Symantec Federal Solutions
|
|
- Arron Watts
- 8 years ago
- Views:
Transcription
1 Symantec Federal Solutions
2 Table of Contents 1. Introduction a. Symantec Public Sector b. The Federal Government IT Landscape and Challenges c. Symantec Government IT Solutions 3. Mobile 4. Data Center Management a. Storage Optimization b. Archiving and Deduplication c. Backup and Recovery d. Appliances
3 2. Security a. Endpoint Security b. Endpoint Management c. Encryption d. Messaging Security e. Authentication f. Data Loss Prevention g. Web Security 5. Virtualization 6. Cloud 7. Product Table 1 Introduction
4 Introduction
5 Symantec Public Sector Symantec is a global leader in providing security, storage, and systems management solutions to help consumers and organizations secure and manage their information-driven world. Symantec s Public Sector organization is focused on delivering the company s IT solutions to civilian, Department of Defense, Intelligence agencies, state and local governments, and education institutions. Our solutions protect against more risks at more points, more completely and efficiently, to enable confidence wherever information is used or stored. Federal agencies rely on Symantec to fulfill their security, mobile, data center, virtualization, and cloud initiatives. Our solutions enable organizations to comply with federal IT regulations and mandates such as FIPS 140-2, OMB 06-16, the Data Center Consolidation Initiative, and multiple other federal requirements. This reference guide provides an overview of how Symantec s solutions can help the federal government deliver on its mission to serve citizens. 2
6 Cybersecurity & Sophisticated Attacks Information Explosion Consumerization of IT Complex & Changing Infrastructure
7 Federal government IT landscape and challenges Federal organizations are facing multiple IT challenges in four primary areas: cybersecurity and sophisticated attacks, information explosion, consumerization of IT, and complex and changing infrastructure. These four trends are having a profound effect on the ability of government agencies to protect and manage an explosion of information. Moving applications to the cloud, consolidating data centers, managing mobile devices, and authenticating users are approaches that government agencies are leveraging to become more secure and efficient. To prevent these trends from delaying their mission-critical operations, government agencies must have a clear strategy for identifying and adopting IT solutions that secure, manage, and protect their information. 3
8
9 Symantec government IT solutions Symantec brings together leading technology solutions that work seamlessly across multiple platforms, giving customers the freedom to use the devices of their choice and to access, store, and transmit information anytime, anywhere. Symantec s solutions for federal government agencies include: security, mobile, data center, virtualization, and cloud. Its security and management solutions help ensure that information, identities, infrastructure, and processes are protected, managed, and controlled across physical and virtual platforms. Likewise, its data center management solutions enable government agencies to optimize storage, back up, archive, recover critical information, reduce overall storage costs, and more efficiently manage and discover the information. Finally, Symantec s solutions enable agencies to migrate to the cloud and secure their cloud computing environments, manage and secure mobile devices, and manage virtual computing environments with greater visibility and efficiency. 4 Security
10 Security
11 Security Nothing is more important to government agencies today than a well-secured and managed IT environment. Security threats are becoming more targeted, more prolific, and more sophisticated. Symantec s information security solutions protect and secure data regardless of the device it is being accessed on, where it resides, and whether it is in motion or at rest. Endpoint security Symantec endpoint security solutions provide comprehensive threat protection for enterprise endpoints including desktops, servers, laptops, and mobile devices. This technology includes Symantec s world-leading antivirus, antispyware, firewall, encryption, device, and application control, intrusion protection, and network access control. Symantec s award-winning technology boosts the performance, accuracy, and detection for identifying threats against physical and virtual systems and mitigating those threats. Symantec takes a proactive security approach to preventing intrusions and targeted attacks before they reach the endpoint. Symantec s endpoint protection provides protection against even the most sophisticated attacks that evade traditional security measures such as root kits, zero-day attacks, and mutating spyware. 5
12
13 Endpoint security highlights Identifies and secures confidential data on all laptops, desktops, and mobile devices Protects and prevents your information from accidental data loss and assures protection against unauthorized access Prevents intrusions and stops attacks before they reach endpoints Protects endpoints from known and unknown threats, using advanced threat prevention Provides integrated antivirus, antispyware, firewall, and intrusion prevention as well as device control and application control with one single agent Compliance areas supported FISMA, USGCB/FDCC, OMB 06-16, FIPS 140-2, DCID 6/3, IAVA, Section 508 of the U.S. Rehabilitation Act 6
