Information Security Recommendation Report

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Information Security Recommendation Report"

Transcription

1 Information Security Recommendation Report Prepared for Baker and Company Prepared by Alma Ruiz May 3, 2013

2

3 Table of Contents ii Table of Contents Introduction... 1 Methods for Evaluation... 3 Results of the Evaluation... 5 Option 1: Symantec Endpoint Software... 7 Option 2: VIPRE Business Premium... 9 Option 3: Kaspersky Total Business Security Option 4: ESET Endpoint Security Overall Results Conclusion Recommendation... 19

4

5 Introduction 1 Introduction The recommendation report will help Baker and Company to improve their information security in order to protect sensitive data. I list the most optimal information security software suited for a business setting and having a low cost. In order to implement these changes while maintaining a low cost, I give you these options below: 1. Symantec Endpoint Protection 2. VIPRE Business Premium 3. Kaspersky Total Business Security 4. ESET Endpoint Security In the report, I evaluate the four options on the following criteria: cost, features, software compatibility, support, and memory usage. In this report, I will give my conclusion based on the results of each software and give the recommendation on what is most optimal for Baker and Company. The report will help Baker and Company determine the ideal information security software by using the results from this report.

6

7 Methods for Evaluation 3 Methods for Evaluation As mentioned in the Introduction, I give you these options and evaluate each of them in order to recommend the most optimal software. Here are the options: 1. Symantec Endpoint Protection 2. VIPRE Business Premium 3. Kaspersky Total Business Security 4. ESET Endpoint Security The reason I chose these options is because they re the most optimal software for a business setting while still achieving a cost-efficient license or subscription. Since the company needs 150 computers protected, the options provide a low cost for the quantity of computers. In order to gather information for the evaluation, I created a list of criteria and examined each criterion for each option. I evaluate each option using these criteria below: Cost of the software Features Software compatibility Support Memory Usage I will use a scale of 1 to 5 for each criterion with 1 meaning poor and 5 meaning great. Once I scored each criterion, I add up the total scores for each software option. After I add the total scores, I would recommend the option with the highest score. Cost of software: Any business would save money by spending on the least expensive, yet efficient software. I check the unit price of each quantity of computers. Usually, the unit price goes lower when the quantity of computers is higher. I calculate the total cost by multiplying the unit price to the quantity of computers. In order to simplify the matter, I calculate the costs for only 1-year subscription or license. Usually, the license or subscription includes support in their costs. Features: Each software contains its own special set of features. I list the features that each software contains. Usually most software contains features such as anti-virus, antispyware, firewall, monitoring, and data accessibility as they are the main components of information security. In the report, I focus on the software s key features that distinct them from other software. Software compatibility: When searching for reliable software, the company must check the system requirements. If a company were to purchase a software that is incompatible with the computers systems, the company would have wasted an average of $5,000. Software must be

8 4 Information Security Recommendation Report compatible with the computers system and servers. In this report, I use a table listing each operating systems and servers the software is able to run. Support: When opting for an information security software, the company should check the support services. A strong and reliable support service can help the company when it is dealing with technical difficulties. I evaluate what each support service offers, their hours of operation, and languages available. Memory Usage: Each software uses different amounts of memory and space. Companies prefer software that uses less memory and space as computers can slow down due to a lack of memory space. If the computer slows down due to the lack of memory and space, this can hurt the company. I examined the system requirements of each software and put down the memory the software uses.

9 Results of the Evaluation 5 Results of the Evaluation I evaluated the four options to determine which information security software is the most optimal for Baker and Company. I evaluated these options according to the criteria of cost, features, software compatibility, support, and memory usage. The next four pages give a detailed evaluation of each option based on the criteria. The fifth page gives a table showing the scores to each criterion and the overall score of each option.

10

11 Results of the Evaluation 7 Option 1: Symantec Endpoint Software Cost: Since Baker and Company needs 150 computers protected from outside threats, Symantec charges $39.82 per unit for a quantity of 100 to 249 computers. The license includes a 1-year support as well. By calculating the total cost, I multiply $39.82 to 150 which equals to $5,973. Please note the license also includes support in their prices. Features: The software contains features such as: Antivirus/Antispyware Desktop Firewall/Intrusion Detection and Prevention Insight/SONAR identifies suspicious behavior and stops new threats Protection for Mac/Windows/Linux Device and application control Network access control Protection for servers, laptops, and desktops Monitoring and management APIs VMware vshield allows higher virtual machine density and reduces CPU usage Software compatibility: The table below gives the system server and hardware requirements needed for the software. Windows Operating Systems Windows XP (32-bit, 64-bit) (SP2 or later) Windows XP Embedded (SP2 or later) Windows Vista (32-bit, 64-bit) Windows Server 2003 (32-bit, 64-bit) Windows Server 2008 (32-bit, 64-bit) Windows Server 2012 (32-bit, 64-bit) Windows 7 (32-bit, 64-bit) Windows Small Business Server 2011 (64-bit) Windows 7 Embedded Windows Essential Business Server 2008 (64-bit) Windows 8 (32-bit, 64-bit) Macintosh Operating Systems Mac OS X , 10.7, 10.8 Mac OS X Server 10.6, 10.7, 10.8 Linux Operating Systems (32-bit, 64-bit) Red Hat Enterprise Linux SuSE Linux Enterprise (server/desktop) Novell Open Enterprise Server Oracle Linux VMware ES Ubuntu Debian Fedora

