Medicaid MITA: Innovative COTS solutions for IT Risk Management

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Medicaid MITA: Innovative COTS solutions for IT Risk Management"

Transcription

1 Medicaid MITA: Innovative COTS solutions for IT Risk Management

2

3 White Paper: COTS Solutions for MITA 2.0 Medicaid MITA: Innovative COTS solutions for IT Risk Management Contents Introduction to MITA & Symantec MITA Technical Principles, Goals, and Objectives The Role of MITA's Service Oriented Architecture (SOA) How Are Services Built? The MITA Technical Capability Matrix (TCM) How Symantec Can Help Security and Privacy Compliance Automation High Availability & Disaster Recovery Service Oriented Architecture Secure Web Interfaces Summary Apendix A

4 Introduction to MITA & Symantec This paper provides an overview of the MITA Technical Architecture and discusses key areas of potential contribution to implementation of this framework from one the world's leading IT security and infrastructures software solution providers, Symantec. The goal of this paper is to facilitate discussion and familiarization of the Symantec Commercial Off-the-Shelf (COTS) offerings for those who find themselves charged with the implementation of anew MITA aligned Medicaid enterprise. Symantec understands that MITA is helping to foster integrated business and IT transformation across the Medicaid enterprise, putting business needs first in order to improve the administration of the Medicaid program, focusing on cost control, and is intended to improve interoperability for state Medicaid organizations. Briefly stated, the MITA Framework describes an approach for modernizing and improving Medicaid program business processes and IT infrastructure. It includes a logical Technical Architecture (TA) for the Medicaid enterprise to align the common elements of state implementations, thereby creating an infrastructure for information exchange. Based on this approach, Symantec helps MMIS developers seek to: Identify common requirements (i.e., Business Services and Technical Services) Develop implementation standards Identify and develop selected reusable components Create and maintain enterprise models Figure 1-1 describes the overall process for developing the MITA Technical Architecture. The web link below provides a further overview of MITA from the Centers for Medicare & Medicaid Services (CMS) 1

5 Figure 1-1. Devloping the MITA Technical Architecture MITA Technical Principles, Goals, and Objectives The MITA technical Principles, Goals, and Objectives, simply put, support the creation of a new MITA aligned Medicaid enterprise that carries improvement of the state Medicaid program into the next generation and beyond. Technical principles will shape MITA's definition and a particular state's implementation of the Medicaid Enterprise Architecture. From the Symantec perspective, relevant technical principles include: Implementation neutral - states will continue to be responsible for selecting their own implementation technology (e.g., J2EE,.Net, etc.). Platform independent - application software and infrastructure components should be developed for reusability and platform independence. Adaptable, extensible, and scalable. Open technology and standards based - the advantages of standardization (e.g., data sharing and interoperability) should be leveraged. Security and privacy must be integrated and embedded throughout MITA. Interoperability standards are established and followed. Quality data is enabled to support good decision making. Current and proven technology is selected. 2

6 The Role of MITA's Service Oriented Architecture (SOA) Service-Oriented Architecture (SOA) is a software design strategy that packages common functionality and capabilities (referred to as services) with standard, well-defined service interfaces to provide formally described functions that can be invoked using a published service contract. A service can be built using new applications, legacy applications, COTS software, or all three. SOA meets the MITA objectives of reusability and interoperability. Over time, SOA will tie together the key features of MITA to achieve interoperability and data sharing across the Medicaid enterprise and ultimately among states and other data-sharing entities With SOA, business needs - not technology - drive the enterprise. The intent of SOA is to enable the user to think in a business-centric way without being concerned with the IT implications. Conversely, it enables the introduction of IT without "upsetting the applecart" of the enterprise business. How Are Services Built? To illustrate how services are built using SOA, Figure 3-6 shows some of the key pieces of a Business Service. Each service has an Interface Services Layer that includes security services which inspect incoming messages to verify that the message originator is authorized to invoke the service. For example, only designated Medicaid staff members are authorized to approve claims. 3

7 Figure 3-6. The General Structure of Business Services The MITA Technical Capability Matrix (TCM) Maturing a state's technical capability over time, and helping keep up with the constantly changing technical landscape is the charge of the MITA TCM. Technical capabilities are assigned to a maturity level based on the maturity level of the business process that they are enabling and on the MITA principles, goals, and objectives. Technical capabilities can affect multiple business processes but also provide benefits to stakeholders. While business capabilities are mapped to Business Services, technical capabilities are mapped to Technical Services. Technical capabilities are associated with IT solutions or enablers. MITA technical capabilities fall into categories and subcategories. The top-level categories are as follows: Business-enabling services Access channels Interoperability channels Data management and data sharing Performance measurement Security and privacy (S&P) Adaptability and extensibility 4

