Symantec Federal Solutions

Size: px
Start display at page:

Download "Symantec Federal Solutions"

Transcription

1 Symantec Federal Solutions

2 Table of Contents 1. Introduction a. Symantec Public Sector b. The Federal Government IT Landscape and Challenges c. Symantec Government IT Solutions 3. Mobile 4. Data Center Management a. Storage Optimization b. Archiving and Deduplication c. Backup and Recovery d. Appliances

3 2. Security a. Endpoint Security b. Endpoint Management c. Encryption d. Messaging Security e. Authentication f. Data Loss Prevention g. Web Security 5. Virtualization 6. Cloud 7. Product Table 1 Introduction

4 Introduction

5 Symantec Public Sector Symantec is a global leader in providing security, storage, and systems management solutions to help consumers and organizations secure and manage their information-driven world. Symantec s Public Sector organization is focused on delivering the company s IT solutions to civilian, Department of Defense, Intelligence agencies, state and local governments, and education institutions. Our solutions protect against more risks at more points, more completely and efficiently, to enable confidence wherever information is used or stored. Federal agencies rely on Symantec to fulfill their security, mobile, data center, virtualization, and cloud initiatives. Our solutions enable organizations to comply with federal IT regulations and mandates such as FIPS 140-2, OMB 06-16, the Data Center Consolidation Initiative, and multiple other federal requirements. This reference guide provides an overview of how Symantec s solutions can help the federal government deliver on its mission to serve citizens. 2

6 Cybersecurity & Sophisticated Attacks Information Explosion Consumerization of IT Complex & Changing Infrastructure

7 Federal government IT landscape and challenges Federal organizations are facing multiple IT challenges in four primary areas: cybersecurity and sophisticated attacks, information explosion, consumerization of IT, and complex and changing infrastructure. These four trends are having a profound effect on the ability of government agencies to protect and manage an explosion of information. Moving applications to the cloud, consolidating data centers, managing mobile devices, and authenticating users are approaches that government agencies are leveraging to become more secure and efficient. To prevent these trends from delaying their mission-critical operations, government agencies must have a clear strategy for identifying and adopting IT solutions that secure, manage, and protect their information. 3

8

9 Symantec government IT solutions Symantec brings together leading technology solutions that work seamlessly across multiple platforms, giving customers the freedom to use the devices of their choice and to access, store, and transmit information anytime, anywhere. Symantec s solutions for federal government agencies include: security, mobile, data center, virtualization, and cloud. Its security and management solutions help ensure that information, identities, infrastructure, and processes are protected, managed, and controlled across physical and virtual platforms. Likewise, its data center management solutions enable government agencies to optimize storage, back up, archive, recover critical information, reduce overall storage costs, and more efficiently manage and discover the information. Finally, Symantec s solutions enable agencies to migrate to the cloud and secure their cloud computing environments, manage and secure mobile devices, and manage virtual computing environments with greater visibility and efficiency. 4 Security

10 Security

11 Security Nothing is more important to government agencies today than a well-secured and managed IT environment. Security threats are becoming more targeted, more prolific, and more sophisticated. Symantec s information security solutions protect and secure data regardless of the device it is being accessed on, where it resides, and whether it is in motion or at rest. Endpoint security Symantec endpoint security solutions provide comprehensive threat protection for enterprise endpoints including desktops, servers, laptops, and mobile devices. This technology includes Symantec s world-leading antivirus, antispyware, firewall, encryption, device, and application control, intrusion protection, and network access control. Symantec s award-winning technology boosts the performance, accuracy, and detection for identifying threats against physical and virtual systems and mitigating those threats. Symantec takes a proactive security approach to preventing intrusions and targeted attacks before they reach the endpoint. Symantec s endpoint protection provides protection against even the most sophisticated attacks that evade traditional security measures such as root kits, zero-day attacks, and mutating spyware. 5

12

13 Endpoint security highlights Identifies and secures confidential data on all laptops, desktops, and mobile devices Protects and prevents your information from accidental data loss and assures protection against unauthorized access Prevents intrusions and stops attacks before they reach endpoints Protects endpoints from known and unknown threats, using advanced threat prevention Provides integrated antivirus, antispyware, firewall, and intrusion prevention as well as device control and application control with one single agent Compliance areas supported FISMA, USGCB/FDCC, OMB 06-16, FIPS 140-2, DCID 6/3, IAVA, Section 508 of the U.S. Rehabilitation Act 6

14

15 Endpoint management Over 70 percent of an organization s total cost of owning a client system can go toward the support and maintenance of the endpoint. Symantec s endpoint management solutions automate time-consuming and redundant tasks to minimize efforts and costs associated with deploying, patching, and supporting client systems and software. Organizations can manage more technologies with greater efficiencies on more platforms with Symantec endpoint management solutions. 7

