1 Symantec Federal Solutions
2 Table of Contents 1. Introduction a. Symantec Public Sector b. The Federal Government IT Landscape and Challenges c. Symantec Government IT Solutions 3. Mobile 4. Data Center Management a. Storage Optimization b. Archiving and Deduplication c. Backup and Recovery d. Appliances
3 2. Security a. Endpoint Security b. Endpoint Management c. Encryption d. Messaging Security e. Authentication f. Data Loss Prevention g. Web Security 5. Virtualization 6. Cloud 7. Product Table 1 Introduction
5 Symantec Public Sector Symantec is a global leader in providing security, storage, and systems management solutions to help consumers and organizations secure and manage their information-driven world. Symantec s Public Sector organization is focused on delivering the company s IT solutions to civilian, Department of Defense, Intelligence agencies, state and local governments, and education institutions. Our solutions protect against more risks at more points, more completely and efficiently, to enable confidence wherever information is used or stored. Federal agencies rely on Symantec to fulfill their security, mobile, data center, virtualization, and cloud initiatives. Our solutions enable organizations to comply with federal IT regulations and mandates such as FIPS 140-2, OMB 06-16, the Data Center Consolidation Initiative, and multiple other federal requirements. This reference guide provides an overview of how Symantec s solutions can help the federal government deliver on its mission to serve citizens. 2
6 Cybersecurity & Sophisticated Attacks Information Explosion Consumerization of IT Complex & Changing Infrastructure
7 Federal government IT landscape and challenges Federal organizations are facing multiple IT challenges in four primary areas: cybersecurity and sophisticated attacks, information explosion, consumerization of IT, and complex and changing infrastructure. These four trends are having a profound effect on the ability of government agencies to protect and manage an explosion of information. Moving applications to the cloud, consolidating data centers, managing mobile devices, and authenticating users are approaches that government agencies are leveraging to become more secure and efficient. To prevent these trends from delaying their mission-critical operations, government agencies must have a clear strategy for identifying and adopting IT solutions that secure, manage, and protect their information. 3
9 Symantec government IT solutions Symantec brings together leading technology solutions that work seamlessly across multiple platforms, giving customers the freedom to use the devices of their choice and to access, store, and transmit information anytime, anywhere. Symantec s solutions for federal government agencies include: security, mobile, data center, virtualization, and cloud. Its security and management solutions help ensure that information, identities, infrastructure, and processes are protected, managed, and controlled across physical and virtual platforms. Likewise, its data center management solutions enable government agencies to optimize storage, back up, archive, recover critical information, reduce overall storage costs, and more efficiently manage and discover the information. Finally, Symantec s solutions enable agencies to migrate to the cloud and secure their cloud computing environments, manage and secure mobile devices, and manage virtual computing environments with greater visibility and efficiency. 4 Security
11 Security Nothing is more important to government agencies today than a well-secured and managed IT environment. Security threats are becoming more targeted, more prolific, and more sophisticated. Symantec s information security solutions protect and secure data regardless of the device it is being accessed on, where it resides, and whether it is in motion or at rest. Endpoint security Symantec endpoint security solutions provide comprehensive threat protection for enterprise endpoints including desktops, servers, laptops, and mobile devices. This technology includes Symantec s world-leading antivirus, antispyware, firewall, encryption, device, and application control, intrusion protection, and network access control. Symantec s award-winning technology boosts the performance, accuracy, and detection for identifying threats against physical and virtual systems and mitigating those threats. Symantec takes a proactive security approach to preventing intrusions and targeted attacks before they reach the endpoint. Symantec s endpoint protection provides protection against even the most sophisticated attacks that evade traditional security measures such as root kits, zero-day attacks, and mutating spyware. 5
13 Endpoint security highlights Identifies and secures confidential data on all laptops, desktops, and mobile devices Protects and prevents your information from accidental data loss and assures protection against unauthorized access Prevents intrusions and stops attacks before they reach endpoints Protects endpoints from known and unknown threats, using advanced threat prevention Provides integrated antivirus, antispyware, firewall, and intrusion prevention as well as device control and application control with one single agent Compliance areas supported FISMA, USGCB/FDCC, OMB 06-16, FIPS 140-2, DCID 6/3, IAVA, Section 508 of the U.S. Rehabilitation Act 6
15 Endpoint management Over 70 percent of an organization s total cost of owning a client system can go toward the support and maintenance of the endpoint. Symantec s endpoint management solutions automate time-consuming and redundant tasks to minimize efforts and costs associated with deploying, patching, and supporting client systems and software. Organizations can manage more technologies with greater efficiencies on more platforms with Symantec endpoint management solutions. 7
16 Endpoint management highlights Easily identifies system assets through comprehensive hardware and software inventory Automates migrations, operating system upgrades, patch management, imaging, and deployment updates Improves efficiencies and reduces costs through intelligent software management and delivery Proactively manages software updates and provides global remote assistance capabilities Ensures data protection by recovering lost data, rolling back to a known good state, or completely recovering the client system Tracks and manages asset configurations throughout the IT lifecycle
17 Compliance areas supported FISMA, USGCB/FDCC, OMB 06-16, FIPS 140-2, DCID 6/3, IAVA, Section 508 of the U.S. Rehabilitation Act 8
18 Encryption Symantec endpoint encryption software provides advanced data and file encryption for desktops, laptops, and removable storage devices. It offers scalable, enterprise-wide security that prevents unauthorized access by using strong access control and powerful encryption. Symantec endpoint encryption provides a central management console, enabling safe, central deployment and management of encryption to endpoints.