8 How Symantec Can Help Symantec is uniquely positioned to assist states by integrating mature and service oriented solutions to support the MITA Enterprise Service Bus in four key areas. 1. Security & Privacy Compliance Automation 2. High Availability and Disaster Recovery 3. Service Oriented Architecture (SOA) 4. Secure Web Interfaces In each of these areas, Symantec has demonstrated market leadership with COTS solutions that adapt to our customers' business needs. These solutions align with MITA's Principles, Goals, and Objectives by being: operating system and hardware independent adaptable, extensible, and scalable standards based and leveraging open technology current and proven technology A table of how these solutions map into specific MITA Technical Capabilities Matrix requirements is included in Appendix A 1. Security and Privacy Compliance Automation The MITA TA will increase the use of data and technical standards to improve the cost effectiveness of IT development. The use of data standards will promote data consistency and enhanced sharing through common data-access mechanisms. The use of technical standards (e.g., open standards) will help integrate COTS solutions and encourage reuse of solutions within and among states to reduce development costs and development risk. MITA defines security and privacy capabilities and weaves them into the TA. The MIT TA protects the Medicaid enterprise against known threats and, through evolution of the TA, respond to new threats. The MITA Framework does not include state-specific security and privacy concerns. Automation of the privacy and security compliance management functions can yield significant operating cost savings and reduced errors. Symantec delivers automation through the combination of the following COTS solutions: Symantec Control Compliance Suite (CCS) CCS helps maintain control of the shifting changes in the Medicaid enterprise that leaves the organization exposed to both internal and external security and privacy risks. It captures desired IT policies and then delivers automated compliance management against those policies. 5

9 Reduces the cost of compliance by automating the assessment of IT policies against industry regulations and best practices Scans for vulnerabilities that could allow for debilitating Denial of Service (DoS) attacks Produces reports that detail existing vulnerabilities and required remediation Pre-populated templates for national standards (HIPPA, etc) with flexibility to build templates for unique state requirements. Symantec Data Loss Prevention (DLP) DLP ensures the confidential data at the storage and network (data rest and in-motion) is identified, monitored and prevented from leaving the trusted network. This applies to data at-rest (in the data-base) as well as data in-motion (writes to a USB memory stick, copy into a spreadsheet, etc.) Discovers where confidential data is stored Monitors how confidential data is being used Block and logs policy violations Symantec Security Information Manager (SIM) SIM enables organizations to collect, store, and analyze log data as well as monitor and respond to security events to meet IT risk and compliance requirements. Compliance and audit reporting Log retention and retrieval Real-time threat analysis Symantec Critical System Protection (SCSP) SCSP is a multi-layer security solution for servers that detects abnormal system activities, as well as prevents and blocks viruses and worms, hacking attacks, and zero day vulnerability attacks. Exploit prevention techniques shield operating Systems, applications, and services by acceptable behaviors for each function Protects systems from misuse by authorized people and programs through system and device controls that lock down configuration settings, file systems, and the use of removable media 2. High Availability & Disaster Recovery Symantec delivers high availability and disaster recovery solutions via an adaptable, standards based approach across multiple O/S and hardware platforms for MITA's Enterprise Service Bus systems. Solutions include clustering for highly 6

10 available servers, data backup and recovery for speedy recovery of lost data, and storage management to minimize the costs associated with the data growth. Veritas Cluster Server (VCS) VCS is the industry's leading clustering solution for reducing both planned and unplanned downtime. By monitoring the status of applications and automatically moving them to another server in the event of a fault, VCS can dramatically increase the availability of an application or database. VCS addresses the following critical business service issues: Application and hardware failures resulting in lost revenue and productivity Need applications up and running 24X7 in a cost effective manner Disaster recovery/ business continuity plans to meet IT governance and compliance requirements Single architecture for local, metro area and wide area failover Veritas NetBackup (NBU) NBU delivers advanced disk-based data protection, archival, and recovery management that scales to protect the largest UNIX, Windows, Linux, and NetWare environments. NBU offers a single console for management of all backup and recovery operations. Advanced reporting on backup and recovery operations enables service level management of all protected data in your enterprise to enable data protection as a service offering supporting the MITA Enterprise Service Bus. Key NBU business services include: Integrated data archiving, migration, and retention capabilities Solutions to meet backup and recovery windows or SLAs Different islands of data protection according to business, service level, and location Minimized capital and operational costs for data storage and protection Storage Management Effective management of storage and server hardware can enhance MMIS system performance and reduce capital cost outlays for unnecessary hardware. Veritas Storage Foundation and Command Central provide valuable capabilities to manage cost and performance Veritas Storage Foundation (SF) SF provides a complete solution for heterogeneous online storage management. It includes a standard set of integrated tools to centrally manage explosive data growth, maximize storage hardware investments (including heterogeneous new and existing systems), provide data protection and adapt to changing business requirements. Storage Foundation helps solve the following critical business issues: 7