14
15 Endpoint management Over 70 percent of an organization s total cost of owning a client system can go toward the support and maintenance of the endpoint. Symantec s endpoint management solutions automate time-consuming and redundant tasks to minimize efforts and costs associated with deploying, patching, and supporting client systems and software. Organizations can manage more technologies with greater efficiencies on more platforms with Symantec endpoint management solutions. 7
16 Endpoint management highlights Easily identifies system assets through comprehensive hardware and software inventory Automates migrations, operating system upgrades, patch management, imaging, and deployment updates Improves efficiencies and reduces costs through intelligent software management and delivery Proactively manages software updates and provides global remote assistance capabilities Ensures data protection by recovering lost data, rolling back to a known good state, or completely recovering the client system Tracks and manages asset configurations throughout the IT lifecycle
17 Compliance areas supported FISMA, USGCB/FDCC, OMB 06-16, FIPS 140-2, DCID 6/3, IAVA, Section 508 of the U.S. Rehabilitation Act 8
18 Encryption Symantec endpoint encryption software provides advanced data and file encryption for desktops, laptops, and removable storage devices. It offers scalable, enterprise-wide security that prevents unauthorized access by using strong access control and powerful encryption. Symantec endpoint encryption provides a central management console, enabling safe, central deployment and management of encryption to endpoints.
19 Encryption highlights Full disk, removable storage, and device control endpoint encryption solutions Controls access to ports, devices, and wireless networks Automatic, on-demand, and content-driven encryption of removable storage Monitors and restricts users ability to copy protected classes of information Self-decrypting archives for secure, one-way distribution of encrypted files Compliance areas supported OMB-06-16, NIST FIPS validated, Common Criteria 9
20 Messaging security Symantec secures more than 8 billion connections daily and protects more than 850 million mailboxes from threats and attacks targeted at inbound and outbound with integrated antispam, antivirus, advanced content filtering, data loss prevention, and encryption. Customers can choose from a range of delivery options including on-premise (software, appliance, virtual), cloud, managed services, and hybrid implementations.
21 Messaging security highlights Protects against malware and filters content over inbound and outbound Blocks more than 99 percent of spam with less than one in one million false positives Accurate, effective, real-time antispam and antivirus protection, advanced content filtering, data loss prevention, and encryption Cost-effective with reputation-based filtering that can block up to and more than 90 percent of threats at connection time Improves Exchange /Domino performance by reducing the volume of messages processed Compliance areas supported PCI, HIPAA, ITAR, OFAC, Data Protection Act 10
22
23 Authentication Symantec provides authentication solutions to enable organizations to protect their identities, secure their data, and enable trust in online transactions. Symantec s comprehensive suite of authentication solutions are delivered via secure, scalable cloud-based services and enable e-government by providing security services needed to protect interactions between government employees, industry partners, and citizens. Symantec s authentication solutions have been tested and certified for compliance with U.S. federal government technical and policy requirements. 11
24 Authentication highlights Uses managed PKI solutions to issue digital certificates for people, Web servers, devices, and applications to enable trusted, authenticated online transactions Identity credentialing solutions for issuing and managing Personal Identity Verification (PIV) and (PIV-I) smart cards for use as employee badges and for physical and logical accesses to IT systems and facilities One-time password solutions for remote access by employees, partners, and citizens to government websites Fraud detection service for real-time detection of anomalous behavior and suspicious transactions Unique, easy-to-deploy, cloud-based service that balances cost, convenience, and risk
25 Compliance areas supported FIPS 201, FIPS 140-2, HSPD-12, PCI, HIPAA LOGIN 12
26 Data loss prevention (DLP) In the past few years, DLP technology has become an indispensible part of a security portfolio. Data loss is a serious, yet preventable, IT problem that can happen in any organization of any size through malicious intent or by a well-meaning insider. Symantec, the recognized world leader in DLP, delivers a proven, content-aware solution to discover, monitor, and protect confidential data wherever it is stored or used. Symantec allows customers to reduce their risk of a data breach, demonstrate regulatory compliance, and safeguard privacy and intellectual property.