16 Endpoint management highlights Easily identifies system assets through comprehensive hardware and software inventory Automates migrations, operating system upgrades, patch management, imaging, and deployment updates Improves efficiencies and reduces costs through intelligent software management and delivery Proactively manages software updates and provides global remote assistance capabilities Ensures data protection by recovering lost data, rolling back to a known good state, or completely recovering the client system Tracks and manages asset configurations throughout the IT lifecycle

17 Compliance areas supported FISMA, USGCB/FDCC, OMB 06-16, FIPS 140-2, DCID 6/3, IAVA, Section 508 of the U.S. Rehabilitation Act 8

18 Encryption Symantec endpoint encryption software provides advanced data and file encryption for desktops, laptops, and removable storage devices. It offers scalable, enterprise-wide security that prevents unauthorized access by using strong access control and powerful encryption. Symantec endpoint encryption provides a central management console, enabling safe, central deployment and management of encryption to endpoints.

19 Encryption highlights Full disk, removable storage, and device control endpoint encryption solutions Controls access to ports, devices, and wireless networks Automatic, on-demand, and content-driven encryption of removable storage Monitors and restricts users ability to copy protected classes of information Self-decrypting archives for secure, one-way distribution of encrypted files Compliance areas supported OMB-06-16, NIST FIPS validated, Common Criteria 9

20 Messaging security Symantec secures more than 8 billion connections daily and protects more than 850 million mailboxes from threats and attacks targeted at inbound and outbound with integrated antispam, antivirus, advanced content filtering, data loss prevention, and encryption. Customers can choose from a range of delivery options including on-premise (software, appliance, virtual), cloud, managed services, and hybrid implementations.

21 Messaging security highlights Protects against malware and filters content over inbound and outbound Blocks more than 99 percent of spam with less than one in one million false positives Accurate, effective, real-time antispam and antivirus protection, advanced content filtering, data loss prevention, and encryption Cost-effective with reputation-based filtering that can block up to and more than 90 percent of threats at connection time Improves Exchange /Domino performance by reducing the volume of messages processed Compliance areas supported PCI, HIPAA, ITAR, OFAC, Data Protection Act 10

22

23 Authentication Symantec provides authentication solutions to enable organizations to protect their identities, secure their data, and enable trust in online transactions. Symantec s comprehensive suite of authentication solutions are delivered via secure, scalable cloud-based services and enable e-government by providing security services needed to protect interactions between government employees, industry partners, and citizens. Symantec s authentication solutions have been tested and certified for compliance with U.S. federal government technical and policy requirements. 11

24 Authentication highlights Uses managed PKI solutions to issue digital certificates for people, Web servers, devices, and applications to enable trusted, authenticated online transactions Identity credentialing solutions for issuing and managing Personal Identity Verification (PIV) and (PIV-I) smart cards for use as employee badges and for physical and logical accesses to IT systems and facilities One-time password solutions for remote access by employees, partners, and citizens to government websites Fraud detection service for real-time detection of anomalous behavior and suspicious transactions Unique, easy-to-deploy, cloud-based service that balances cost, convenience, and risk

25 Compliance areas supported FIPS 201, FIPS 140-2, HSPD-12, PCI, HIPAA LOGIN 12

26 Data loss prevention (DLP) In the past few years, DLP technology has become an indispensible part of a security portfolio. Data loss is a serious, yet preventable, IT problem that can happen in any organization of any size through malicious intent or by a well-meaning insider. Symantec, the recognized world leader in DLP, delivers a proven, content-aware solution to discover, monitor, and protect confidential data wherever it is stored or used. Symantec allows customers to reduce their risk of a data breach, demonstrate regulatory compliance, and safeguard privacy and intellectual property.

27 DLP highlights Recognizes sensitive data based on samples and creates policies to protect unstructured data Monitors and blocks sensitive files accessed by any application, including encrypted protocols Co-locates DLP with your hosted service provider to extend the DLP into the cloud Compliance areas supported HIPAA, Privacy Act, Cyberscope, OMB 6-16, 7-16, 11-8,

28 Web security The Web and Web applications have become major sources of malware infections in organizations. Attackers are exploiting these threats using rapidly changing malware. Because of the quickly evolving threat landscape, few organizations are able to secure their Internet gateways from Web-borne malware, which leaves them vulnerable to attacks. Symantec uses a proactive approach to combat Web-borne malware by providing Web security solutions to protect infrastructures from malicious activity and to ensure that users stay safe on the Web.