11 Reduction of point tools for storage management Automation of routine storage management tasks and data migration Tiered storage Reduction of planned and unplanned downtime Command Central Storage (CCS) VCC is a storage resource management solution that provides centralized visibility and control across physical and virtual heterogeneous storage environments. It includes a capacity planning solution enabling organizations to reclaim wasted storage and reduce capital and operational costs. Command Central Storage addresses critical business issues such as: Providing end-to-end visibility from application to spindle in physical and virtual server and storage environments Increasing storage utilization and reducing power costs Scalable, heterogeneous storage management across SAN (FC and iscsi), NAS and DAS environments including support for replication solutions like SRDF Improving storage operational efficiency and reduces risk and downtime 3. Service Oriented Architecture By definition, MITA is a Service-Oriented Architecture (SOA). It must be flexible to adopt data and industry standards and promote the development of new standards when needed. It must promote the use of data and technical standards to improve the cost effectiveness of IT development. It must adhere to technical standards, specifically open standards to facilitate integration of COTS solutions. Finally, it will need to address the developing national standards for health and data exchange. Symantec Management Platform Symantec Management Platform is an Open Collaborative Architecture with an integrated developer program to establish greater interoperability with Symantec solutions and provide customers and integrators with the ability to integrate their applications with the Symantec Management Platform offerings: Robust approach to interoperability and solution building Leverages standard Web services and workflow management 4. Secure Web Interfaces MITA standards facilitate the "Web 2.0" goal of extending web interfaces to members, providers, and other users of MMIS systems. However, security and privacy issues become significant when sensitive MMIS data is extended to these users, 8

12 especially when it extends beyond the secure confines of the network perimeter. Symantec addressed this concern by providing a highly secure application virtualization solution. Symantec Application Virtualization To optimize efficiency and usability, a Medicaid "Web 2.0" application needs to be able to extend system web access to the remote locations where providers, members and other users sit. Often, the greatest barrier to this capability is the concerns about the vulnerability of sensitive data when it is extended outside the secure perimeter of the MMIS enterprise. Symantec can provide maximum privacy protections to a secure a web client that is accessed from a "dirty" environment (a PC infected with malware, viruses, screen scrapers, etc. - and no VPN) and be fully protected from the malicious code. We do this through an endpoint virtualization solution that delivers all of the protections that reside within the secure MMIS network perimeter to the remote web session. The web client is also housed in a very safe shell that is not subject to vulnerabilities on the local machine. Through this approach, we can deliver the highest degree of protections to the sensitive information that is exchanged via remote web clients. Summary MITA is transforming the design, operations, and costs associated with running an MMIS system. Symantec can support this effort by profiding COTS solutions for: Keeping MMIS data highly available at a reasonable cost, even in the event of a catastrophic system failure. Providing automation to the ongoing processes associated with regulatory compliance for HIPPA, state privacy laws, and other regulations. Delivering a framework to fully implement a Service-Oriented Architecture (SOA) around the MMIS solution to optimize automation and reduce ongoing management cost. Maintaining highly secure web interfaces for members, providers, operators, and others users of the MMIS system. Symantec looks forward to collaborating in this vitally important area. Symantec invites discussion with all interested parties - government agencies, healthcare providers, other software providers, and consulting and integrator firms to enhance and achieve the MITA vision. 9

13 Apendix A 10

14

15 About Symantec Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. For specific country offices and Symantec World contact numbers, please visit Headquarters our website Stevens Creek Blvd. Cupertino, CA USA +1 (408) (800) Copyright 2009 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 8/

Confidence in the Cloud Five Ways to Capitalize with Symantec

Confidence in the Cloud Five Ways to Capitalize with Symantec Five Ways to Capitalize with Symantec Solution Brief: Confidence in the Cloud Confidence in the Cloud Contents Overview...............................................................................................

More information

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex

More information

The Impact of HIPAA and HITECH

The Impact of HIPAA and HITECH The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients

More information

Consulting Services for Veritas Storage Foundation

Consulting Services for Veritas Storage Foundation Reducing the complexity of enterprise storage management The continued explosive growth in corporate data, combined with the proliferation of disparate storage management tools and technologies, has created

More information

Optimizing the Data Center for Today s State & Local Government

Optimizing the Data Center for Today s State & Local Government WHITE PAPER: OPTIMIZING THE DATA CENTER FOR TODAY S STATE...... &.. LOCAL...... GOVERNMENT.......................... Optimizing the Data Center for Today s State & Local Government Who should read this

More information

Simplify Your Windows Server Migration

Simplify Your Windows Server Migration SOLUTION BRIEF: ENDPOINT MANAGEMENT........................................ Simplify Your Windows Server Migration Who should read this paper Windows Server 2003 customers looking to migrate to the latest

More information

Veritas Cluster Server by Symantec

Veritas Cluster Server by Symantec Veritas Cluster Server by Symantec Reduce application downtime Veritas Cluster Server is the industry s leading clustering solution for reducing both planned and unplanned downtime. By monitoring the status