12 8 Information Security Recommendation Report Shown in the table, Symantec Endpoint Software supports many operating systems and servers, including Macintosh and Linux. Support: The support services include 24/7 telephone access to support engineers. The support includes downloadable software upgrades, updates, and packages. With support, the company can access to the Support Knowledge Base and to the Symantec Connect Security Forum. Symantec offers non-technical support such as licensing and serialization questions related to the product. Support only offers one language available which is English. Memory Usage: Symantec Endpoint Software requires 850 MB of free space on the hard drive and 512 MB of memory.

13 Results of the Evaluation 9 Option 2: VIPRE Business Premium Cost: VIPRE Business Premium charges on a cost-efficient per computer and per year subscription basis. Since Baker and Company needs about 150 computers protected, VIPRE charges $13.40 for a quantity of computers without support included. The overall cost without support included becomes $2,010 if you multiply the unit price with the number of computers. Support costs $2.68 for a quantity of computers. The price includes support outside of normal business hours. By multiplying $2.68 to 150, the total cost for support becomes $402. With support added to the cost, it equals to $2,412. Features: Small-footprint anti-malware agent Patch management Mobile Device Management Mac desktop and laptop security protection for PCs Bad website blocking Anti-phishing Advanced threat monitoring Real-time threat detection Removable device scanning Unprotected computer identification Software Compatibility: The table below shows the system requirements for VIPRE Business Premium. Windows Operating Systems Windows XP Professional SP3 (32-bit, 64-bit) Windows Vista (32-bit, 64-bit) Windows 7 (32-bit, 64-bit) Windows Server 2003 (32-bit, 64-bit) Windows Server 2008 (32-bit, 64-bit) Windows Server 2012 (32-bit, 64-bit) Windows 8 (32-bit, 64-bit) Windows Small Business Server 2003, 2008, 2011 Windows Essential Business Server 2008 (64-bit) Macintosh Operating Systems Mac OS X 10.6 (Snow Leopard) Mac OS X 10.7 (Lion) Mac OS X 10.8 (Mountain Lion) As shown in the table, VIPRE Business Premium supports Windows Operating Systems and Macintosh Operating Systems.

14 10 Information Security Recommendation Report Support: Unlike the other options, VIPRE excludes support in the 1-year subscription. You must purchase the support separately, and it costs $2.68 per unit. Support includes free upgrades to their customers with no need for a new license key. Support offers access to their knowledge base which contains articles to help solve your problem. VIPRE offers 24/7 support. Memory Usage: To run VIPRE Business Premium, the computers must have 300 MB of free space on the hard drive and 512 MB of memory.

15 Results of the Evaluation 11 Option 3: Kaspersky Total Business Security Cost: Kaspersky Total Business Security charges $43.08 per unit for a quantity of 150. By multiplying the cost and the quantity, the total cost becomes $6,462. The license includes support as part of the cost. Unlike the other options where you can purchase their products through their main website, the company must purchase the software through an authorized reseller. Features: Kaspersky Total Business Security contains features such as: Anti-Malware for Workstations Anti-Malware for File Servers Systems Management Encryption Mobile Security Mobile Device Management Controls (Application, Device, Web) Security for Mail Security for Internet Gateways Security for Collaboration Unified Management Console Software Compatibility: The table below shows the system requirements for Kaspersky Total Business Security. Windows Operating Systems Windows XP (SP2 and above) Windows XP Professional x64 Edition (SP2 and above) Windows Vista (32-bit, 64-bit) Windows 7 (32-bit, 64-bit) Windows 8 (32-bit, 64-bit) Macintosh Operating Systems Mac OS X 10.4 (Tiger) Mac OS X Server 10.6 Mac OS X 10.5 (Leopard) Mac OS X 10.6 (Snow Leopard) Linux Operating Systems Red Hat Enterprise Linux 5.5 Desktop Fedora 13 SUSE Linux Enterprise Desktop 11 SP1 SUSE Linux Enterprise Desktop 10 SP3 CentOS-5.5 opensuse Linux 11.3 Debian GNU/Linux Ubuntu LTS Desktop Edition As shown, the software supports Windows, Macintosh, and Linux operating systems.