29 Web security highlights Symantec s Web security is backed by the Symantec Global Intelligence Network of more than 175 million users to identify new threats before they cause disruptions in organizations Protects and secures networks from malicious attacks Protects users from visiting infected websites or legitimate sites infected by malware Demonstrates and enforces compliance for Web policies Protects Web presence and confidential information from external attacks and data loss Compliance areas supported PCI DSS 14 Mobile

30 Mobile

31 Mobile Everyday government employees are doing more work using mobile devices, smartphones, laptops, tablets, and more. Mobility is making people more productive and efficient, but it s also creating new challenges for organizations. Symantec s Mobile Device Management (MDM) solutions secure remote access for mobile endpoints and help agencies enforce security and network compliance policies across their organizations. 15

32

33 Mobile solutions highlights Comprehensive enterprise security for all leading mobile platforms including iphone, ipad, and Android Policy management of Android, WebOS, and Windows Phone 7 devices Selective wipe capabilities to isolate the corporate data on personal devices Advanced application and content distribution to mobile devices in the field Strong authentication to the network resources and applications with managed PKI infrastructure Integration with Symantec Endpoint Management Suite for unified management of PCs, laptops, smartphones, and tablets 16 Data Center Management

34 Data Center Management

35 Data center management According to industry analysts, data is growing at 30 percent to 60 percent per year, which means managing your storage infrastructure is no easy task. Symantec helps organizations gain control of sprawling infrastructures with solutions for storage optimization, backup and recovery, archiving, and discovery. Storage optimization Today, organizations are storing more information as their employees create increasingly more electronic content. Much of this content must be kept and made readily available to meet compliance mandates and audit requirements. Symantec s storage optimization solutions provide the ability to migrate between storage hardware seamlessly, move information from expensive to inexpensive disk, provide shared structures where appropriate, and increase the overall utilization of storage already in the data center. 17

36

37 Storage optimization highlights Dynamic storage tiering with multiple operating systems Minimal downtime to adopt/migrate between storage resources Ability to actively monitor and report against multiple physical storage vendors Thin provisioning allows for better utilization of physical assets Solutions available for physical, virtual, and cloud environments Compliance areas supported Common Criteria 18

38 Archiving and deduplication Symantec s archiving and deduplication solutions automatically back up data and move it to a static, lower-cost platform while removing redundancies in the information. This transparent process of moving and retaining unstructured data improves performance, scalability, and manageability of applications while reducing risk and costs. Once the data is archived, Symantec offers an end-to-end comprehensive ediscovery solution to quickly locate and produce information in response to litigation matters and internal or external requests.

39 Archiving and deduplication highlights Enables more efficient use of storage for data protection Collects key information that makes your data more extensible Reduces storage costs by up to 60 percent by archiving and deduplicating across multiple content sources Reduces operating and training costs, increases process efficiency, and implements quickly Quickly and automatically discovers information across , desktops, file servers, backups, and the cloud Provides ability to take information out of the traditional backup cycle Integrates with Symantec Data Loss Prevention Compliance areas supported DOD STD, FIPS 140-2, 36 CFR , NARA Bulletin , OMB M-04-16, 06-16,

40 Backup and recovery Symantec s backup and recovery solutions protect information by automating advanced technologies and standardizing operations across applications, platforms, and virtual environments. That means being able to protect completely, store efficiently, recover anywhere, and manage centrally across heterogeneous operating systems and storage hardware, including tape and disk.

41 Backup and recovery highlights Integrates with software APIs and various applications within organizations infrastructures, such as Oracle, Microsoft SQL, and Microsoft Exchange. Risk management through continuous monitoring: discover, assess, and remediate Reduces operating and training costs, increases process efficiency, and implements quickly covering physical, virtual, and cloud environments Appliance option combines software and hardware into a pretested known performance profile, providing agencies with operational simplicity, effective utilization of bandwidth and storage, and high performance Scalable appliances that reduce the need for re-engineering environments prior to deployment Global deduplication leverages deduplication across multiple clients and across appliance nodes Compliance areas supported FISMA 140-2, Common Criteria 20

42 Appliances Symantec has a comprehensive set of physical and virtual appliances capable of securing and managing information to sanitize messaging streams, solve log management problems, and address enterprise security incident response services. Current challenges like data retention, audit requirements, and the lack of IT resources have made it increasingly difficult to manage information effectively. Symantec appliances are capable of collecting and processing data at high volume rates, storing information in a way that is quickly retrievable, and protecting data from attacks and data leaks. Symantec s solutions give customers the ability to deliver the right information to the right people via self-service capabilities. The virtual appliance option offers greater flexibility in deployment and scalability considerations.

