organizations reduce their IT costs and complexity as well as their exposure to security and compliance risks. Symantec’s Endpoint Management Suite will help to bring together traditional technology and organizational silos to enable cohesive sharing of processes, technology, and data supported by workflow and a centralized Configuration Management Database (CMDB).  Source: [1] John Pescatore, Vice President, Gartner Inc. SearchSecurity.TechTarget.com Duplication of tasks Gaps require manual processes Multiple consoles and agents Various data repositories Overlapping policies

9 July 2007 “The Forrester Wave™: Client Management Suites, Q3 2007”
Symantec Leads the Way July 2007 “The Forrester Wave™: Client Management Suites, Q3 2007” Risky Bets Strong Performers Contenders Leaders Strong Symantec Offers the Most Mature Client Management Suite Symantec LANDesk CA HP Symantec’s acquisition of Altiris in Q illustrates the impending requirements of integrated security and management—and that is exactly what Symantec delivers. In April 2007, Symantec purchased Altiris. This strategic acquisition merged security and backup with IT Lifecycle Management. The industry reacted positively: Recognizing a broader integrated solution that spans these three strategic disciplines. Forrester recognized this synergy and placed the combined Symantec (with Backup and Security) and Altiris (IT Lifecycle Management) as the industry’s dominant leader Client Management. We are in this for the long-term and we are strategic. Customers can count on Symantec for a superior offering that will be advanced over time. Customers and prospects have confidence that they are purchasing high quality products, from the recognized industry leader. Novell BMC Software IBM Current offering Microsoft Natalie Lambert Senior Analyst, Forrester Market presence Full vendor participation Weak Strategy Strong Symantec Confidential 9

10 Introducing Endpoint Management Suite
Inventory and discovery Imaging and provisioning Software delivery and patch management Remote administration MANAGE #1 in worldwide software distribution (IDC 2006) Leader in client management suites (Forrester 2007) Altiris® Client Management Suite™ 6.0 Antivirus and antispyware protection Firewall Intrusion prevention Application and device control SECURE #1 in worldwide secure content and threat management (IDC 2006) Leader in endpoint protection platforms (Gartner 2007) Symantec™ Endpoint Protection 11.0 Local and offsite backup File and folder restore Complete system recovery RECOVER #1 in worldwide data protection and recovery (IDC 2006) Leader enterprise backup/recovery software (Gartner 2007) Backup Exec™ System Recovery 8 EMS 1.0 is a software bundle comprised of Symantec Endpoint Protection v 11.0 plus Altiris Client Management Suite v 6.0 plus Backup Exec System Recovery Desktop Edition v 8. EMS 1.0 will be Client Only (Servers planned for future release) and will leverage the Altiris platform architecture (collaboration architecture) and the SEP and BESR Integration components Symantec provides solutions to address many IT challenges across management, security and recovery. As you can see Symantec is the only company that can truly claim that they are THE leader in all three of these areas. You can clearly have Confidence in a suite delivering best of breed solutions from a single vendor. #1 Claim Data MANAGE WW Software Distribution 2007–2011 Forecast and 2006 Vendor Shares – 12/07 Symantec was #3 in 2006 Market share for Software Distribution with a 10.4% market share. Altiris was ranked #4 with a 8.6% market share. Together Symantec would rank # 1 with a 19.0% market share. August 2007 Forrester Wave: Client Management Suites Report SECURE WW Secure Content & Threat Management 2007–2011 Forecast and 2006 Vendor Shares – 6/07 Symantec was #1 in 2006 Market share for Secure Content & Threat Management with a 18% market share (18.2% with Vontu) RECOVER WW Data Protection and Recovery Software 2006 Vendor Shares – 12/07 Symantec was #1 in 2006 Market share for Data Protection and Recovery Software with a 37.3% market share Also noted is that; “Symantec did show negative growth year over year in the data protection space but indicates this is the result of taking on a more conservative accounting approach in bookings to revenue yield with deferred revenue growth outpacing recognized revenue growth” 10