More information

Data Sheet: Storage Management Veritas Virtual Infrastructure Bringing enterprise-class storage management to virtual server environments

Data Sheet: Storage Management Veritas Virtual Infrastructure Bringing enterprise-class storage management to virtual server environments Bringing enterprise-class storage management to virtual server environments Overview Veritas Virtual Infrastructure delivers the first unified enterprise-class virtualization solution, bringing industry-leading

More information

Small and Midsize Business Protection Guide

Small and Midsize Business Protection Guide P r o t e c t i o n G u i d e : C l o s e t h e P r o t e c t i o n G a p Small and Midsize Business Protection Guide Close the protection gap and safeguard your business future Confidence in a connected

More information

Data Sheet: Disaster Recovery Veritas Volume Replicator by Symantec Data replication for disaster recovery

Data Sheet: Disaster Recovery Veritas Volume Replicator by Symantec Data replication for disaster recovery Data replication for disaster recovery Overview Veritas Volume Replicator provides organizations with a world-class foundation for continuous data replication, enabling rapid and reliable recovery of critical

More information

Optimizing the Data Center for Today s Federal Government

Optimizing the Data Center for Today s Federal Government WHITE PAPER: OPTIMIZING THE DATA CENTER FOR TODAY S FEDERAL......... GOVERNMENT............................... Optimizing the Data Center for Today s Federal Government Who should read this paper CIOs,

More information

Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection

Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection The gold standard in Windows data protection Overview Symantec Backup Exec 12.5 delivers market-leading backup and recovery protection from server to desktop, providing complete data protection for the

More information

Symantec's Continuous Monitoring Solution

Symantec's Continuous Monitoring Solution Preparing for FISMA 2.0 and Continuous Monitoring Requirements Symantec's Continuous Monitoring Solution White Paper: Preparing for FISMA 2.0 and Continuous Monitoring Requirements Contents Introduction............................................................................................

More information

Cyber Security Services: Data Loss Prevention Monitoring Overview

Cyber Security Services: Data Loss Prevention Monitoring Overview WHITE PAPER: DLP MONITORING OVERVIEW........................................ Cyber Security Services: Data Loss Prevention Monitoring Overview Who should read this paper Customers who are interested in

More information

Symantec NetBackup 7 Clients and Agents

Symantec NetBackup 7 Clients and Agents Complete protection for your information-driven enterprise Overview Symantec NetBackup provides a simple yet comprehensive selection of innovative clients and agents to optimize the performance and efficiency

More information

Data Sheet: Server Management Altiris Server Management Suite 7.0 Essential server management: Discover, provision, manage, and monitor

Data Sheet: Server Management Altiris Server Management Suite 7.0 Essential server management: Discover, provision, manage, and monitor Essential server management: Discover, provision, manage, and monitor Overview Complexity with physical and virtual machine proliferation increases the challenges involved in managing servers. Server administrators

More information

Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation

Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation Next Generation Data Protection with Symantec NetBackup 7 Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation White Paper: Next Generation Data Protection with NetBackup

More information

Data Sheet: Storage Management Veritas CommandCentral Storage 5.1 Centralized visibility and control across heterogeneous storage environments

Data Sheet: Storage Management Veritas CommandCentral Storage 5.1 Centralized visibility and control across heterogeneous storage environments Centralized visibility and control across heterogeneous storage environments Overview Veritas CommandCentral Storage is an industry standard based, comprehensive software solution that seamlessly integrates

More information

Powering Linux in the Data Center

Powering Linux in the Data Center Powering Linux in the Data Center Solution Brief: Platform Solutions Powering Linux in the Data Center Contents Symantec and Linux in the data center...................................................................

More information

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement Comprehensive Endpoint Enforcement Overview is a complete, end-to-end network access control solution that enables organizations to efficiently and securely control access to corporate networks through

More information

Leveraging a Maturity Model to Achieve Proactive Compliance

Leveraging a Maturity Model to Achieve Proactive Compliance Leveraging a Maturity Model to Achieve Proactive Compliance White Paper: Proactive Compliance Leveraging a Maturity Model to Achieve Proactive Compliance Contents Introduction............................................................................................