16 12 Information Security Recommendation Report Support: Support includes help with errors concerning product functionality, false detections from the product, and the recovery of lost or damaged license information. Support provides hours of 10:00AM to 6:00PM only during the weekdays. Support services include languages in English, French, German, Russian, Italian, Spanish, and other languages. Memory Usage: Kaspersky Total Business Security requires 2 GB of free space on the hard drive and 512 MB of memory.

17 Results of the Evaluation 13 Option 4: ESET Endpoint Security Cost: ESET Endpoint Security charges $24.69 on a 1-year license for a quantity of computers. The license includes technical support. By multiplying the cost to the quantity, the total cost equals to $ Features: Antivirus/antispyware Host-based Intrusion Prevention System Antispam Virtual environments support Device control and removable media scanning Web control Trusted network detection Two-way firewall Microsoft NAP and Cisco NAC support Remote Administrator Remote module switch Device control reports Software Compatibility: The table below shows ESET Endpoint Security Windows Operating System Windows 2000 Windows XP (32-bit, 64-bit) Windows 7 (32-bit, 64-bit) Windows 8 (32-bit, 64-bit) Windows Server 2003 (32-bit, 64-bit) Windows Server 2008 (32-bit, 64-bit) Windows Server 2012 (32-bit, 64-bit) As you can see in the table, ESET only supports Windows operating systems and servers. Support: ESET offers consulting services for incident response, threat mitigation, technical audits, and administrative scripting. Support includes onsite or remote engineer assistance when implementing ESET security products. Support offers malware identification and removal services. Support also includes recommendations to the computer environment running ESET products. Memory usage: To run ESET Endpoint Security, the computers must have 2 GB of free space on the hard drive and 1 GB of memory.

18

19 Results 15 Overall Results The table below shows the scores for each criterion and the total scores for each option. The most optimal option has the highest score. Cost Features Software Support Memory Total Compatibility Usage Score Symantec VIPRE Kaspersky ESET poor; 2 fair; 3 average, 4 good; 5 best

20

21 Conclusion 17 Conclusion Option 1 (Symantec Endpoint Software) charges an above-average price, contains the most optimal features, and uses little memory and space. However, Symantec has average support due to the only having one language (English) available. Option 2 (VIPRE Business Premium) charges a low cost and uses the least memory and space. VIPRE offers decent features and can only run in Windows and Macintosh operating systems. VIPRE offers mediocre support compared to other options. Option 3 (Kaspersky Total Business Security) charges the highest cost out of the four options and uses the most memory and space. Kaspersky offers decent features and can run in Windows, Macintosh, and Linux operating systems. Kaspersky offers decent support, but has limited hours of operation. Option 4 (ESET Endpoint Security) charges a low cost, contains decent features, and offers great support. However, ESET uses the most memory and can only run in Windows operating system.

22

23 Recommendation 19 Recommendation After evaluating each option based on the criteria I provided, I recommend Option 1 (Symantec Endpoint Security). While Symantec charges an above-average price, the software contains the most optimal features and uses the least memory out of the four options. In addition, Symantec can run in Windows, Macintosh, and Linux operating systems and servers.

Symantec Endpoint Protection

Symantec Endpoint Protection The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,

More information

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

Kaspersky Anti-Virus

Kaspersky Anti-Virus Kaspersky Anti-Virus >> Enterprise Proof of Concept (PoC) Request Form Dear Kaspersky Lab Prospect, To facilitate the proof of concept (PoC) process, we require the following form which documents your

More information

Symantec Endpoint Protection 12.1.5 Datasheet

Symantec Endpoint Protection 12.1.5 Datasheet Symantec Endpoint Protection 12.1.5 Datasheet Data Sheet: Endpoint Security Overview Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that

More information

Symantec Protection Suite Small Business Edition

Symantec Protection Suite Small Business Edition Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business is an easyto-use, all-in-one suite that secures your critical business assets and information against today s complex

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

Symantec Protection Suite Small Business Edition

Symantec Protection Suite Small Business Edition Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business Edition is an easyto-use, all-in-one suite that secures your critical business assets and information against today

More information

BITDEFENDER ENDPOINT SECURITY TOOLS

BITDEFENDER ENDPOINT SECURITY TOOLS BITDEFENDER ENDPOINT SECURITY TOOLS Beta Version Testing Guide Bitdefender Endpoint Security Tools Beta Version Testing Guide Publication date 2014.11.26 Copyright 2014 Bitdefender Legal Notice All rights

More information

Symantec Protection Suite Small Business Edition

Symantec Protection Suite Small Business Edition Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business Edition is an easy-to-use, all-in-one suite that secures your critical business assets and information against

More information

Symantec Protection Suite SMB Family: Comparison Matrices and Migration. Presentation Identifier Goes Here 1