11 How are you managing your Windows® desktops and laptops?
One thing that each and every one in this room needs to ask themselves is How am I currently managing my Windows-based desktops and laptops? Not just managing but how am I deploying patches, do you know what kinds of systems and applications are running in your environment (performing hardware and software inventory), and how am I upgrading applications or systems? Manage. How are you managing your Windows® desktops and laptops? 11

12 IT Lifecycle Management
Transition & Migration Asset Identification Problem Resolution Contract Management Endpoint Security & Management Monitor & Track Endpoint Management solutions (from Altiris) allow you to significantly reduce the hidden costs of managing endpoint systems through IT Lifecycle management. IT lifecycle management is the management of endpoint devices from the point of acquisition (from cradle) to the point of secure system retirement (to grave) Deployment & Configuration Retirement Procurement Staging Production Business Continuity Application Packaging & QA Patch Management Software Distribution & Virtualization Endpoint Security

13 Altiris® Client Management Suite™ 6.0
Results Inventory & Discovery Imaging & Provisioning Software Distribution & Patch Management Need Source for Results data Altiris Client Management Suite 6.0

14 Key Ingredients for Management
Inventory and Discovery Populates CMDB with comprehensive data for discoverable assets Aggregates data across environment in real time Assists with software license management Helps forecast growth requirements Results Inventory & Discovery Populates CMDB with comprehensive assessment of discoverable hardware and software assets Aggregates data across environment in real-time Assists with software license management to prevent overbuying or under-buying Helps forecast growth requirements for equipment/upgrades GM Brazil > Reduced annual software license expenses by 44 percent within 45 days, equaling a 1,000 percent ROI Reed Smith > Reduced inventory time from one month to minutes 14 14

15 Key Ingredients for Management
Imaging and Provisioning Comprehensive deployment capabilities Image-based or scripted OS install Ongoing updates/re-provisioning Tools for hands-free and PC user personality migrations Facilitates implementation of standardized desktop configurations Reduces risks associated with desktop changes Inventory & Discovery Imaging & Provisioning Comprehensive deployment capabilities Image-based or scripted OS install On-going updates / re-provisioning Provides tools for hands-free migration and personality migrations Facilitates implementation of standardized desktop configurations Reduces risks associated with desktop changes Results Triple S > Reduced migration time by 85 percent U.S. Air Force > Responded to new hardware imaging requests in 88 percent less time 15

16 Key Ingredients for Management
Software Distribution and Patch Management Implements policy-based software management Distribute applications, updates, code, files to target systems Proactively manage software updates to minimize security risks Automates patch distribution with one-click creation of collections and policies Bandwidth-sensitive systems management for the mobile workforce and roaming worker Software Distribution & Patch Management Imaging & Provisioning Inventory & Discovery Implements policy-based software management Distribute applications, updates, code, files to target systems Proactively manage software updates to minimize security risks Automates patch distribution with one-click creation of collections and policies Bandwidth sensitive systems management for the mobile workforce and roaming worker Results Horizon > Improved software delivery success rate from 60 percent to 90+ percent Edwards Lifesciences > Able to patch their 2,000 PCs in less than two hours 16 16

17 How are you protecting yourself from external threats?
Now ask yourself How am I protecting myself from external threats? Not just viruses and worms, but what am I doing about unknown threats, and are you protected from blended threats? Note: SEP does not include SPAM protection Secure. How are you protecting yourself from external threats? 17

18 Corporate Network is Continually Exposed
Wireless Networks Web Applications Guests Consultants IPsec VPN Employees Working at Home WANs & Extranets SSL VPN Internet Kiosks & Shared Computers In an effort to keep up with end user demands IT administrators have been enabling more mechanisms by which end users can connect. End users want to be productive no matter where they are. And they want to get business done with their company’s partners. IT Administrators are faced with a difficult balance of providing right amount of access to corporate network for productivity and at the same time keeping the corporate network secure. Typical challenges are; Who is accessing my network? What do they have access to Managing intrusion detection and prevention 18