27 DLP highlights Recognizes sensitive data based on samples and creates policies to protect unstructured data Monitors and blocks sensitive files accessed by any application, including encrypted protocols Co-locates DLP with your hosted service provider to extend the DLP into the cloud Compliance areas supported HIPAA, Privacy Act, Cyberscope, OMB 6-16, 7-16, 11-8,
28 Web security The Web and Web applications have become major sources of malware infections in organizations. Attackers are exploiting these threats using rapidly changing malware. Because of the quickly evolving threat landscape, few organizations are able to secure their Internet gateways from Web-borne malware, which leaves them vulnerable to attacks. Symantec uses a proactive approach to combat Web-borne malware by providing Web security solutions to protect infrastructures from malicious activity and to ensure that users stay safe on the Web.
29 Web security highlights Symantec s Web security is backed by the Symantec Global Intelligence Network of more than 175 million users to identify new threats before they cause disruptions in organizations Protects and secures networks from malicious attacks Protects users from visiting infected websites or legitimate sites infected by malware Demonstrates and enforces compliance for Web policies Protects Web presence and confidential information from external attacks and data loss Compliance areas supported PCI DSS 14 Mobile
30 Mobile
31 Mobile Everyday government employees are doing more work using mobile devices, smartphones, laptops, tablets, and more. Mobility is making people more productive and efficient, but it s also creating new challenges for organizations. Symantec s Mobile Device Management (MDM) solutions secure remote access for mobile endpoints and help agencies enforce security and network compliance policies across their organizations. 15
32
33 Mobile solutions highlights Comprehensive enterprise security for all leading mobile platforms including iphone, ipad, and Android Policy management of Android, WebOS, and Windows Phone 7 devices Selective wipe capabilities to isolate the corporate data on personal devices Advanced application and content distribution to mobile devices in the field Strong authentication to the network resources and applications with managed PKI infrastructure Integration with Symantec Endpoint Management Suite for unified management of PCs, laptops, smartphones, and tablets 16 Data Center Management
34 Data Center Management
35 Data center management According to industry analysts, data is growing at 30 percent to 60 percent per year, which means managing your storage infrastructure is no easy task. Symantec helps organizations gain control of sprawling infrastructures with solutions for storage optimization, backup and recovery, archiving, and discovery. Storage optimization Today, organizations are storing more information as their employees create increasingly more electronic content. Much of this content must be kept and made readily available to meet compliance mandates and audit requirements. Symantec s storage optimization solutions provide the ability to migrate between storage hardware seamlessly, move information from expensive to inexpensive disk, provide shared structures where appropriate, and increase the overall utilization of storage already in the data center. 17
36
37 Storage optimization highlights Dynamic storage tiering with multiple operating systems Minimal downtime to adopt/migrate between storage resources Ability to actively monitor and report against multiple physical storage vendors Thin provisioning allows for better utilization of physical assets Solutions available for physical, virtual, and cloud environments Compliance areas supported Common Criteria 18
38 Archiving and deduplication Symantec s archiving and deduplication solutions automatically back up data and move it to a static, lower-cost platform while removing redundancies in the information. This transparent process of moving and retaining unstructured data improves performance, scalability, and manageability of applications while reducing risk and costs. Once the data is archived, Symantec offers an end-to-end comprehensive ediscovery solution to quickly locate and produce information in response to litigation matters and internal or external requests.
39 Archiving and deduplication highlights Enables more efficient use of storage for data protection Collects key information that makes your data more extensible Reduces storage costs by up to 60 percent by archiving and deduplicating across multiple content sources Reduces operating and training costs, increases process efficiency, and implements quickly Quickly and automatically discovers information across , desktops, file servers, backups, and the cloud Provides ability to take information out of the traditional backup cycle Integrates with Symantec Data Loss Prevention Compliance areas supported DOD STD, FIPS 140-2, 36 CFR , NARA Bulletin , OMB M-04-16, 06-16,
40 Backup and recovery Symantec s backup and recovery solutions protect information by automating advanced technologies and standardizing operations across applications, platforms, and virtual environments. That means being able to protect completely, store efficiently, recover anywhere, and manage centrally across heterogeneous operating systems and storage hardware, including tape and disk.