Symantec Protection Suite SMB Family: Comparison Matrices and Migration. Presentation Identifier Goes Here 1 SMB Family: Comparison Matrices and Migration Presentation Identifier Goes Here 1 Core Family Matrix Customer pain point delivers Cost-conscious All-in-one Robust and flexible Small Business Advanced Business

More information

PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM

PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM EMPLOYEES WORK ON THE MOVE, WITH MULTIPLE DEVICES MEETING CUSTOMERS WORKING FROM HOME BUSINESS TRIP CLOUD SERVICES ARE ENABLERS OF MOBILE

More information

CA Anti-Virus r8.1. Benefits. Overview. CA Advantage

CA Anti-Virus r8.1. Benefits. Overview. CA Advantage PRODUCT BRIEF: CA ANTI-VIRUS CA Anti-Virus r8.1 CA ANTI-VIRUS IS THE NEXT GENERATION IN COMPREHENSIVE ANTI-VIRUS SECURITY FOR BUSINESS PCS, SERVERS AND PDAS. IT COMBINES PROACTIVE PROTECTION AGAINST MALWARE

More information

NetSupport Manager v11

NetSupport Manager v11 Remote Support For Any Environment NetSupport Manager v11 NetSupport Manager has been helping organizations optimize the delivery of their IT support services since 1989 and while the use of Remote Control

More information

Shipping Products Chart. Contents

Shipping Products Chart. Contents Shipping Products Chart Currently shipping EVault Software products and supported platforms Contents Director (Vault) and Related Products Director (Vault) 7.11d ()... 2 Director Management Console (console

More information

Shipping Products Chart. Contents

Shipping Products Chart. Contents Shipping Products Chart Currently shipping EVault Software products and supported platforms Contents Director (Vault) and Related Products Director (Vault) 7.02b ()... 2 Director Console (console only)

More information

Open Cloud Store. End-user manual. For

Open Cloud Store. End-user manual. For Open Cloud Store - End-user manual For 1 Version control... 3 2 Introduction to BackupAgent... 4 3 Configuring BackupAgent... 5 3.1 Create a BackupAgent account... 5 3.2 Download and install the BackupAgent

More information

Shipping Products Chart. Contents

Shipping Products Chart. Contents Shipping Products Chart Currently shipping EVault Software products and supported platforms Contents Director (Vault) and Related Products Director (Vault) 7.11c ()... 2 Director Management Console (console

More information

Symantec Endpoint Protection

Symantec Endpoint Protection The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

Symantec Multi-tier Protection

Symantec Multi-tier Protection Trusted protection from malware and email-borne threats for multiplatform environments Overview safeguards enterprise assets and lowers risk by providing unmatched protection against threats for laptops,

More information

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Kaspersky Endpoint Security 10 for Windows. Deployment guide Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses

More information

Operating Systems compatible with GigasoftOBM / GigasoftACB (Supported Operation System List):

Operating Systems compatible with GigasoftOBM / GigasoftACB (Supported Operation System List): Product Version: Gigasoft Software: Post6.0 Description: This document lists the available operating systems, platforms, and applications specifically tested to be compatible with Ahsay software. Contents:

More information

www.faronics.com Faronics Products SYSTEM REQUIREMENTS Last modified: October 2014

www.faronics.com Faronics Products SYSTEM REQUIREMENTS Last modified: October 2014 Faronics Products SYSTEM REQUIREMENTS Last modified: October 2014 Faronics Toll Free Tel: 800-943-6422 Toll Free Fax: 800-943-6488 International Tel: +1 604-637-3333 International Fax: +1 604-637-8188

More information

Supported Platforms CLOUD DISASTER RECOVERY

Supported Platforms CLOUD DISASTER RECOVERY 2016 Supported Platforms CLOUD DISASTER RECOVERY Contents CDR 24/48... 2 CDR 1- Hour... 4 Self Managed... 4 Page 1 www.evault.com / info@evault.com / Phone: 877.382.8581 / Fax: 510.903.7200 April 12, 2016

More information

for businesses with more than 25 seats

for businesses with more than 25 seats for businesses with more than 25 seats ESET Business Solutions 1/6 Whether your business is just starting out or is established, there are a few things that you should expect from the software you use

More information

INFORMATION PROTECTED

INFORMATION PROTECTED INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never

More information

Release Notes. NCP Secure Enterprise HA Server. 1. New Features and Enhancements. Service Release 3.03 Build 011 (Linux 32/64) October 2012

Release Notes. NCP Secure Enterprise HA Server. 1. New Features and Enhancements. Service Release 3.03 Build 011 (Linux 32/64) October 2012 NCP Secure Enterprise HA Server Service Release 3.03 Build 011 (Linux 32/64) October 2012 Prerequisites NCP Secure Enterprise VPN Server for Linux in HA Environments If the Linux VPN Server (version 8.10)