19 Symantec Endpoint Protection 11.0
Reduced Cost, Complexity & Risk Exposure Increased Protection, Control & Manageability Results Antivirus & Antispyware Firewall Intrusion Prevention Device and Application Control Symantec Endpoint Protection 11.0 Symantec 5 years of strategic planning Multi million dollars investment in R&D Multiple company acquired Putting together best of breed technology and redefining what AntiVirus protection should be and evolving with threat landscape. End of life Symantec Antivirus and Client Security No price increase Providing great opportunities to you and providing value to your customers 19 19

20 Key Ingredients for Endpoint Protection
Antivirus World’s leading antivirus solution Most (37) consecutive VB100 Awards Antispyware Best rootkit detection and removal VxMS = superior rootkit protection Viruses, Trojans, Worms Spyware, Rootkits Antivirus & Antispyware So what are we doing about it? Well, we determined that we needed to build a better mousetrap, and that we had the best ingredients to make it happen in a single solution. We started with the world’s leading antivirus solution. Our track record speaks for itself – 37 consecutive Virus Bulletin 100% certifications – and as of April 2008, 37 consecutive passes. No other vendor has this track record of success. Trend, Sophos, McAFee failed this test in April 2008 on Vista SP1 Trend, Sophos and Kaspesrky failed this test in Dec 2007 McAfee has failed 9 times over the same time frame In addition, we have won many awards as noted on the right side here, consistently. As for spyware, one of the best things that came out of the Veritas merger was that we gained access to incredibly fast and effective scanning technology from the Backup side of the business – this technology, is already in our Consumer line of products, and catches the most Rootkits – more than any other vendor. Take a look at Microsoft in this chart – once touted as the “best” anti-spyware, the “Giant” software they acquired and subsequently included in Vista (and XP SP2), has proved ineffective at catching Rootkits. Further detail: Rootkit detection – integrated Veritas technology so we best at detecting and removing rootkits we can scan at a deeper level. 1. Installed without user’s knowledge 2. Gains admin or system-level privileges 3. Hides from detection / buries deep within the operating system 4. Used as a method to circumvent existing security tools and/or measures (optional point) Source: Thompson Cyber Security Labs, August 2006 20 20 20

21 Key Ingredients for Endpoint Protection
Firewall Industry-leading endpoint firewall technology Gartner Magic Quadrant “Leader” four consecutive years Rules-based firewall can dynamically adjust port settings to block threats from spreading Worms, Spyware Firewall Antivirus & Antispyware Another great thing was acquiring Sygate in October of Gartner has raved about their managed firewall capability for 4 consecutive years. Not only is it effective technology, but it is extremely light and streamlined, so we based our next-generation architecture on it. The rules-based firewall is a dynamic solution, adjusting to protect the network from threats as they attempt to spread. 21 21

22 Key Ingredients for Endpoint Protection
Intrusion Prevention Combines NIPS (network) and HIPS (host) Generic Exploit Blocking (GEB)—One signature to proactively protect against all variants Granular application access control TruScan™—Proactive threat scanning technology; very low (0.0049%) false- positive rate Detects 1,000 new threats per month that are not detected by leading antivirus engines 0-Day, Key Logging Intrusion Prevention Firewall Antivirus & Antispyware When we looked at Intrusion Prevention, we realized that we needed to combine layers for IPS to be truly effective. In Symantec Client Security, we introduced Generic Exploit Blocking – an innovative way to protect against variants and polymorphism, with a single “vulnerability-based” signature. But what we realized was that we need to address Zero-day attacks in a truly “signature-less” fashion. Around the same time we acquired Sygate, we also acquired a small company called Whole Security. Their technology is heuristic based, and fine-tunes itself to reduce false positives that heuristics are prone to. We introduced this in the Consumer products, and the success has been overwhelming – as illustrated in the slide. Further detail: Symantec TruScan Technology, which unlike all other heuristic-based technologies, scores both good and bad behaviors of unknown applications. The unique algorithms of this proprietary technology provides more accurate detection without the need to set-up rule-based configurations or the worries of false positives. Based on an installed base of over 25 million users, our behavior-based technology has proven to be extremely accurate and effective. We have found that since its deployment, this proactive technology has detected approximately 1,000 new threats per month that were not yet detected by any of the leading antivirus engines. Moreover, it does this with an incredibly low false positive rate of only % (less than 50 for every 1 Million users). 25M Installations Fewer than 50 false positives for every 1M PCs 22 22