43 Appliances highlights Built-in client and media server deduplication Virtual machine aware deduplication and integrated virtual and physical deduplication Equipped with Symantec V-Ray, this provides for a unique visibility into virtual environments that speeds recovery and reduces storage costs Decrease storage by times and up to 99 percent reduction in bandwidth consumption Starting at 4TB and expandable up to 36TB of useable disk, ideal for remote offices, regional offices, and enterprise data centers 21 Virtualization

44 Virtualization

45 Virtualization The widespread adoption of virtualization is altering IT management, deployment, licensing, and pricing. Symantec s virtualization solutions deliver advanced security and availability in addition to simplified storage management capabilities needed to virtualize federal agencies business-critical applications. Symantec s advanced technologies provide the visibility and control required to automate service-level processes, accelerate server and desktop virtualization deployments, and reduce the cost and complexity of managing and protecting high-density virtual and physical infrastructures. 22

46

47 Virtualization solutions highlights Provides anytime, anywhere access to workspaces Controls storage growth, eliminates backup and recovery bottlenecks, and ensures application-level disaster recovery Ensures application availability, coordinates new deployments and upgrades, and provides advanced monitoring for multi-tier applications Enables comprehensive data protection, security, storage management, and availability for virtual environments 23 Cloud

48 Cloud

49 Cloud The federal government s Cloud First policy requires federal agencies to shift from building custom systems to adopting leading-edge technologies and shared solutions to reduce costs and increase flexibility and speed. Symantec s cloud solutions support private, public, and hybrid cloud models and map to government requirements for operating, governing, managing, and securing information in the cloud. Our technologies help agencies manage and secure their environments as they move to cloud-based deployments. Symantec also works with key cloud service providers and telecommunication partners to provide government agencies with a complete suite of managed infrastructure services for mission-critical objectives and service to citizen applications, including cloud computing, collocation, network services, managed hosting, and security services. 24

50

51 Product Table Cloud solutions highlights Governing in the cloud: legal and ediscovery, compliance and audit, information lifecycle management Operating in the cloud: data center operations, disaster recovery, application security, identity, and access management Managing in the cloud: archiving, ediscovery, storage, and backup Securing in the cloud: real-time antispam, antivirus, content filtering, encryption, data loss prevention, and compliance 25

52 Product Table Product Table S E C U R I T Y a. Endpoint Security b. Endpoint Management Antivirus, Critical System Protection, Endpoint Encryption, Endpoint Protection, Multi-tier Protection, Network Access Control, Protection Center, Protection Suite, Scan Engine, Whole Disk Encryption, PGP Portable, Security Information Manager, Risk Automation Suite IT Management Suite, Security Information Manager, Mobile Management, Endpoint Virtualization Suite c. Encryption d. Messaging Security Endpoint Encryption Messaging Gateway, Web Gateway, IM Manager, Mail Security, Multi-tier Protection, Protection Center, Protection for SharePoint Servers, Premium AntiSpam, Protection Suite, Security Information Manager e. Authentication f. Data Loss Prevention Validation and ID Protection Service (VIP), Managed PKI Service, VeriSign Identity Protection, Fraud Detection Service Critical System Protection, Data- Loss Prevention, Endpoint Encryption, Enterprise Vault, Protection Suite, Security Information Manager g. Web Security Data Loss Prevention Network, Protection Suite, Web Gateway, Security Information Manager MOBILE Validation and ID Protection Service (VIP), Mobile Management, Endpoint Protection, Network Access Control, Endpoint Encryption Device Control

53 DATA CENTER MANAGEMENT a. Storage Optimization Data Insight for Storage, FileStore, Storage Foundation, VirtualStore b. Archiving and Deduplication Enterprise Vault, Clearwell ediscovery Platform, Net Backup, Storage Foundation, Backup Exec c. Backup and Recovery NetBackup, Backup Exec, Enterprise Vault, System Recovery d. Appliances NetBackup, FileStore, Web Gateway, Security Information Manager VIRTUALIZATION ApplicationHA, Backup Exec, System Recovery, Cluster Server, Dynamic Multi-Pathing, NetBackup, Storage Foundation CLOUD NetBackup, Validation and ID Protection Service (VIP), Backup Exec.cloud, Enterprise Vault.cloud, Web Security.cloud, Security.cloud, Endpoint Protection.cloud, Managed PKI Service 26

54 About Symantec Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Headquartered in Mountain View, Calif., Symantec has operations in 40 countries. More information is available at

55 Symantec World Headquarters Mountain View, USA 350 Ellis Street Mountain View, CA USA Phone: +1 (650) US Public Sector Headquarters 2350 Corporate Park Drive Suite 600 Herndon, VA USA Phone: +1 (800) Copyright 2011 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, Altiris, PGP, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. VeriSign is a registered trademark of VeriSign, Inc. VeriSign, VeriSign Trust and other related marks are the trademarks or registered trademarks of VeriSign, Inc. or its affiliates or subsidiaries in the U.S. and other countries and licensed to Symantec Corporation. Microsoft, Windows, and Exchange are trademarks of Microsoft Corporation in the United States, other countries, or both. Domino is a registered trademark of IBM Corporation. iphone and ipad are trademarks of Apple Inc., registered in the U.S. and other countries. Android is a trademark or registered trademark of Google, Inc. Oracle is a registered trademark of Oracle Corporation in the United States and/or other countries. Other names may be trademarks of their respective owners. 9/

56

INFORMATION PROTECTED

INFORMATION PROTECTED INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any

More information

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex

More information

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE

More information

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management for Configuration Manager 7.2 Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

Confidence in the Cloud Five Ways to Capitalize with Symantec

Confidence in the Cloud Five Ways to Capitalize with Symantec Five Ways to Capitalize with Symantec Solution Brief: Confidence in the Cloud Confidence in the Cloud Contents Overview...............................................................................................