More information

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

Veritas Cluster Server from Symantec

Veritas Cluster Server from Symantec Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

North American Electric Reliability Corporation (NERC) Cyber Security Standard

North American Electric Reliability Corporation (NERC) Cyber Security Standard North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation

More information

Powering Linux in the Data Center

Powering Linux in the Data Center SOLUTION BRIEF: POWERING LINUX IN THE DATA CENTER........................................ Powering Linux in the Data Center Who should read this paper Linux IT Architect and Director of IT for Linux Servers

More information

recovery at a fraction of the cost of Oracle RAC

recovery at a fraction of the cost of Oracle RAC Concurrent data access and fast failover for unstructured data and Oracle databases recovery at a fraction of the cost of Oracle RAC Improve application performance and scalability - Get parallel processing

More information

Veritas Replicator from Symantec

Veritas Replicator from Symantec Data replication across multi-vendor storage for cost effective disaster recovery Data Sheet: Disaster Recovery Overviewview provides organizations with a comprehensive solution for heterogeneous data

More information

Enterprise Vault 10 Feature Briefing

Enterprise Vault 10 Feature Briefing Enterprise Vault 10 Feature Briefing Nirvanix Cloud Storage This document is one of a set of Feature Briefings which detail major new or changed features in Enterprise Vault 10. This document covers the

More information

Data Sheet: Archiving Altiris Server Management Suite 7.0 from Symantec Essential server management: Discover, provision, manage, and monitor

Data Sheet: Archiving Altiris Server Management Suite 7.0 from Symantec Essential server management: Discover, provision, manage, and monitor Essential server management: Discover, provision, manage, and monitor Overview Complexity with physical and virtual machine proliferation increases the challenges involved in managing servers. Server administrators

More information

Demystifying Virtualization for Small Businesses Executive Brief

Demystifying Virtualization for Small Businesses Executive Brief Demystifying Virtualization for Small Businesses White Paper: Demystifying Virtualization for Small Businesses Demystifying Virtualization for Small Businesses Contents Introduction............................................................................................

More information

Cloud Storage Backup for Storage as a Service with AT&T

Cloud Storage Backup for Storage as a Service with AT&T WHITE PAPER: CLOUD STORAGE BACKUP FOR STORAGE AS A SERVICE........ WITH..... AT&T........................... Cloud Storage Backup for Storage as a Service with AT&T Who should read this paper Customers,

More information

Database Storage Management with Veritas Storage Foundation by Symantec Manageability, availability, and superior performance for databases

Database Storage Management with Veritas Storage Foundation by Symantec Manageability, availability, and superior performance for databases Database Storage Management with Veritas Storage Foundation by Symantec Manageability, availability, and superior performance for databases Solution Brief: Database Storage Management Database Storage

More information

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it Complete and high performance protection where you need it Overview delivers high-performance protection against physical and virtual server downtime with policy based prevention, using multiple protection

More information

Confidently Virtualize Business-critical Applications in Microsoft Hyper-V with Symantec ApplicationHA

Confidently Virtualize Business-critical Applications in Microsoft Hyper-V with Symantec ApplicationHA WHITE PAPER: VIRTUALIZE BUSINESS-CRITICAL APPLICATIONS.............. WITH..... CONFIDENCE..................... Confidently Virtualize Business-critical Applications in Microsoft Hyper-V with Symantec ApplicationHA

More information

Endpoint Security More secure. Less complex. Less costs... More control.

Endpoint Security More secure. Less complex. Less costs... More control. Endpoint Security More secure. Less complex. Less costs... More control. Symantec Endpoint Security Today s complex threat landscape constantly shifts and changes to accomplish its ultimate goal to reap

More information

Virtual Machine Protection with Symantec NetBackup 7

Virtual Machine Protection with Symantec NetBackup 7 Overview There s little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped IT departments are racing to embrace the promise of virtualization for

More information

Symantec Backup Exec 2010

Symantec Backup Exec 2010 Reliable Backup and Recovery Designed for Your Growing Business Overview delivers market leading backup and recovery protection from server to desktop. Easily protect more data while you reduce storage

More information

Taking the Leap to Virtualization

Taking the Leap to Virtualization WHITE PAPER: TAKING THE LEAP TO VIRTUALIZATION........................................ Taking the Leap to Virtualization Who should read this paper Midsized Business IT Directors, IT Managers and IT Administration

More information

Veritas NetBackup 6.0 Server Now from Symantec

Veritas NetBackup 6.0 Server Now from Symantec Veritas NetBackup 6.0 Server Now from Symantec Innovative data protection As the recognized leader for enterprise-class backup and recovery, Veritas NetBackup Server software is designed to help provide

More information

Improve Backup Performance by Upgrading to Symantec Backup Exec 12.5 with Service Pack 2

Improve Backup Performance by Upgrading to Symantec Backup Exec 12.5 with Service Pack 2 Improve Backup Performance by Upgrading to Symantec Backup Exec 12.5 with Service Pack 2 Test Report to Show How Existing Backup Exec Customers Can Improve Backup Performance and Reduce Backup Windows

More information

INFORMATION PROTECTED

INFORMATION PROTECTED INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never

More information

Altiris IT Management Suite 7.1 from Symantec

Altiris IT Management Suite 7.1 from Symantec Altiris IT 7.1 Achieve a new level of predictability Overviewview Change is inevitable for IT and it comes from several sources: changing needs from lines of business, managing and supporting too many

More information

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information Store, Manage, and Discover Critical Business Information Trusted and proven email archiving Enterprise Vault, the industry leader in email and content archiving, enables companies to store, manage, and