23 Key Ingredients for Endpoint Protection
Device and Application Control Slurping, IP Theft Prevents data leakage Restrict Access to devices (USB keys, backup drives) Whitelisting—Allow only “trusted” applications to run Device and Application Control Intrusion Prevention Firewall W32.SillyFDC Targets removable memory sticks Spreads by copying itself onto removable drives such as USB memory sticks Automatically runs when the device is next connected to a computer Antivirus & Antispyware Yet another benefit of the Sygate acquisition was that we gained the ability to protect from attacks and data leakage that occurs through the use (or abuse) of I/O devices such as USB memory keys, media players, etc. One recent example of an attack using this method was “W32.SillyFDC” which used a USB key as the means to deposit a Trojan horse onto a system. With our technology, you can determine which of these devices have write access to the system, and even what data can be written to the I/O device. We do it by Device Class ID, offering many possibilities on how to create different policies based on device type. 23

24 How quickly can you recover from a loss or disaster?
Ask yourself How quickly can I recover from a loss or disaster? Here I am talking about your data of course, but what about your applications, like Exchange or SQL, and we absolutely can not forget the Windows-based systems. Without the client system there can be no application or data. Recover. How quickly can you recover from a loss or disaster? 24

25 The Cost of System Failure
What would you lose if a system crashed? Sales transactions Manufacturing data and other business data Employee productivity Company reputation 25

26 Symantec Backup Exec System Recovery 8 Desktop Edition
Reduced downtime and data loss Increased end-user productivity Results Local or Offsite Backup Complete System Recovery File or Folder Restore Symantec Backup Exec System Recovery 8 26 26

27 Key Ingredients for Endpoint Recovery
Local or Offsite Backup Create real-time, while-you-work recovery points of the entire system and save to any disk storage device Supports full and incremental backups to save disk space and increase backup performance Select from multiple compression options: none, standard, medium, or high Select from multiple encryption options: 128-bit, 192-bit, or 256-bit AES Automatically copy recovery points (backups) to a network share, FTP server, or external hard drive to enhance disaster recovery efforts Intelligently and uniquely identifies and communicates to USB drives, successfully running backup jobs even if the drive letter for the device changes Local or Offsite Backup 27 27

28 Key Ingredients for Endpoint Protection
Complete System Recovery Rapid recovery of entire systems, even to dissimilar hardware or virtual environments, breaks the barrier of incompatible storage controllers and hardware abstraction layers Volumes can be resized during a restore, making hard-drive upgrades or full hardware migrations quick and easy File or Folder Restore Complete System Recovery File or Folder Restore Local or Offsite Backup Recovers individual files and folders in seconds from either recovery points or file/folder backups Enables end-user recovery of files and folders via Google Desktop™ or Backup Exec Retrieve using a common Web- browser interface for fast and simple recovery, without IT intervention 28

29 Connecting Symantec Technologies Today
Altiris Console Integration Centralized management of agents Centralized distribution of clients Create backup policies and apply to desired systems Leverage other components within the management framework ThreatCon Integration Integrates with Symantec ThreatCon and DeepSight™ Threat Management System* Centralized Management of agents on desktops (servers in future release?) Centralized distribution of clients Create backup policies and apply to desired systems Leverage other components within the management framework like workflow, asset and helpdesk Set Event Triggers to run a backup when the Symantec ThreatCon level changes Integrates with Symantec ThreatCon and DeepSight Threat Management System* Choose which level best meets required protection needs * Only requires Internet connection. Does not require Symantec Endpoint Protection Manager 29 29 29

30 Symantec Endpoint Management Suite
Symantec continues to drive innovation through unique technology convergence and integration For Windows-based client systems, data and applications

31 Thank You! Copyright © 2008 Symantec Corporation. All rights reserved.  Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries.  Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising.  All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law.  The information in this document is subject to change without notice. 31


Download ppt "SymantecTM Endpoint Management Suite Customer Presentation Manage"

Similar presentations


Ads by Google