More information

Symantec Enterprise Vault and Symantec Enterprise Vault.cloud

Symantec Enterprise Vault and Symantec Enterprise Vault.cloud Symantec Enterprise Vault and Symantec Enterprise Vault.cloud Better store, manage, and discover business-critical information Solution Overview: Archiving Introduction The data explosion that has burdened

More information

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus

More information

2012 Endpoint Security Best Practices Survey

2012 Endpoint Security Best Practices Survey WHITE PAPER: 2012 ENDPOINT SECURITY BEST PRACTICES SURVEY........................................ 2012 Endpoint Security Best Practices Survey Who should read this paper Small and medium business owners

More information

Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information

Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information Store, Manage, and Discover Critical Business Information Managing millions of mailboxes for thousands of customers worldwide, Enterprise Vault, the industry leader in email and content archiving, enables

More information

PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud

PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud Blue skies ahead? Yes if you are protected when you move to the cloud. Lately, it seems as if every enterprise

More information

Public, Private, Hybrid:

Public, Private, Hybrid: Public, Private, Hybrid: How to Use the Cloud for More Effective Security Symantec and Cloud Computing Ron Poserina, Director of Systems Engineering Agenda Our Perspective on Cloud Computing Why Cloud

More information

Symantec Enterprise Vault for Microsoft Exchange

Symantec Enterprise Vault for Microsoft Exchange Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry

More information

Symantec Mobile Security

Symantec Mobile Security Advanced threat protection for mobile devices Data Sheet: Endpoint Management and Mobility Overview The combination of uncurated app stores, platform openness, and sizeable marketshare, make the Android

More information

An ICT ConsultingCompany

An ICT ConsultingCompany An ICT ConsultingCompany About Us Innovation Experience Market leader technologies Solutions that ensure the best performance through efficiency An ICT Consulting Company 2 Our Mission Improvement of business

More information

Confidence in a Connected World. MEEC Symantec Product Availability. John Lally MD Education Account Executive 204-401-7342 John_Lally@symantec.

Confidence in a Connected World. MEEC Symantec Product Availability. John Lally MD Education Account Executive 204-401-7342 John_Lally@symantec. Confidence in a Connected World MEEC Symantec Product Availability John Lally MD Education Account Executive 204-401-7342 John_Lally@symantec.com 1 Agenda New threats means advanced security tactics SEP

More information

Solution Brief: Enterprise Security

Solution Brief: Enterprise Security Symantec Brightmail Gateway and VMware Solution Brief: Enterprise Security Symantec Brightmail Gateway and VMware Contents Corporate overview......................................................................................

More information

overview Enterprise Security Solutions

overview Enterprise Security Solutions Enterprise Security Solutions overview For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an ever-evolving IT threat landscape. It s how we got to be the world

More information

Small and Midsize Business Protection Guide

Small and Midsize Business Protection Guide P r o t e c t i o n G u i d e : C l o s e t h e P r o t e c t i o n G a p Small and Midsize Business Protection Guide Close the protection gap and safeguard your business future Confidence in a connected

More information

Optimizing the Data Center for Today s State & Local Government

Optimizing the Data Center for Today s State & Local Government WHITE PAPER: OPTIMIZING THE DATA CENTER FOR TODAY S STATE...... &.. LOCAL...... GOVERNMENT.......................... Optimizing the Data Center for Today s State & Local Government Who should read this

More information

Data Sheet: IT Compliance Payment Card Industry Data Security Standard

Data Sheet: IT Compliance Payment Card Industry Data Security Standard The (PCI, or PCI DSS) was developed by the PCI Security Standards Council to assure cardholders that their details were secure during payment card transactions. The Council, which now governs the Standard,

More information

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS Learn more about Symantec security here OVERVIEW Data and communication protection isn t a problem limited to large enterprises. Small and

More information

Is Your Vendor CJIS-Certified?