More information

Best Practices for Managing Storage in the Most Challenging Environments

Best Practices for Managing Storage in the Most Challenging Environments Best Practices for Managing Storage in the Most Challenging Environments Sanjay Srivastava Senior Product Manager, Symantec The Typical Virtualization Adoption Path Today, 20-25% of server workloads are

More information

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE

More information

WHITE PAPER: HIGH CUSTOMIZE AVAILABILITY AND DISASTER RECOVERY

WHITE PAPER: HIGH CUSTOMIZE AVAILABILITY AND DISASTER RECOVERY WHITE PAPER: HIGH CUSTOMIZE AVAILABILITY AND DISASTER RECOVERY Confidence in a connected world. Protecting Business-Critical Applications in a VMware Infrastructure 3 Environment Using Veritas Cluster

More information

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................

More information

Host-based Protection for ATM's

Host-based Protection for ATM's SOLUTION BRIEF:........................................ Host-based Protection for ATM's Who should read this paper ATM manufacturers, system integrators and operators. Content Introduction...........................................................................................................

More information

Symantec Server Management Suite 7.6 powered by Altiris technology

Symantec Server Management Suite 7.6 powered by Altiris technology Symantec Server Management Suite 7.6 powered by Altiris technology Standardized control for distributed, heterogeneous server environments Data Sheet: Endpoint Management Overviewview Symantec Server Management

More information

Altiris IT Management Suite 7.1 from Symantec

Altiris IT Management Suite 7.1 from Symantec Altiris IT Management Suite 7.1 from Achieve a new level of predictability Data Sheet: Endpoint Management Overviewview Change is inevitable for IT and it comes from several sources: changing needs from

More information

Veritas NetBackup 6.0 Database and Application Protection

Veritas NetBackup 6.0 Database and Application Protection Veritas NetBackup 6.0 Database and Application Protection Innovative data protection When it comes to database and application recovery, Symantec has a clear goal in mind simplify the complexity of database

More information

Minimize the impact of downtime and disruption. Replace time-consuming manual processes with fast, automated recovery.

Minimize the impact of downtime and disruption. Replace time-consuming manual processes with fast, automated recovery. Protect Against Business Downtime and Disaster with Rapid, Reliable Backup and Recovery Overview Symantec Backup Exec System Recovery 2010 is a simple, cost-effective backup and recovery solution for small

More information

Solution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments

Solution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments Unified Information Management for Complex Windows Environments The Explosion of Unstructured Information It is estimated that email, documents, presentations, and other types of unstructured information

More information

WHITE PAPER: ENTERPRISE SECURITY. Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions

WHITE PAPER: ENTERPRISE SECURITY. Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions WHITE PAPER: ENTERPRISE SECURITY Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions for Microsoft Exchange Server 2003 and Microsoft SQL Server White Paper: Enterprise Security Symantec

More information

A Guide Through the BPM Maze

A Guide Through the BPM Maze A Guide Through the BPM Maze WHAT TO LOOK FOR IN A COMPLETE BPM SOLUTION With multiple vendors, evolving standards, and ever-changing requirements, it becomes difficult to recognize what meets your BPM

More information

Deploying Global Clusters for Site Disaster Recovery via Symantec Storage Foundation on Infortrend Systems

Deploying Global Clusters for Site Disaster Recovery via Symantec Storage Foundation on Infortrend Systems Deploying Global Clusters for Site Disaster Recovery via Symantec Storage Foundation on Infortrend Systems Application Notes Abstract: This document describes how to apply global clusters in site disaster

More information

Frequently Asked Questions. Frequently Asked Questions: Prioritizing Trust: Certificate Authority Security Best Practices

Frequently Asked Questions. Frequently Asked Questions: Prioritizing Trust: Certificate Authority Security Best Practices FREQUENTLY ASKED QUESTIONS: PRIORITIZING TRUST: CERTIFICATE AUTHORITY SECURITY BEST PRACTICES Frequently Asked Questions Frequently Asked Questions: Prioritizing Trust: Certificate Authority Security Best

More information

Data Sheet: Backup & Recovery Symantec Backup Exec System Recovery The Gold Standard in Complete Windows System Recovery

Data Sheet: Backup & Recovery Symantec Backup Exec System Recovery The Gold Standard in Complete Windows System Recovery The Gold Standard in Complete Windows System Recovery Overview Symantec Backup Exec System Recovery 8.5 is a complete, disk-based system recovery solution for Microsoft Windows based servers, desktops,

More information

Direct virtual machine creation from backup with BMR

Direct virtual machine creation from backup with BMR NETBACKUP 7.6 FEATURE BRIEFING DIRECT VIRTUAL MACHINE CREATION FROM BACKUP WITH BMR NetBackup 7.6 Feature Briefing Direct virtual machine creation from backup with BMR Version number: 1.0 Issue date: 5