41 Backup and recovery highlights Integrates with software APIs and various applications within organizations infrastructures, such as Oracle, Microsoft SQL, and Microsoft Exchange. Risk management through continuous monitoring: discover, assess, and remediate Reduces operating and training costs, increases process efficiency, and implements quickly covering physical, virtual, and cloud environments Appliance option combines software and hardware into a pretested known performance profile, providing agencies with operational simplicity, effective utilization of bandwidth and storage, and high performance Scalable appliances that reduce the need for re-engineering environments prior to deployment Global deduplication leverages deduplication across multiple clients and across appliance nodes Compliance areas supported FISMA 140-2, Common Criteria 20
42 Appliances Symantec has a comprehensive set of physical and virtual appliances capable of securing and managing information to sanitize messaging streams, solve log management problems, and address enterprise security incident response services. Current challenges like data retention, audit requirements, and the lack of IT resources have made it increasingly difficult to manage information effectively. Symantec appliances are capable of collecting and processing data at high volume rates, storing information in a way that is quickly retrievable, and protecting data from attacks and data leaks. Symantec s solutions give customers the ability to deliver the right information to the right people via self-service capabilities. The virtual appliance option offers greater flexibility in deployment and scalability considerations.
43 Appliances highlights Built-in client and media server deduplication Virtual machine aware deduplication and integrated virtual and physical deduplication Equipped with Symantec V-Ray, this provides for a unique visibility into virtual environments that speeds recovery and reduces storage costs Decrease storage by times and up to 99 percent reduction in bandwidth consumption Starting at 4TB and expandable up to 36TB of useable disk, ideal for remote offices, regional offices, and enterprise data centers 21 Virtualization
44 Virtualization
45 Virtualization The widespread adoption of virtualization is altering IT management, deployment, licensing, and pricing. Symantec s virtualization solutions deliver advanced security and availability in addition to simplified storage management capabilities needed to virtualize federal agencies business-critical applications. Symantec s advanced technologies provide the visibility and control required to automate service-level processes, accelerate server and desktop virtualization deployments, and reduce the cost and complexity of managing and protecting high-density virtual and physical infrastructures. 22
46
47 Virtualization solutions highlights Provides anytime, anywhere access to workspaces Controls storage growth, eliminates backup and recovery bottlenecks, and ensures application-level disaster recovery Ensures application availability, coordinates new deployments and upgrades, and provides advanced monitoring for multi-tier applications Enables comprehensive data protection, security, storage management, and availability for virtual environments 23 Cloud
48 Cloud
49 Cloud The federal government s Cloud First policy requires federal agencies to shift from building custom systems to adopting leading-edge technologies and shared solutions to reduce costs and increase flexibility and speed. Symantec s cloud solutions support private, public, and hybrid cloud models and map to government requirements for operating, governing, managing, and securing information in the cloud. Our technologies help agencies manage and secure their environments as they move to cloud-based deployments. Symantec also works with key cloud service providers and telecommunication partners to provide government agencies with a complete suite of managed infrastructure services for mission-critical objectives and service to citizen applications, including cloud computing, collocation, network services, managed hosting, and security services. 24
50
51 Product Table Cloud solutions highlights Governing in the cloud: legal and ediscovery, compliance and audit, information lifecycle management Operating in the cloud: data center operations, disaster recovery, application security, identity, and access management Managing in the cloud: archiving, ediscovery, storage, and backup Securing in the cloud: real-time antispam, antivirus, content filtering, encryption, data loss prevention, and compliance 25
52 Product Table Product Table S E C U R I T Y a. Endpoint Security b. Endpoint Management Antivirus, Critical System Protection, Endpoint Encryption, Endpoint Protection, Multi-tier Protection, Network Access Control, Protection Center, Protection Suite, Scan Engine, Whole Disk Encryption, PGP Portable, Security Information Manager, Risk Automation Suite IT Management Suite, Security Information Manager, Mobile Management, Endpoint Virtualization Suite c. Encryption d. Messaging Security Endpoint Encryption Messaging Gateway, Web Gateway, IM Manager, Mail Security, Multi-tier Protection, Protection Center, Protection for SharePoint Servers, Premium AntiSpam, Protection Suite, Security Information Manager e. Authentication f. Data Loss Prevention Validation and ID Protection Service (VIP), Managed PKI Service, VeriSign Identity Protection, Fraud Detection Service Critical System Protection, Data- Loss Prevention, Endpoint Encryption, Enterprise Vault, Protection Suite, Security Information Manager g. Web Security Data Loss Prevention Network, Protection Suite, Web Gateway, Security Information Manager MOBILE Validation and ID Protection Service (VIP), Mobile Management, Endpoint Protection, Network Access Control, Endpoint Encryption Device Control