More information

DraftSight Frequently Asked Questions

DraftSight Frequently Asked Questions DraftSight Frequently Asked Questions What is DraftSight TM? DraftSight is a free*, professional-grade 2D CAD product centered upon an open business model. Available for download at DraftSight.com, DraftSight

More information

BMC Client Management - Technical Specifications. Version 12.0

BMC Client Management - Technical Specifications. Version 12.0 BMC Client Management - Technical Specifications Version 12.0 Legal Notices Copyright 1999, 2009 BMC Software, Inc. Copyright 1994-2014 Numara Software, Inc. BMC, BMC Software, and the BMC Software logo

More information

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE AUSTRALIA

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE AUSTRALIA TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE AUSTRALIA WELCOME TO TELSTRA CLOUD SERVICES Our cloud infrastructure solutions are made up of a combination of scalable cloud resources, including

More information

Nessus Agents. October 2015

Nessus Agents. October 2015 Nessus Agents October 2015 Table of Contents Introduction... 3 What Are Nessus Agents?... 3 Scanning... 4 Results... 6 Conclusion... 6 About Tenable Network Security... 6 2 Introduction Today s changing

More information

Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser

Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser Security and Billing for Azure Pack Presented by 5nine Software and Cloud Cruiser Meet our Speakers Symon Perriman VP of Business Development 5nine Software symon@5nine.com @SymonPerriman Paul Zinn Senior

More information

Symantec Endpoint Protection 12.1.6 MP1a and 12.1.6 MP1 Release Notes

Symantec Endpoint Protection 12.1.6 MP1a and 12.1.6 MP1 Release Notes Symantec Endpoint Protection 12.1.6 MP1a and 12.1.6 MP1 Release Notes Symantec Endpoint Protection Release Notes Product version: 12.1.6 MP1a / 12.1.6 MP1 Documentation version: 1 This document was last

More information

SNOW LICENSE MANAGER (7.X)... 3

SNOW LICENSE MANAGER (7.X)... 3 SYSTEM REQUIREMENTS Products Snow License Manager Snow Inventory Server, IDR, IDP Client for Windows Client for Linux Client for Unix Client for OS X Oracle Scanner External Data Provider Snow Distribution

More information

Microsoft Windows Apple Mac OS X

Microsoft Windows Apple Mac OS X Products Snow License Manager Snow Inventory Server, IDP, IDR Client for Windows Client for OS X Client for Linux Client for Unix Oracle Scanner External Data Provider Snow Distribution Date 2014-04-02

More information

Backup Exec 15 Software Compatibility List (SCL)

Backup Exec 15 Software Compatibility List (SCL) Backup Exec 15 Software Compatibility List (SCL) Updated on September 03, 2015 Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Backup Exec are trademarks or registered

More information

Kaspersky Endpoint Security 8 for Linux INSTALLATION GUIDE

Kaspersky Endpoint Security 8 for Linux INSTALLATION GUIDE Kaspersky Endpoint Security 8 for Linux INSTALLATION GUIDE A P P L I C A T I O N V E R S I O N : 8. 0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your

More information

GravityZone INSTALLATION GUIDE

GravityZone INSTALLATION GUIDE GravityZone INSTALLATION GUIDE Bitdefender GravityZone Installation Guide Publication date 2015.10.01 Copyright 2015 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

Backup Exec 2014 Software Compatibility List (SCL)

Backup Exec 2014 Software Compatibility List (SCL) Backup Exec 2014 Software Compatibility List (SCL) Updated on January 28, 2015 Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Backup Exec are trademarks or registered

More information

Microsoft Windows Apple Mac OS X

Microsoft Windows Apple Mac OS X Products Snow License Manager Snow Inventory Server, IDP, IDR Client for Windows Client for OSX Client for Linux Client for Unix Oracle Scanner External Data Provider Snow Distribution Date 2014-02-12

More information

Shipping Products Chart. Contents

Shipping Products Chart. Contents Shipping Products Chart Currently shipping EVault Software products and supported platforms Contents Director (Vault) and Related Products Director (Vault) 7.11e ()... 2 Director Management Console (console

More information

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex

More information

Platform Guide. SA Supported Platforms. Service Package Version 7.4R1

Platform Guide. SA Supported Platforms. Service Package Version 7.4R1 Platform Guide Service Package Version 7.4R1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 or 888-JUNIPER www.juniper.net February 2013 Pageiof9 Contents Introduction...