Is Your Vendor CJIS-Certified? A Thought Leadership Profile Symantec SHUTTERSTOCK.COM Is Your Vendor CJIS-Certified? How to identify a vendor partner that can help your agency comply with new federal security standards for accessing

More information

Athena Mobile Device Management from Symantec

Athena Mobile Device Management from Symantec Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile

More information

Symantec Enterprise Vault for Microsoft Exchange Server

Symantec Enterprise Vault for Microsoft Exchange Server Symantec Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving performance and users can enjoy

More information

Symantec Backup Exec 2012

Symantec Backup Exec 2012 Better backup for all Data Sheet: Backup and Disaster Recovery Overview is one integrated product that protects virtual and physical environments, simplifies both backup and disaster recovery, and recovers

More information

Symantec Enterprise Vault for Microsoft Exchange

Symantec Enterprise Vault for Microsoft Exchange Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry

More information

Symantec NetBackup 7.5 What s New and Version Comparison Matrix

Symantec NetBackup 7.5 What s New and Version Comparison Matrix Symantec NetBackup 7.5 What s New and Version Comparison Matrix Solution Overview: Data Protection While backup takes many forms, recovery shouldn t. Symantec NetBackup with V-Ray technology is the single

More information

Is online backup right for your business? Eight reasons to consider protecting your data with a hybrid backup solution

Is online backup right for your business? Eight reasons to consider protecting your data with a hybrid backup solution PARTNER BRIEF: IS ONLINE BACKUP RIGHT FOR YOUR BUSINESS?........................................ Is online backup right for your business? Eight reasons to consider protecting your data with a hybrid Who

More information

Symantec Protection Suite Add-On for Hosted Email and Web Security

Symantec Protection Suite Add-On for Hosted Email and Web Security Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication

More information

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments Endpoint Management and Mobility Solutions from Symantec Adapting traditional IT operations for new end-user environments During the past few years the traditional concept of end-user computing has drastically

More information

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses A simple, effective and affordable solution designed for small businesses Overview Symantec Protection Suite Small Business Edition is a simple, affordable, security and backup solution. It is designed

More information

Demystifying Virtualization for Small Businesses Executive Brief

Demystifying Virtualization for Small Businesses Executive Brief Demystifying Virtualization for Small Businesses White Paper: Demystifying Virtualization for Small Businesses Demystifying Virtualization for Small Businesses Contents Introduction............................................................................................

More information

Symantec Encryption Solutions for Email, Powered by PGP Technology

Symantec Encryption Solutions for Email, Powered by PGP Technology Symantec Encryption Solutions for Email, Powered by PGP Technology Data Sheet: Encryption The Problem with Email Are you worried that users are emailing sensitive information openly? According to Osterman

More information

Symantec's Continuous Monitoring Solution

Symantec's Continuous Monitoring Solution Preparing for FISMA 2.0 and Continuous Monitoring Requirements Symantec's Continuous Monitoring Solution White Paper: Preparing for FISMA 2.0 and Continuous Monitoring Requirements Contents Introduction............................................................................................

More information

Optimizing the Data Center for Today s Federal Government

Optimizing the Data Center for Today s Federal Government WHITE PAPER: OPTIMIZING THE DATA CENTER FOR TODAY S FEDERAL......... GOVERNMENT............................... Optimizing the Data Center for Today s Federal Government Who should read this paper CIOs,

More information

overview Enterprise Security Solutions

overview Enterprise Security Solutions Enterprise Security Solutions overview For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an ever-evolving IT threat landscape. It s how we got to be the world

More information

Exploiting the business potential of BYOD (bring your own device)

Exploiting the business potential of BYOD (bring your own device) WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses

More information

Symantec Endpoint Protection

Symantec Endpoint Protection The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,

More information

Securing Office 365 with Symantec

Securing Office 365 with Symantec January, 2016 Solution Overview: Enterprise Security Adoption of Microsoft Office 365, Google Apps, and other cloud-based productivity solutions is growing. Microsoft in its Ignite 2015 session claimed

More information

Solution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments

Solution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments Unified Information Management for Complex Windows Environments The Explosion of Unstructured Information It is estimated that email, documents, presentations, and other types of unstructured information

More information

Injazat s Managed Services Portfolio

Injazat s Managed Services Portfolio Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.