53 DATA CENTER MANAGEMENT a. Storage Optimization Data Insight for Storage, FileStore, Storage Foundation, VirtualStore b. Archiving and Deduplication Enterprise Vault, Clearwell ediscovery Platform, Net Backup, Storage Foundation, Backup Exec c. Backup and Recovery NetBackup, Backup Exec, Enterprise Vault, System Recovery d. Appliances NetBackup, FileStore, Web Gateway, Security Information Manager VIRTUALIZATION ApplicationHA, Backup Exec, System Recovery, Cluster Server, Dynamic Multi-Pathing, NetBackup, Storage Foundation CLOUD NetBackup, Validation and ID Protection Service (VIP), Backup Exec.cloud, Enterprise Vault.cloud, Web Security.cloud, Security.cloud, Endpoint Protection.cloud, Managed PKI Service 26
54 About Symantec Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Headquartered in Mountain View, Calif., Symantec has operations in 40 countries. More information is available at
55 Symantec World Headquarters Mountain View, USA 350 Ellis Street Mountain View, CA USA Phone: +1 (650) US Public Sector Headquarters 2350 Corporate Park Drive Suite 600 Herndon, VA USA Phone: +1 (800) Copyright 2011 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, Altiris, PGP, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. VeriSign is a registered trademark of VeriSign, Inc. VeriSign, VeriSign Trust and other related marks are the trademarks or registered trademarks of VeriSign, Inc. or its affiliates or subsidiaries in the U.S. and other countries and licensed to Symantec Corporation. Microsoft, Windows, and Exchange are trademarks of Microsoft Corporation in the United States, other countries, or both. Domino is a registered trademark of IBM Corporation. iphone and ipad are trademarks of Apple Inc., registered in the U.S. and other countries. Android is a trademark or registered trademark of Google, Inc. Oracle is a registered trademark of Oracle Corporation in the United States and/or other countries. Other names may be trademarks of their respective owners. 9/
56
INFORMATION PROTECTED
INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never
More informationPayment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
More informationData Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex
More informationPreparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
More informationSymantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationConfidence in the Cloud Five Ways to Capitalize with Symantec
Five Ways to Capitalize with Symantec Solution Brief: Confidence in the Cloud Confidence in the Cloud Contents Overview...............................................................................................
More informationSymantec Enterprise Vault and Symantec Enterprise Vault.cloud
Symantec Enterprise Vault and Symantec Enterprise Vault.cloud Better store, manage, and discover business-critical information Solution Overview: Archiving Introduction The data explosion that has burdened
More informationSymantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure
Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus
More informationData Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information
Store, Manage, and Discover Critical Business Information Managing millions of mailboxes for thousands of customers worldwide, Enterprise Vault, the industry leader in email and content archiving, enables
More information2012 Endpoint Security Best Practices Survey
WHITE PAPER: 2012 ENDPOINT SECURITY BEST PRACTICES SURVEY........................................ 2012 Endpoint Security Best Practices Survey Who should read this paper Small and medium business owners
More informationPublic, Private, Hybrid:
Public, Private, Hybrid: How to Use the Cloud for More Effective Security Symantec and Cloud Computing Ron Poserina, Director of Systems Engineering Agenda Our Perspective on Cloud Computing Why Cloud
More informationPROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud
PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud Blue skies ahead? Yes if you are protected when you move to the cloud. Lately, it seems as if every enterprise
More informationSymantec Enterprise Vault for Microsoft Exchange
Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry
More informationSymantec Mobile Security
Advanced threat protection for mobile devices Data Sheet: Endpoint Management and Mobility Overview The combination of uncurated app stores, platform openness, and sizeable marketshare, make the Android
More informationAn ICT ConsultingCompany
An ICT ConsultingCompany About Us Innovation Experience Market leader technologies Solutions that ensure the best performance through efficiency An ICT Consulting Company 2 Our Mission Improvement of business
More informationSolution Brief: Enterprise Security
Symantec Brightmail Gateway and VMware Solution Brief: Enterprise Security Symantec Brightmail Gateway and VMware Contents Corporate overview......................................................................................