More information

PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud

PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud Blue skies ahead? Yes if you are protected when you move to the cloud. Lately, it seems as if every enterprise

More information

Symantec Enterprise Vault for Lotus Domino

Symantec Enterprise Vault for Lotus Domino Symantec Enterprise Vault for Lotus Domino Store, Manage and Discover Critical Business Information Overview Industry-leading email archiving for Lotus Domino With the recognition that email has become

More information

Reducing the cost and complexity of endpoint management

Reducing the cost and complexity of endpoint management IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and

More information

Symantec NetBackup 7.5 for VMware

Symantec NetBackup 7.5 for VMware V-Ray visibility into virtual machine protection Solution Overview: Data Protection Overview There is little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped

More information

Solution Brief: Enterprise Security

Solution Brief: Enterprise Security Symantec Brightmail Gateway and VMware Solution Brief: Enterprise Security Symantec Brightmail Gateway and VMware Contents Corporate overview......................................................................................

More information

Symantec Backup Exec System Recovery

Symantec Backup Exec System Recovery Symantec Backup Exec System Recovery The Gold Standard in Complete Windows System Recovery Overview 7.0 is a complete, disk-based system recovery solution for Microsoft Windows based servers, desktops,

More information

Symantec Protection Suite Small Business Edition

Symantec Protection Suite Small Business Edition Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business Edition is an easyto-use, all-in-one suite that secures your critical business assets and information against today

More information

Injazat s Managed Services Portfolio

Injazat s Managed Services Portfolio Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.

More information

Data Sheet: Data Protection Veritas NetBackup 6.5 NetBackup Enterprise Server- Next Generation Data Protection

Data Sheet: Data Protection Veritas NetBackup 6.5 NetBackup Enterprise Server- Next Generation Data Protection NetBackup Enterprise Server- Next Generation Data Protection Overview As an established market leader in enterprise backup and recovery, Veritas NetBackup provides unparalleled data protection for enterprise

More information

Optimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems

Optimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems Symantec Backup Exec 12.5 for Windows Small Business Server Premium and Standard Editions Comprehensive data protection and system recovery for Microsoft Windows Small Business Server Overview Symantec

More information

Symantec NetBackup Snapshots, Continuous Data Protection, and Replication

Symantec NetBackup Snapshots, Continuous Data Protection, and Replication Symantec NetBackup Snapshots, Continuous Data Protection, and Replication Technical Brief: Symantec NetBackup Symantec NetBackup Snapshots, Continuous Data Protection, and Replication Contents Overview...............................................................................................

More information

V1.4. Spambrella Email Continuity SaaS. August 2

V1.4. Spambrella Email Continuity SaaS. August 2 V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable

More information

The Modern Service Desk: How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver Business Confidence

The Modern Service Desk: How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver Business Confidence How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver White Paper: BEST PRACTICES The Modern Service Desk: Contents Introduction............................................................................................

More information

Data Sheet: Archiving Altiris Client Management Suite 7.0 from Symantec Deploy, manage, secure, and troubleshoot

Data Sheet: Archiving Altiris Client Management Suite 7.0 from Symantec Deploy, manage, secure, and troubleshoot Deploy, manage, secure, and troubleshoot Overview The cost of a PC is only a small part of its total cost. Nearly 80 percent of the total cost of owning a client system goes toward the support and maintenance

More information

Business-centric Storage for small and medium-sized enterprises. How ETERNUS DX powered by Intel Xeon processors improves data management

Business-centric Storage for small and medium-sized enterprises. How ETERNUS DX powered by Intel Xeon processors improves data management Business-centric Storage for small and medium-sized enterprises How DX powered by Intel Xeon processors improves data management Data management requirements are increasing day by day Storage administrators

More information

Altiris Server Management Suite 7.1 from Symantec

Altiris Server Management Suite 7.1 from Symantec Altiris Server Suite 7.1 from Symantec Standardized control for distributed, heterogeneous server environments Data Sheet: Endpoint Overview The complexity of managing today s data centers is complicated

More information

Storage management and business continuity strategy and futures

Storage management and business continuity strategy and futures #SymVisionEmea #SymVisionEmea Storage management and business continuity strategy and futures Petter Sveum Information Availability Solution Lead EMEA Ian Wood Information Management Strategy & GTM Storage

More information

Data Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review

Data Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review Accelerate e-discovery and simplify review Overview provides IT/Legal liaisons, investigators, lawyers, paralegals and HR professionals the ability to search, preserve and review information across the

More information

MITA Information Series

MITA Information Series MITA Information Series 1. What is MITA? An Overview 2. MITA and APDs 3. Planning for MITA An Introduction to Transition Planning 4. What is a MITA Hub? 5. Service-Oriented Architecture A Primer 6. The