More information

escan Corporate Edition User Guide

escan Corporate Edition User Guide Anti-Virus & Content Security escan Corporate Edition (with Hybrid Network Support) User Guide www.escanav.com sales@escanav.com The software described in this guide is furnished under a license agreement

More information

Bitdefender GravityZone Sales Presentation

Bitdefender GravityZone Sales Presentation 6 March 2014 Page 1 Bitdefender GravityZone Sales Presentation 1 Page 2 Bitdefender at a Glance The #1 Anti-Malware Security Technology in the world First security software vendor to receive top recommendations

More information

What s New. Remote Support For Any Environment. www.netsupportmanager.com

What s New. Remote Support For Any Environment. www.netsupportmanager.com NETSUPPO RT R MANAGE 12 Remote Support For Any Environment Multi-platform Remote Control Mobile Control from ios and Android Windows 8 / 8.1 support Interactive Thumbnail Views Systems Management and Inventory

More information

Platform Guide. SA Supported Platforms. Service Package Version 7.3R1

Platform Guide. SA Supported Platforms. Service Package Version 7.3R1 Platform Guide Service Package Version 7.3R1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 or 888-JUNIPER www.juniper.net September 2012 Pageiof9 Contents Introduction...

More information

Shipping Products Chart. Contents

Shipping Products Chart. Contents Shipping Products Chart Currently shipping EVault Software products and supported platforms Contents Director (Vault) and Related Products Director (Vault) 8.00b ()... 2 Director Management Console (console

More information

GravityZone INSTALLATION GUIDE

GravityZone INSTALLATION GUIDE GravityZone INSTALLATION GUIDE Bitdefender GravityZone Installation Guide Publication date 2015.09.25 Copyright 2015 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME

OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME We believe that everyone from home computer users and small companies, to large corporations and governments has the right to be free from cybersecurity

More information

VB100 Results Overview: Eset

VB100 Results Overview: Eset VB100 Results Overview: Eset 59 Success / 3 Failure / 5 No Entry Test history December 2009 - ESET NOD32 Antivirus 5 Product name: ESET NOD32 Antivirus 5 More: December 2009 in full Review: ESET NOD32

More information

avast! Business products 2014 Introducing the new features and technologies in the latest lineup of avast! security solutions for business.

avast! Business products 2014 Introducing the new features and technologies in the latest lineup of avast! security solutions for business. avast! Business products 2014 Introducing the new features and technologies in the latest lineup of avast! security solutions for business. Content 1. 2. 3. 4. 5. 6. 7. 8. 11. 14. 15. 16. 17. Why avast!

More information

IBM Tivoli Endpoint Manager for Security and Compliance

IBM Tivoli Endpoint Manager for Security and Compliance IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

SNOW LICENSE MANAGER (7.X)... 3

SNOW LICENSE MANAGER (7.X)... 3 SYSTEM REQUIREMENTS Products Snow License Manager Software Store Option Snow Inventory Server, IDR, IDP Client for Windows Client for Linux Client for Unix Client for OS X Oracle Scanner Snow Integration

More information

Altiris IT Management Suite 7.1 from Symantec

Altiris IT Management Suite 7.1 from Symantec Altiris IT 7.1 Achieve a new level of predictability Overviewview Change is inevitable for IT and it comes from several sources: changing needs from lines of business, managing and supporting too many

More information

Parallels Virtualization SDK ReadMe -------------------------------------------------------------------------------- CONTENTS:

Parallels Virtualization SDK ReadMe -------------------------------------------------------------------------------- CONTENTS: Parallels Virtualization SDK ReadMe CONTENTS: 1. About Parallels Virtualization SDK 2. System Requirements 2.1. Mac OS Client Computers 2.2. Windows Client Computers 2.3. Linux Client Computers 3. Network

More information

World-class security solutions for your business. Business Products. C a t a l o g u e

World-class security solutions for your business. Business Products. C a t a l o g u e World-class security solutions for your business Business Products C a t a l o g u e About Kaspersky Lab Kaspersky Lab is the largest developer of secure content management systems in Europe and is among

More information

Copyright 1999-2011 by Parallels Holdings, Ltd. All rights reserved.

Copyright 1999-2011 by Parallels Holdings, Ltd. All rights reserved. Parallels Virtuozzo Containers 4.0 for Linux Readme Copyright 1999-2011 by Parallels Holdings, Ltd. All rights reserved. This document provides the first-priority information on Parallels Virtuozzo Containers

More information

System Requirements and Platform Support Guide

System Requirements and Platform Support Guide Foglight 5.6.7 System Requirements and Platform Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

BitDefender Client Security Workstation Security and Management

BitDefender Client Security Workstation Security and Management BitDefender Client Security Workstation Security and Management BitDefender Client Security is an easy to use business security and management solution, which delivers superior proactive protection from

More information

Comparing Free Virtualization Products

Comparing Free Virtualization Products A S P E I T Tr a i n i n g Comparing Free Virtualization Products A WHITE PAPER PREPARED FOR ASPE BY TONY UNGRUHE www.aspe-it.com toll-free: 877-800-5221 Comparing Free Virtualization Products In this