More informationSmall and Midsize Business Protection Guide
P r o t e c t i o n G u i d e : C l o s e t h e P r o t e c t i o n G a p Small and Midsize Business Protection Guide Close the protection gap and safeguard your business future Confidence in a connected
More informationoverview Enterprise Security Solutions
Enterprise Security Solutions overview For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an ever-evolving IT threat landscape. It s how we got to be the world
More informationData Sheet: IT Compliance Payment Card Industry Data Security Standard
The (PCI, or PCI DSS) was developed by the PCI Security Standards Council to assure cardholders that their details were secure during payment card transactions. The Council, which now governs the Standard,
More informationSymantec Enterprise Vault for Microsoft Exchange Server
Symantec Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving performance and users can enjoy
More informationIs Your Vendor CJIS-Certified?
A Thought Leadership Profile Symantec SHUTTERSTOCK.COM Is Your Vendor CJIS-Certified? How to identify a vendor partner that can help your agency comply with new federal security standards for accessing
More informationSymantec Backup Exec 2012
Better backup for all Data Sheet: Backup and Disaster Recovery Overview is one integrated product that protects virtual and physical environments, simplifies both backup and disaster recovery, and recovers
More informationConfidence in a Connected World. MEEC Symantec Product Availability. John Lally MD Education Account Executive 204-401-7342 John_Lally@symantec.
Confidence in a Connected World MEEC Symantec Product Availability John Lally MD Education Account Executive 204-401-7342 John_Lally@symantec.com 1 Agenda New threats means advanced security tactics SEP
More informationTHREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS
THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS Learn more about Symantec security here OVERVIEW Data and communication protection isn t a problem limited to large enterprises. Small and
More informationAthena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
More informationOptimizing the Data Center for Today s State & Local Government
WHITE PAPER: OPTIMIZING THE DATA CENTER FOR TODAY S STATE...... &.. LOCAL...... GOVERNMENT.......................... Optimizing the Data Center for Today s State & Local Government Who should read this
More informationSymantec Enterprise Vault for Microsoft Exchange
Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry
More informationSymantec NetBackup 7.5 What s New and Version Comparison Matrix
Symantec NetBackup 7.5 What s New and Version Comparison Matrix Solution Overview: Data Protection While backup takes many forms, recovery shouldn t. Symantec NetBackup with V-Ray technology is the single
More informationHow To Monitor Your Entire It Environment
Preparing for FISMA 2.0 and Continuous Monitoring Requirements Symantec's Continuous Monitoring Solution White Paper: Preparing for FISMA 2.0 and Continuous Monitoring Requirements Contents Introduction............................................................................................
More informationSymantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses
A simple, effective and affordable solution designed for small businesses Overview Symantec Protection Suite Small Business Edition is a simple, affordable, security and backup solution. It is designed
More informationIs online backup right for your business? Eight reasons to consider protecting your data with a hybrid backup solution
PARTNER BRIEF: IS ONLINE BACKUP RIGHT FOR YOUR BUSINESS?........................................ Is online backup right for your business? Eight reasons to consider protecting your data with a hybrid Who
More informationSymantec Encryption Solutions for Email, Powered by PGP Technology
Symantec Encryption Solutions for Email, Powered by PGP Technology Data Sheet: Encryption The Problem with Email Are you worried that users are emailing sensitive information openly? According to Osterman
More informationEndpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments
Endpoint Management and Mobility Solutions from Symantec Adapting traditional IT operations for new end-user environments During the past few years the traditional concept of end-user computing has drastically
More informationOptimizing the Data Center for Today s Federal Government
WHITE PAPER: OPTIMIZING THE DATA CENTER FOR TODAY S FEDERAL......... GOVERNMENT............................... Optimizing the Data Center for Today s Federal Government Who should read this paper CIOs,
More informationDemystifying Virtualization for Small Businesses Executive Brief
Demystifying Virtualization for Small Businesses White Paper: Demystifying Virtualization for Small Businesses Demystifying Virtualization for Small Businesses Contents Introduction............................................................................................
More informationHow To Support Bring Your Own Device (Byod)
WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses
More informationSymantec Protection Suite Add-On for Hosted Email and Web Security
Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication
More informationSymantec Endpoint Protection
The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,
More informationSYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION
SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION Frequently Asked Questions WHAT IS SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION 1? Symantec Endpoint Protection Small Business Edition is built
More informationSecuring Office 365 with Symantec
January, 2016 Solution Overview: Enterprise Security Adoption of Microsoft Office 365, Google Apps, and other cloud-based productivity solutions is growing. Microsoft in its Ignite 2015 session claimed
More informationoverview Enterprise Security Solutions
Enterprise Security Solutions overview For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an ever-evolving IT threat landscape. It s how we got to be the world
More informationSolution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments
Unified Information Management for Complex Windows Environments The Explosion of Unstructured Information It is estimated that email, documents, presentations, and other types of unstructured information
More informationInjazat s Managed Services Portfolio
Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.
More informationSafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud
SafeNet Data Encryption and Control Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud Ensure Data Protection with Data Encryption and Control Across
More informationSafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud
SafeNet Data Encryption and Control Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud Ensure Data Protection with Data Encryption and Control Across
More informationSymantec Protection Suite Small Business Edition
Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business Edition is an easyto-use, all-in-one suite that secures your critical business assets and information against today
More informationArchiving, Backup, and Recovery for Complete the Promise of Virtualization
Archiving, Backup, and Recovery for Complete the Promise of Virtualization Unified information management for enterprise Windows environments The explosion of unstructured information It is estimated that
More informationData Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection
The gold standard in Windows data protection Overview Symantec Backup Exec 12.5 delivers market-leading backup and recovery protection from server to desktop, providing complete data protection for the
More informationSymantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it
Complete and high performance protection where you need it Overview delivers high-performance protection against physical and virtual server downtime with policy based prevention, using multiple protection
More informationSymantec Messaging Gateway 10.6
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
More informationSymantec Messaging Gateway powered by Brightmail
The first name in messaging security powered by Brightmail Overview, delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus protection, advanced
More informationNorth American Electric Reliability Corporation (NERC) Cyber Security Standard
North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation
More informationSymantec Backup Exec 2012 Licensing Guide
REPORT: SYMANTEC BACKUP EXEC 2012 LICENSING GUIDE........................................ Symantec Backup Exec 2012 Licensing Guide Who should read this paper Use this guide to learn how to license Symantec
More informationThe Impact of HIPAA and HITECH
The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients
More informationSymantec IT Management Suite 7.5 powered by Altiris
Symantec IT Management Suite 7.5 powered by Altiris IT flexibility. User freedom. Data Sheet: Endpoint Management Overview technology enables IT to make better decisions, be more flexible, improve productivity,
More informationSymantec Endpoint Protection 12.1.4
Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec
More informationSymantec Messaging Gateway 10.5
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
More informationData Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
More informationSymantec Backup Exec 2010
Reliable Backup and Recovery Designed for Your Growing Business Overview delivers market leading backup and recovery protection from server to desktop. Easily protect more data while you reduce storage
More informationProven LANDesk Solutions
LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations
More informationSymantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
More informationMobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
More informationData Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
More informationSymantec NetBackup 7.5 for VMware
V-Ray visibility into virtual machine protection Solution Overview: Data Protection Overview There is little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped
More informationOVERVIEW. Enterprise Security Solutions
Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s
More informationVeritas Enterprise Vault for Microsoft Exchange Server
Veritas Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Trusted and proven email archiving Veritas Enterprise Vault, the industry leader in email
More informationData Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information
Store, Manage, and Discover Critical Business Information Trusted and Proven Email Archiving Symantec Enterprise Vault, the industry leader in email and content archiving, enables companies to store, manage,
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationEndpoint Protection Small Business Edition 2013?