More information

Archiving, Backup, and Recovery for Complete the Promise of Virtualization

Archiving, Backup, and Recovery for Complete the Promise of Virtualization Archiving, Backup, and Recovery for Complete the Promise of Virtualization Unified information management for enterprise Windows environments The explosion of unstructured information It is estimated that

More information

Symantec Client Management Suite 8.0

Symantec Client Management Suite 8.0 IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,

More information

An ICT ConsultingCompany

An ICT ConsultingCompany An ICT ConsultingCompany About Us Innovation Experience Market leader technologies Solutions that ensure the best performance through efficiency An ICT Consulting Company 2 Our Mission Improvement of business

More information

Symantec Control Compliance Suite Standards Manager

Symantec Control Compliance Suite Standards Manager Symantec Control Compliance Suite Standards Manager Automate Security Configuration Assessments. Discover Rogue Networks & Assets. Harden the Data Center. Data Sheet: Security Management Control Compliance

More information

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security

More information

Business-centric Storage for small and medium-sized enterprises. How ETERNUS DX powered by Intel Xeon processors improves data management

Business-centric Storage for small and medium-sized enterprises. How ETERNUS DX powered by Intel Xeon processors improves data management Business-centric Storage for small and medium-sized enterprises How DX powered by Intel Xeon processors improves data management DX Online Storage Family Architecture DX60 S2 DX100 S3 DX200 S3 Flexible

More information

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management for Configuration Manager 7.2 Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices

More information

Data Sheet: Backup & Recovery Symantec Backup Exec System Recovery Windows Small Business Server Edition

Data Sheet: Backup & Recovery Symantec Backup Exec System Recovery Windows Small Business Server Edition Symantec Backup Exec System Recovery Windows Small Business Server Edition Overview Regardless of the size of your company, data drives your business. Your ability to keep that data available can often

More information

McAfee Acquires NitroSecurity

McAfee Acquires NitroSecurity McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security

More information

VERITAS Business Solutions. for DB2

VERITAS Business Solutions. for DB2 VERITAS Business Solutions for DB2 V E R I T A S W H I T E P A P E R Table of Contents............................................................. 1 VERITAS Database Edition for DB2............................................................

More information

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Technical white paper Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Table of contents Executive summary... 2 Introduction... 2 What is NDMP?... 2 Technology overview... 3 HP

More information

Asset Discovery with Symantec Control Compliance Suite

Asset Discovery with Symantec Control Compliance Suite WHITE PAPER: ASSET DISCOVERY WITH SYMANTEC CONTROL COMPLIANCE............. SUITE........................... Asset Discovery with Symantec Control Compliance Suite Who should read this paper IT Operations

More information

Why cloud backup? Top 10 reasons

Why cloud backup? Top 10 reasons Why cloud backup? Top 10 reasons HP Autonomy solutions Table of contents 3 Achieve disaster recovery with secure offsite cloud backup 4 Free yourself from manual and complex tape backup tasks 4 Get predictable

More information

How to Manage Critical Data Stored in Microsoft Exchange Server 2010. By Hitachi Data Systems

How to Manage Critical Data Stored in Microsoft Exchange Server 2010. By Hitachi Data Systems W H I T E P A P E R How to Manage Critical Data Stored in Microsoft Exchange Server 2010 By Hitachi Data Systems April 2012 2 Table of Contents Executive Summary and Introduction 3 Mission-critical Microsoft

More information

Data Sheet: Endpoint Management Altiris Client Management Suite 7.0 Deploy, manage, secure, and troubleshoot

Data Sheet: Endpoint Management Altiris Client Management Suite 7.0 Deploy, manage, secure, and troubleshoot Deploy, manage, secure, and troubleshoot Overview The cost of a PC is only a small part of its total cost. Nearly 80 percent of the total cost of owning a client system goes toward the support and maintenance

More information

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration Solutions Integrated Storage Appliances Management Optimized Storage & Migration Archive Data Retention & Compliance Services Global Installation & Support SECURING THE FUTURE OF YOUR DATA w w w.q sta

More information

Instant Recovery for VMware

Instant Recovery for VMware NETBACKUP 7.6 FEATURE BRIEFING INSTANT RECOVERY FOR VMWARE NetBackup 7.6 Feature Briefing Instant Recovery for VMware Version number: 1.0 Issue date: 2 nd August 2013 This document describes a feature

More information

TECHNOLOGY BRIEF: ENTERPRISE IT MANAGEMENT (EITM) Driving Nation-wide IT Enablement and e-governance Projects Through Enterprise IT Management

TECHNOLOGY BRIEF: ENTERPRISE IT MANAGEMENT (EITM) Driving Nation-wide IT Enablement and e-governance Projects Through Enterprise IT Management TECHNOLOGY BRIEF: ENTERPRISE IT MANAGEMENT (EITM) Driving Nation-wide IT Enablement and e-governance Projects Through Enterprise IT Management Table of Contents Executive Summary SECTION 1: CHALLENGE Managing

More information