More information

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION Frequently Asked Questions WHAT IS SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION 1? Symantec Endpoint Protection Small Business Edition is built

More information

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud SafeNet Data Encryption and Control Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud Ensure Data Protection with Data Encryption and Control Across

More information

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud SafeNet Data Encryption and Control Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud Ensure Data Protection with Data Encryption and Control Across

More information

Symantec Protection Suite Small Business Edition

Symantec Protection Suite Small Business Edition Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business Edition is an easyto-use, all-in-one suite that secures your critical business assets and information against today

More information

Archiving, Backup, and Recovery for Complete the Promise of Virtualization

Archiving, Backup, and Recovery for Complete the Promise of Virtualization Archiving, Backup, and Recovery for Complete the Promise of Virtualization Unified information management for enterprise Windows environments The explosion of unstructured information It is estimated that

More information

Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection

Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection The gold standard in Windows data protection Overview Symantec Backup Exec 12.5 delivers market-leading backup and recovery protection from server to desktop, providing complete data protection for the

More information

Symantec IT Management Suite 7.5 powered by Altiris

Symantec IT Management Suite 7.5 powered by Altiris Symantec IT Management Suite 7.5 powered by Altiris IT flexibility. User freedom. Data Sheet: Endpoint Management Overview technology enables IT to make better decisions, be more flexible, improve productivity,

More information

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it Complete and high performance protection where you need it Overview delivers high-performance protection against physical and virtual server downtime with policy based prevention, using multiple protection

More information

North American Electric Reliability Corporation (NERC) Cyber Security Standard

North American Electric Reliability Corporation (NERC) Cyber Security Standard North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation

More information

Symantec Messaging Gateway 10.6

Symantec Messaging Gateway 10.6 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

Symantec Backup Exec 2012 Licensing Guide

Symantec Backup Exec 2012 Licensing Guide REPORT: SYMANTEC BACKUP EXEC 2012 LICENSING GUIDE........................................ Symantec Backup Exec 2012 Licensing Guide Who should read this paper Use this guide to learn how to license Symantec

More information

Symantec Messaging Gateway powered by Brightmail

Symantec Messaging Gateway powered by Brightmail The first name in messaging security powered by Brightmail Overview, delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus protection, advanced

More information

The Impact of HIPAA and HITECH

The Impact of HIPAA and HITECH The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients

More information

Symantec Endpoint Protection 12.1.4

Symantec Endpoint Protection 12.1.4 Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec

More information

Symantec Messaging Gateway 10.5

Symantec Messaging Gateway 10.5 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

Proven LANDesk Solutions

Proven LANDesk Solutions LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations

More information

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173

More information

Symantec Backup Exec 2010

Symantec Backup Exec 2010 Reliable Backup and Recovery Designed for Your Growing Business Overview delivers market leading backup and recovery protection from server to desktop. Easily protect more data while you reduce storage

More information

Symantec Mobile Management Suite

Symantec Mobile Management Suite Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the

More information

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

OVERVIEW. Enterprise Security Solutions

OVERVIEW. Enterprise Security Solutions Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s

More information

Symantec NetBackup 7.5 for VMware

Symantec NetBackup 7.5 for VMware V-Ray visibility into virtual machine protection Solution Overview: Data Protection Overview There is little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

Veritas Enterprise Vault for Microsoft Exchange Server

Veritas Enterprise Vault for Microsoft Exchange Server Veritas Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Trusted and proven email archiving Veritas Enterprise Vault, the industry leader in email

More information

Endpoint Protection Small Business Edition 2013?

Endpoint Protection Small Business Edition 2013? Symantec Endpoint Protection Small Business Edition 2013 Customer FAQ FAQ: Endpoint Security What is Symantec Endpoint Protection Small Business Edition 2013? is a new solution that offers simple, fast,

More information

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information Store, Manage, and Discover Critical Business Information Trusted and Proven Email Archiving Symantec Enterprise Vault, the industry leader in email and content archiving, enables companies to store, manage,

More information

Symantec Endpoint Protection 12.1.2

Symantec Endpoint Protection 12.1.2 Data Sheet: Endpoint Security Overview offers comprehensive defense against complex attacks for both physical and virtual environments. It integrates ten essential security technologies in a single, high

More information

OVERVIEW. Enterprise Security Solutions

OVERVIEW. Enterprise Security Solutions Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s

More information

Symantec Client Management Suite 7.5 powered by Altiris

Symantec Client Management Suite 7.5 powered by Altiris Symantec Client Management Suite 7.5 powered by Altiris IT flexibility. User freedom. Data Sheet: Endpoint Management Overview technology enables IT to make better decisions, be more flexible, improve

More information

Effective, Affordable Data Management with CommVault Simpana 9 and Microsoft Windows Azure

Effective, Affordable Data Management with CommVault Simpana 9 and Microsoft Windows Azure Effective, Affordable Data Management with CommVault Simpana 9 and Microsoft Windows Azure Businesses benefit from streamlined data management both on premises and in the cloud. White Paper Published:

More information

EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST

EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST Enabling user efficiency with a cloud-based email platform With productivity, revenues and reputation at stake, an

More information

How to Unlock Agility by Backing up to, from, and in the Cloud

How to Unlock Agility by Backing up to, from, and in the Cloud WHITE PAPER: HOW TO UNLOCK AGILITY BY BACKING UP TO, FROM,....... AND.... IN.. THE.... CLOUD....................... How to Unlock Agility by Backing up to, from, and in the Cloud Who should read this paper