More information

Symantec Client Management Suite 8.0

Symantec Client Management Suite 8.0 IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,

More information

GravityZone INSTALLATION GUIDE

GravityZone INSTALLATION GUIDE GravityZone INSTALLATION GUIDE Bitdefender GravityZone Installation Guide Publication date 2015.10.28 Copyright 2015 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

Data Sheet: Archiving Altiris Client Management Suite 7.0 from Symantec Deploy, manage, secure, and troubleshoot

Data Sheet: Archiving Altiris Client Management Suite 7.0 from Symantec Deploy, manage, secure, and troubleshoot Deploy, manage, secure, and troubleshoot Overview The cost of a PC is only a small part of its total cost. Nearly 80 percent of the total cost of owning a client system goes toward the support and maintenance

More information

Symantec NetBackup Enterprise Server and Server 7.x OS Software Compatibility List

Symantec NetBackup Enterprise Server and Server 7.x OS Software Compatibility List Symantec NetBackup Enterprise Server and Server 7.x OS Software Compatibility List Created on March 12, 2015 Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and NetBackup

More information

World-class security solutions for your business. Kaspersky. OpenSpaceSecurity

World-class security solutions for your business. Kaspersky. OpenSpaceSecurity World-class security solutions for your business Kaspersky Open Open Kaspersky Open Space Security is a suite of products that offers security coverage for all types of network endpoints, from mobile devices

More information

Technical Specification Data

Technical Specification Data Equitrac Office 4.1 SOFTWARE SUITE Equitrac Office Software Suite Equitrac Office Suite Equitrac Office Small Business Edition (SBE) Applications Any size network with single or multiple accounting and/or

More information

4.1 Introduction 4.2 Explain the purpose of an operating system 4.2.1 Describe characteristics of modern operating systems Control Hardware Access

4.1 Introduction 4.2 Explain the purpose of an operating system 4.2.1 Describe characteristics of modern operating systems Control Hardware Access 4.1 Introduction The operating system (OS) controls almost all functions on a computer. In this lecture, you will learn about the components, functions, and terminology related to the Windows 2000, Windows

More information

Security Industry Market Share Analysis

Security Industry Market Share Analysis Security Industry Market Share Analysis December Introduction The Research OPSWAT releases quarterly market share reports for several sectors of the security industry. This report includes both worldwide

More information

Business Products 2 0 0 8

Business Products 2 0 0 8 Business Products 2 0 0 8 CONTENTS Kaspersky Lab: Experts in Data Security 2 Advanced Technologies from Kaspersky Lab 3 Corporate Network Protection Today 4 PRODUCTS Kaspersky Work Space Security 6 Kaspersky

More information

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments OVERVIEW This document explains the functionality of Security for Virtual and Cloud Environments (SVCE) - what

More information

How much does DraftSight cost? The standalone, single-user version of DraftSight is free* to download at DraftSight.com.

How much does DraftSight cost? The standalone, single-user version of DraftSight is free* to download at DraftSight.com. DraftSight Frequently Asked Questions What is DraftSight? DraftSight is a free, professional-grade 2D CAD product available for download at DraftSight.com. DraftSight provides professional CAD users, students

More information

Forefront Protection 2010 for Exchange Server Overview

Forefront Protection 2010 for Exchange Server Overview Forefront Protection 2010 for Exchange Server Overview Fast and effective protection against malware and spam Forefront Protection 2010 for Exchange Server provides fast and effective detection of viruses,

More information

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT Open Space Security Cyber-attacks are real. Today alone, Lab technology prevented nearly 3 million of them aimed at our customers worldwide.

More information

Oracle Desktop Virtualization

Oracle Desktop Virtualization Oracle Desktop Virtualization Oracle Desktop Virtualization Portfolio Oracle Desktop Virtualization Portfolio Software. Hardware. Complete. Oracle Virtual Desktop Infrastructure VDI desktops to users on

More information

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus

More information

Total Defense Endpoint Premium r12

Total Defense Endpoint Premium r12 DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious

More information

Worry-Free Business Security 6.0. External FAQ

Worry-Free Business Security 6.0. External FAQ Worry-Free Business Security 6.0 External FAQ May 2009 Page 1 Contents Introducing Worry-Free Business Security...3 What is Worry-Free Business Security?... 3 When is Worry-Free Business Security available?...