19 Encryption highlights Full disk, removable storage, and device control endpoint encryption solutions Controls access to ports, devices, and wireless networks Automatic, on-demand, and content-driven encryption of removable storage Monitors and restricts users ability to copy protected classes of information Self-decrypting archives for secure, one-way distribution of encrypted files Compliance areas supported OMB-06-16, NIST FIPS validated, Common Criteria 9
20 Messaging security Symantec secures more than 8 billion connections daily and protects more than 850 million mailboxes from threats and attacks targeted at inbound and outbound with integrated antispam, antivirus, advanced content filtering, data loss prevention, and encryption. Customers can choose from a range of delivery options including on-premise (software, appliance, virtual), cloud, managed services, and hybrid implementations.
21 Messaging security highlights Protects against malware and filters content over inbound and outbound Blocks more than 99 percent of spam with less than one in one million false positives Accurate, effective, real-time antispam and antivirus protection, advanced content filtering, data loss prevention, and encryption Cost-effective with reputation-based filtering that can block up to and more than 90 percent of threats at connection time Improves Exchange /Domino performance by reducing the volume of messages processed Compliance areas supported PCI, HIPAA, ITAR, OFAC, Data Protection Act 10
23 Authentication Symantec provides authentication solutions to enable organizations to protect their identities, secure their data, and enable trust in online transactions. Symantec s comprehensive suite of authentication solutions are delivered via secure, scalable cloud-based services and enable e-government by providing security services needed to protect interactions between government employees, industry partners, and citizens. Symantec s authentication solutions have been tested and certified for compliance with U.S. federal government technical and policy requirements. 11
24 Authentication highlights Uses managed PKI solutions to issue digital certificates for people, Web servers, devices, and applications to enable trusted, authenticated online transactions Identity credentialing solutions for issuing and managing Personal Identity Verification (PIV) and (PIV-I) smart cards for use as employee badges and for physical and logical accesses to IT systems and facilities One-time password solutions for remote access by employees, partners, and citizens to government websites Fraud detection service for real-time detection of anomalous behavior and suspicious transactions Unique, easy-to-deploy, cloud-based service that balances cost, convenience, and risk
25 Compliance areas supported FIPS 201, FIPS 140-2, HSPD-12, PCI, HIPAA LOGIN 12
26 Data loss prevention (DLP) In the past few years, DLP technology has become an indispensible part of a security portfolio. Data loss is a serious, yet preventable, IT problem that can happen in any organization of any size through malicious intent or by a well-meaning insider. Symantec, the recognized world leader in DLP, delivers a proven, content-aware solution to discover, monitor, and protect confidential data wherever it is stored or used. Symantec allows customers to reduce their risk of a data breach, demonstrate regulatory compliance, and safeguard privacy and intellectual property.
27 DLP highlights Recognizes sensitive data based on samples and creates policies to protect unstructured data Monitors and blocks sensitive files accessed by any application, including encrypted protocols Co-locates DLP with your hosted service provider to extend the DLP into the cloud Compliance areas supported HIPAA, Privacy Act, Cyberscope, OMB 6-16, 7-16, 11-8,
28 Web security The Web and Web applications have become major sources of malware infections in organizations. Attackers are exploiting these threats using rapidly changing malware. Because of the quickly evolving threat landscape, few organizations are able to secure their Internet gateways from Web-borne malware, which leaves them vulnerable to attacks. Symantec uses a proactive approach to combat Web-borne malware by providing Web security solutions to protect infrastructures from malicious activity and to ensure that users stay safe on the Web.