Symantec Endpoint Protection Small Business Edition 2013 Customer FAQ FAQ: Endpoint Security What is Symantec Endpoint Protection Small Business Edition 2013? is a new solution that offers simple, fast,
More informationEMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST
EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST Enabling user efficiency with a cloud-based email platform With productivity, revenues and reputation at stake, an
More informationCyber Security Services: Data Loss Prevention Monitoring Overview
WHITE PAPER: DLP MONITORING OVERVIEW........................................ Cyber Security Services: Data Loss Prevention Monitoring Overview Who should read this paper Customers who are interested in
More informationHow to Unlock Agility by Backing up to, from, and in the Cloud
WHITE PAPER: HOW TO UNLOCK AGILITY BY BACKING UP TO, FROM,....... AND.... IN.. THE.... CLOUD....................... How to Unlock Agility by Backing up to, from, and in the Cloud Who should read this paper
More informationEffective, Affordable Data Management with CommVault Simpana 9 and Microsoft Windows Azure
Effective, Affordable Data Management with CommVault Simpana 9 and Microsoft Windows Azure Businesses benefit from streamlined data management both on premises and in the cloud. White Paper Published:
More informationSymantec Endpoint Protection 12.1.2
Data Sheet: Endpoint Security Overview offers comprehensive defense against complex attacks for both physical and virtual environments. It integrates ten essential security technologies in a single, high
More informationSYMANTEC ENTERPRISE SOLUTION STRATEGY
ENTERPRISE STRATEGY IT OPERATIONS STORAGE MANAGEMENT CONTINUITY Data Center Automation pg 3 Veritas Cluster Server Veritas Server Foundation Veritas Application Director Veritas Configuration Manager Veritas
More informationSymantec Enterprise Vault.cloud Overview
Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult
More informationSymantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
More informationSymantec Endpoint Security Management Solutions Presentation and Demo for:
Symantec Endpoint Security Management Solutions Presentation and Demo for: University System of Georgia Board of Regents Information Technology Services Executive Summary Business Requirements To migrate
More informationTrend Micro Cloud Security for Citrix CloudPlatform
Trend Micro Cloud Security for Citrix CloudPlatform Proven Security Solutions for Public, Private and Hybrid Clouds 2 Trend Micro Provides Security for Citrix CloudPlatform Organizations today are embracing
More informationCloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization.
WHITE PAPER: CLOUD, APPLIANCE, OR SOFTWARE?........................................ Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Who should read
More informationSymantec Client Management Suite 7.5 powered by Altiris
Symantec Client Management Suite 7.5 powered by Altiris IT flexibility. User freedom. Data Sheet: Endpoint Management Overview technology enables IT to make better decisions, be more flexible, improve
More informationOVERVIEW. Enterprise Security Solutions
Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s
More informationSymantec Enterprise Vault for Lotus Domino
Symantec Enterprise Vault for Lotus Domino Store, Manage and Discover Critical Business Information Overview Industry-leading email archiving for Lotus Domino With the recognition that email has become
More informationAltiris IT Management Suite 7.1 from Symantec
Altiris IT Management Suite 7.1 from Achieve a new level of predictability Data Sheet: Endpoint Management Overviewview Change is inevitable for IT and it comes from several sources: changing needs from
More informationThe User is Evolving. July 12, 2011
McAfee Enterprise Mobility Management Securing Mobile Applications An overview for MEEC The User is Evolving 2 The User is Evolving 3 IT s Challenge with Mobile Devices Web 2.0, Apps 2.0, Mobility 2.0
More informationAltiris IT Management Suite 7.1 from Symantec
Altiris IT 7.1 Achieve a new level of predictability Overviewview Change is inevitable for IT and it comes from several sources: changing needs from lines of business, managing and supporting too many
More informationEndpoint Security More secure. Less complex. Less costs... More control.
Endpoint Security More secure. Less complex. Less costs... More control. Symantec Endpoint Security Today s complex threat landscape constantly shifts and changes to accomplish its ultimate goal to reap
More informationCloud Storage Backup for Storage as a Service with AT&T
WHITE PAPER: CLOUD STORAGE BACKUP FOR STORAGE AS A SERVICE........ WITH..... AT&T........................... Cloud Storage Backup for Storage as a Service with AT&T Who should read this paper Customers,
More informationHow To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
More informationSymantec Protection Suite Small Business Edition
Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business Edition is an easy-to-use, all-in-one suite that secures your critical business assets and information against
More informationUNCLASSIFIED. UK Email Archiving powered by Mimecast Service Description
UNCLASSIFIED 11/12/2015 v2.2 UK Email Archiving powered by Mimecast Service Description Cobweb s UK Email Archiving, powered by Mimecast, provides businesses with a secure, scalable cloud-based message
More informationALERT LOGIC FOR HIPAA COMPLIANCE
SOLUTION OVERVIEW: ALERT LOGIC FOR HIPAA COMPLIANCE AN OUNCE OF PREVENTION IS WORTH A POUND OF CURE Alert Logic provides organizations with the most advanced and cost-effective means to secure their healthcare
More informationPreemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
More informationComprehensive Agentless Cloud Backup and Recovery Software for the Enterprise
Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise 2 Your company s single most valuable asset may be its data. Customer data, product data, financial data, employee data this
More informationDevising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud
More informationSYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5
SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5 Advanced protection and hardening for advanced threats. Data Sheet: Security Management Symantec Data Center Security: Server Advanced 6.5 Solution Overviewview
More information