More information

SYMANTEC ENTERPRISE SOLUTION STRATEGY

SYMANTEC ENTERPRISE SOLUTION STRATEGY ENTERPRISE STRATEGY IT OPERATIONS STORAGE MANAGEMENT CONTINUITY Data Center Automation pg 3 Veritas Cluster Server Veritas Server Foundation Veritas Application Director Veritas Configuration Manager Veritas

More information

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data

More information

Symantec Endpoint Security Management Solutions Presentation and Demo for:

Symantec Endpoint Security Management Solutions Presentation and Demo for: Symantec Endpoint Security Management Solutions Presentation and Demo for: University System of Georgia Board of Regents Information Technology Services Executive Summary Business Requirements To migrate

More information

Cyber Security Services: Data Loss Prevention Monitoring Overview

Cyber Security Services: Data Loss Prevention Monitoring Overview WHITE PAPER: DLP MONITORING OVERVIEW........................................ Cyber Security Services: Data Loss Prevention Monitoring Overview Who should read this paper Customers who are interested in

More information

Trend Micro Cloud Security for Citrix CloudPlatform

Trend Micro Cloud Security for Citrix CloudPlatform Trend Micro Cloud Security for Citrix CloudPlatform Proven Security Solutions for Public, Private and Hybrid Clouds 2 Trend Micro Provides Security for Citrix CloudPlatform Organizations today are embracing

More information

Symantec Enterprise Vault.cloud Overview

Symantec Enterprise Vault.cloud Overview Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult

More information

Symantec Enterprise Vault for Lotus Domino

Symantec Enterprise Vault for Lotus Domino Symantec Enterprise Vault for Lotus Domino Store, Manage and Discover Critical Business Information Overview Industry-leading email archiving for Lotus Domino With the recognition that email has become

More information

Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization.

Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization. WHITE PAPER: CLOUD, APPLIANCE, OR SOFTWARE?........................................ Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Who should read

More information

The User is Evolving. July 12, 2011

The User is Evolving. July 12, 2011 McAfee Enterprise Mobility Management Securing Mobile Applications An overview for MEEC The User is Evolving 2 The User is Evolving 3 IT s Challenge with Mobile Devices Web 2.0, Apps 2.0, Mobility 2.0

More information

Altiris IT Management Suite 7.1 from Symantec

Altiris IT Management Suite 7.1 from Symantec Altiris IT Management Suite 7.1 from Achieve a new level of predictability Data Sheet: Endpoint Management Overviewview Change is inevitable for IT and it comes from several sources: changing needs from

More information

Preemptive security solutions for healthcare

Preemptive security solutions for healthcare Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare

More information

Endpoint Security More secure. Less complex. Less costs... More control.

Endpoint Security More secure. Less complex. Less costs... More control. Endpoint Security More secure. Less complex. Less costs... More control. Symantec Endpoint Security Today s complex threat landscape constantly shifts and changes to accomplish its ultimate goal to reap

More information

Altiris IT Management Suite 7.1 from Symantec

Altiris IT Management Suite 7.1 from Symantec Altiris IT 7.1 Achieve a new level of predictability Overviewview Change is inevitable for IT and it comes from several sources: changing needs from lines of business, managing and supporting too many

More information

Trend Micro Cloud Protection

Trend Micro Cloud Protection A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to

More information

UNCLASSIFIED. UK Email Archiving powered by Mimecast Service Description

UNCLASSIFIED. UK Email Archiving powered by Mimecast Service Description UNCLASSIFIED 11/12/2015 v2.2 UK Email Archiving powered by Mimecast Service Description Cobweb s UK Email Archiving, powered by Mimecast, provides businesses with a secure, scalable cloud-based message

More information

ALERT LOGIC FOR HIPAA COMPLIANCE

ALERT LOGIC FOR HIPAA COMPLIANCE SOLUTION OVERVIEW: ALERT LOGIC FOR HIPAA COMPLIANCE AN OUNCE OF PREVENTION IS WORTH A POUND OF CURE Alert Logic provides organizations with the most advanced and cost-effective means to secure their healthcare

More information

Cloud Storage Backup for Storage as a Service with AT&T

Cloud Storage Backup for Storage as a Service with AT&T WHITE PAPER: CLOUD STORAGE BACKUP FOR STORAGE AS A SERVICE........ WITH..... AT&T........................... Cloud Storage Backup for Storage as a Service with AT&T Who should read this paper Customers,

More information

Symantec Protection Suite Small Business Edition

Symantec Protection Suite Small Business Edition Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business Edition is an easy-to-use, all-in-one suite that secures your critical business assets and information against

More information

Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise

Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise 2 Your company s single most valuable asset may be its data. Customer data, product data, financial data, employee data this

More information

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary

More information