29 Web security highlights Symantec s Web security is backed by the Symantec Global Intelligence Network of more than 175 million users to identify new threats before they cause disruptions in organizations Protects and secures networks from malicious attacks Protects users from visiting infected websites or legitimate sites infected by malware Demonstrates and enforces compliance for Web policies Protects Web presence and confidential information from external attacks and data loss Compliance areas supported PCI DSS 14 Mobile
31 Mobile Everyday government employees are doing more work using mobile devices, smartphones, laptops, tablets, and more. Mobility is making people more productive and efficient, but it s also creating new challenges for organizations. Symantec s Mobile Device Management (MDM) solutions secure remote access for mobile endpoints and help agencies enforce security and network compliance policies across their organizations. 15
33 Mobile solutions highlights Comprehensive enterprise security for all leading mobile platforms including iphone, ipad, and Android Policy management of Android, WebOS, and Windows Phone 7 devices Selective wipe capabilities to isolate the corporate data on personal devices Advanced application and content distribution to mobile devices in the field Strong authentication to the network resources and applications with managed PKI infrastructure Integration with Symantec Endpoint Management Suite for unified management of PCs, laptops, smartphones, and tablets 16 Data Center Management
34 Data Center Management
35 Data center management According to industry analysts, data is growing at 30 percent to 60 percent per year, which means managing your storage infrastructure is no easy task. Symantec helps organizations gain control of sprawling infrastructures with solutions for storage optimization, backup and recovery, archiving, and discovery. Storage optimization Today, organizations are storing more information as their employees create increasingly more electronic content. Much of this content must be kept and made readily available to meet compliance mandates and audit requirements. Symantec s storage optimization solutions provide the ability to migrate between storage hardware seamlessly, move information from expensive to inexpensive disk, provide shared structures where appropriate, and increase the overall utilization of storage already in the data center. 17
37 Storage optimization highlights Dynamic storage tiering with multiple operating systems Minimal downtime to adopt/migrate between storage resources Ability to actively monitor and report against multiple physical storage vendors Thin provisioning allows for better utilization of physical assets Solutions available for physical, virtual, and cloud environments Compliance areas supported Common Criteria 18
38 Archiving and deduplication Symantec s archiving and deduplication solutions automatically back up data and move it to a static, lower-cost platform while removing redundancies in the information. This transparent process of moving and retaining unstructured data improves performance, scalability, and manageability of applications while reducing risk and costs. Once the data is archived, Symantec offers an end-to-end comprehensive ediscovery solution to quickly locate and produce information in response to litigation matters and internal or external requests.
39 Archiving and deduplication highlights Enables more efficient use of storage for data protection Collects key information that makes your data more extensible Reduces storage costs by up to 60 percent by archiving and deduplicating across multiple content sources Reduces operating and training costs, increases process efficiency, and implements quickly Quickly and automatically discovers information across , desktops, file servers, backups, and the cloud Provides ability to take information out of the traditional backup cycle Integrates with Symantec Data Loss Prevention Compliance areas supported DOD STD, FIPS 140-2, 36 CFR , NARA Bulletin , OMB M-04-16, 06-16,
40 Backup and recovery Symantec s backup and recovery solutions protect information by automating advanced technologies and standardizing operations across applications, platforms, and virtual environments. That means being able to protect completely, store efficiently, recover anywhere, and manage centrally across heterogeneous operating systems and storage hardware, including tape and disk.
41 Backup and recovery highlights Integrates with software APIs and various applications within organizations infrastructures, such as Oracle, Microsoft SQL, and Microsoft Exchange. Risk management through continuous monitoring: discover, assess, and remediate Reduces operating and training costs, increases process efficiency, and implements quickly covering physical, virtual, and cloud environments Appliance option combines software and hardware into a pretested known performance profile, providing agencies with operational simplicity, effective utilization of bandwidth and storage, and high performance Scalable appliances that reduce the need for re-engineering environments prior to deployment Global deduplication leverages deduplication across multiple clients and across appliance nodes Compliance areas supported FISMA 140-2, Common Criteria 20
42 Appliances Symantec has a comprehensive set of physical and virtual appliances capable of securing and managing information to sanitize messaging streams, solve log management problems, and address enterprise security incident response services. Current challenges like data retention, audit requirements, and the lack of IT resources have made it increasingly difficult to manage information effectively. Symantec appliances are capable of collecting and processing data at high volume rates, storing information in a way that is quickly retrievable, and protecting data from attacks and data leaks. Symantec s solutions give customers the ability to deliver the right information to the right people via self-service capabilities. The virtual appliance option offers greater flexibility in deployment and scalability considerations.