More information

Endpoint Security Solutions Comparative Analysis Report

Endpoint Security Solutions Comparative Analysis Report Endpoint Security Solutions Comparative Analysis Report (Physical Environment) Vendors Tested Trend Micro McAfee Symantec Sophos Microsoft To: Trend Micro Indusface Contact Kandarp Shah Vice President

More information

For Businesses with more than 25 seats. www.eset.com

For Businesses with more than 25 seats. www.eset.com For Businesses with more than 25 seats www.eset.com ESET Endpoint Protection Standard Whether your business is just starting or Simple and Straightforward established, there are a few things you expect

More information

Tivoli Endpoint Manager. Increasing the Business Value of IT, One Endpoint at a Time

Tivoli Endpoint Manager. Increasing the Business Value of IT, One Endpoint at a Time 1 Tivoli Endpoint Manager Increasing the Business Value of IT, One Endpoint at a Time Endpoint Management Cost Today s Endpoint Management Challenges Drive IT Costs Up More than 50% of end users change

More information

Getting Started with Symantec Endpoint Protection

Getting Started with Symantec Endpoint Protection Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only

More information

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE SINGAPORE

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE SINGAPORE TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE SINGAPORE WELCOME TO TELSTRA CLOUD SERVICES Our cloud infrastructure solutions are made up of a combination of scalable cloud resources, including

More information

Seqrite Endpoint Security

Seqrite Endpoint Security Enterprise Security Solutions by Quick Heal Seqrite Essential enterprise security for every connected endpoint SME Edition Product Highlights A must-have endpoint security solution that provides the best

More information

PARALLELS SERVER BARE METAL 5.0 README

PARALLELS SERVER BARE METAL 5.0 README PARALLELS SERVER BARE METAL 5.0 README 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information on the Parallels Server Bare Metal

More information

ESAP 2.7.4 Release Notes

ESAP 2.7.4 Release Notes ESAP 2.7.4 Release Notes SDK Version: Mac and Windows 3.6.9845.2 (V2 Unified + V3). Note: The SDK embedded in this ESAP version has been tested and qualified to interoperate with a limited list of end

More information

Determining Your Computer Resources

Determining Your Computer Resources Determining Your Computer Resources There are a number of computer components that must meet certain requirements in order for your computer to perform effectively. This document explains how to check

More information

AVeS Cloud Security powered by SYMANTEC TM

AVeS Cloud Security powered by SYMANTEC TM Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting

More information

GRAVITYZONE UNIFIED SECURITY MANAGEMENT

GRAVITYZONE UNIFIED SECURITY MANAGEMENT GRAVITYZONE UNIFIED SECURITY MANAGEMENT Quick Start Guide GravityZone Unified Security Management Quick Start Guide Publication date 2013.02.22 Copyright 2013 Bitdefender Legal Notice All rights reserved.

More information

Kaspersky Security Center Web-Console

Kaspersky Security Center Web-Console Kaspersky Security Center Web-Console User Guide CONTENTS ABOUT THIS GUIDE... 5 In this document... 5 Document conventions... 7 KASPERSKY SECURITY CENTER WEB-CONSOLE... 8 SOFTWARE REQUIREMENTS... 10 APPLICATION

More information

IBM Tivoli Endpoint Manager for Lifecycle Management

IBM Tivoli Endpoint Manager for Lifecycle Management IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,

More information

QuickSpecs. HP Session Allocation Manager Software (SAM v2.3) Overview

QuickSpecs. HP Session Allocation Manager Software (SAM v2.3) Overview Overview Introduction A key component of the HP Virtual Client Essentials software portfolio, Session Allocation Manager (SAM) administrative software brokers network connections to seamlessly deliver

More information

Symantec Backup Exec.cloud

Symantec Backup Exec.cloud Automatic, continuous, and secure protection that backs up data to the cloud, or via a hybrid approach combining on-premise and cloud-based backup. Data Sheet: Symantec.cloud Only 21 percent of SMBs are

More information

Data Sheet: Endpoint Management Altiris Client Management Suite 7.0 Deploy, manage, secure, and troubleshoot

Data Sheet: Endpoint Management Altiris Client Management Suite 7.0 Deploy, manage, secure, and troubleshoot Deploy, manage, secure, and troubleshoot Overview The cost of a PC is only a small part of its total cost. Nearly 80 percent of the total cost of owning a client system goes toward the support and maintenance

More information

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com 1 Business drivers and their impact on IT AGILITY! Move fast, be nimble

More information

BITDEFENDER GRAVITYZONE

BITDEFENDER GRAVITYZONE BITDEFENDER GRAVITYZONE Quick Start Guide Bitdefender GravityZone Quick Start Guide Publication date 2014.11.18 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be

More information

Redefining Endpoint Security: Symantec Endpoint Protection Russ Jensen

Redefining Endpoint Security: Symantec Endpoint Protection Russ Jensen Redefining Endpoint Security: Symantec Endpoint Protection Russ Jensen Sr. Presales Engineer, CISSP, MCSE Key Ingredients for Endpoint Protection Antivirus World s leading AV solution Most (44) consecutive

More information