43 Appliances highlights Built-in client and media server deduplication Virtual machine aware deduplication and integrated virtual and physical deduplication Equipped with Symantec V-Ray, this provides for a unique visibility into virtual environments that speeds recovery and reduces storage costs Decrease storage by times and up to 99 percent reduction in bandwidth consumption Starting at 4TB and expandable up to 36TB of useable disk, ideal for remote offices, regional offices, and enterprise data centers 21 Virtualization
45 Virtualization The widespread adoption of virtualization is altering IT management, deployment, licensing, and pricing. Symantec s virtualization solutions deliver advanced security and availability in addition to simplified storage management capabilities needed to virtualize federal agencies business-critical applications. Symantec s advanced technologies provide the visibility and control required to automate service-level processes, accelerate server and desktop virtualization deployments, and reduce the cost and complexity of managing and protecting high-density virtual and physical infrastructures. 22
47 Virtualization solutions highlights Provides anytime, anywhere access to workspaces Controls storage growth, eliminates backup and recovery bottlenecks, and ensures application-level disaster recovery Ensures application availability, coordinates new deployments and upgrades, and provides advanced monitoring for multi-tier applications Enables comprehensive data protection, security, storage management, and availability for virtual environments 23 Cloud
49 Cloud The federal government s Cloud First policy requires federal agencies to shift from building custom systems to adopting leading-edge technologies and shared solutions to reduce costs and increase flexibility and speed. Symantec s cloud solutions support private, public, and hybrid cloud models and map to government requirements for operating, governing, managing, and securing information in the cloud. Our technologies help agencies manage and secure their environments as they move to cloud-based deployments. Symantec also works with key cloud service providers and telecommunication partners to provide government agencies with a complete suite of managed infrastructure services for mission-critical objectives and service to citizen applications, including cloud computing, collocation, network services, managed hosting, and security services. 24
51 Product Table Cloud solutions highlights Governing in the cloud: legal and ediscovery, compliance and audit, information lifecycle management Operating in the cloud: data center operations, disaster recovery, application security, identity, and access management Managing in the cloud: archiving, ediscovery, storage, and backup Securing in the cloud: real-time antispam, antivirus, content filtering, encryption, data loss prevention, and compliance 25
52 Product Table Product Table S E C U R I T Y a. Endpoint Security b. Endpoint Management Antivirus, Critical System Protection, Endpoint Encryption, Endpoint Protection, Multi-tier Protection, Network Access Control, Protection Center, Protection Suite, Scan Engine, Whole Disk Encryption, PGP Portable, Security Information Manager, Risk Automation Suite IT Management Suite, Security Information Manager, Mobile Management, Endpoint Virtualization Suite c. Encryption d. Messaging Security Endpoint Encryption Messaging Gateway, Web Gateway, IM Manager, Mail Security, Multi-tier Protection, Protection Center, Protection for SharePoint Servers, Premium AntiSpam, Protection Suite, Security Information Manager e. Authentication f. Data Loss Prevention Validation and ID Protection Service (VIP), Managed PKI Service, VeriSign Identity Protection, Fraud Detection Service Critical System Protection, Data- Loss Prevention, Endpoint Encryption, Enterprise Vault, Protection Suite, Security Information Manager g. Web Security Data Loss Prevention Network, Protection Suite, Web Gateway, Security Information Manager MOBILE Validation and ID Protection Service (VIP), Mobile Management, Endpoint Protection, Network Access Control, Endpoint Encryption Device Control
53 DATA CENTER MANAGEMENT a. Storage Optimization Data Insight for Storage, FileStore, Storage Foundation, VirtualStore b. Archiving and Deduplication Enterprise Vault, Clearwell ediscovery Platform, Net Backup, Storage Foundation, Backup Exec c. Backup and Recovery NetBackup, Backup Exec, Enterprise Vault, System Recovery d. Appliances NetBackup, FileStore, Web Gateway, Security Information Manager VIRTUALIZATION ApplicationHA, Backup Exec, System Recovery, Cluster Server, Dynamic Multi-Pathing, NetBackup, Storage Foundation CLOUD NetBackup, Validation and ID Protection Service (VIP), Backup Exec.cloud, Enterprise Vault.cloud, Web Security.cloud, Security.cloud, Endpoint Protection.cloud, Managed PKI Service 26
54 About Symantec Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Headquartered in Mountain View, Calif., Symantec has operations in 40 countries. More information is available at
55 Symantec World Headquarters Mountain View, USA 350 Ellis Street Mountain View, CA USA Phone: +1 (650) US Public Sector Headquarters 2350 Corporate Park Drive Suite 600 Herndon, VA USA Phone: +1 (800) Copyright 2011 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, Altiris, PGP, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. VeriSign is a registered trademark of VeriSign, Inc. VeriSign, VeriSign Trust and other related marks are the trademarks or registered trademarks of VeriSign, Inc. or its affiliates or subsidiaries in the U.S. and other countries and licensed to Symantec Corporation. Microsoft, Windows, and Exchange are trademarks of Microsoft Corporation in the United States, other countries, or both. Domino is a registered trademark of IBM Corporation. iphone and ipad are trademarks of Apple Inc., registered in the U.S. and other countries. Android is a trademark or registered trademark of Google, Inc. Oracle is a registered trademark of Oracle Corporation in the United States and/or other countries. Other names may be trademarks of their respective owners. 9/