L06: Migrating to SEP 12.1

Size: px
Start display at page:

Download "L06: Migrating to SEP 12.1"

Transcription

1 L06: Migrating to SEP 12.1 Elisha Riedlinger Technical Product Management L06: Migrating to SEP

2 At the end of this lab, you should be able to Understand how to Migrate SEP 11.x SEPMs to SEP 12.1 Understand how to Migrate SEP 11.x Clients to SEP 12.1 L06: Migrating to SEP 12.1 SYMANTEC VISION

3 WHY SEP 12.1? Unrivaled Security Blazing Performance Built for Virtual Environments Powered by Insight Real Time Behavior Monitoring with SONAR Up to 70% reduction in scan overhead Smarter Updates Faster Management Tested and optimized for virtual environments Higher VM densities Upgrading to SEP 12.1 SYMANTEC VISION

4 Things to Consider SEP 12.1 can manage SEP 12.x and SEP 11.x clients The latest release is SEP 12.1 RU1 MP1 SEP 12.1 can automatically push delta packages to upgrade older SEP clients to 12.1 SEP 12.1 has New Polices that implement Symantec Best Practices Customers may want to test the new security technologies SONAR and Insight before Enabling to minimize FPs Add Exclusions for Internal Websites Test Proprietary Applications 4

5 Additional Links 1) Symantec Endpoint Protection 12.1: Best Practices for Disaster Recovery with the SEPM 2) Best practices regarding Intrusion Prevention System technology 3) Symantec Endpoint Protection Virtualization Best Practices 4) About best practices for creating application control rules 5 ) About best practices for LiveUpdate policy settings 6) Best practices for Firewall policy settings 7) Shared Insight Cache - Best Practices and Sizing guide 8) Best Practices: Configuring a Symantec Endpoint Protection environment in a DMZ 9) Best practices when deploying Symantec Endpoint Protection client package over saturated 64k WAN links. 5

6 Overview of Migration Create a migration plan Before you begin to install the Symantec Endpoint client, manager, and any administration upgrades, you should have a solid understanding of your network topology and a streamlined plan to maximize the protection of the resources on your network during the upgrade. Symantec strongly recommends that you migrate the entire network to the current version rather than managing multiple versions of Symantec Endpoint Protection. Backup up the database Before you upgrade, you should back up the database. Disable replication If your site uses replication, you must disable replication before upgrading Symantec Endpoint Protection Manager. You must disable replication at each site that replicates. Enable local authentication If Symantec Network Access Control is in use, then enable Local Authentication prior to migration. Disable "Protect client files and registry keys" Application Control Policy If the setting "Protect client files and registry keys" is used, disable it in the Application Control policy prior to the migration. WARNING: If this setting is not disabled, you may face issues at a later stage when migrating your clients. Stop the Symantec Endpoint Protection Manager service Before you upgrade, you must manually stop the Symantec Endpoint Protection Manager service on every management server in your site. After you upgrade, the service is started automatically. Upgrade the Symantec Endpoint Protection Manager You do not need to uninstall management servers before you install the new version. The over install process saves legacy settings, and then upgrades to the latest version. Enabling replication after migration After you migrate all servers that used replication, including the servers that were configured for failover and load balancing, you must reenable replication. After migration, you add a replication partner to enable replication. You only need to add replication partners on the computer on which you first installed the management server. Replication partners automatically appear on the other management servers. Upgrade the Symantec Endpoint Protection Clients You do not need to uninstall previous clients before you install the new version. The over install process saves legacy settings, and then upgrades to the latest version. 6

7 Architecture for Labs SEPM1 SQL SEPM2 Site 1 W7-C1 Replication Site 2 SEPM3 Embedded 7

8 Lab Guide Overview EXERCISE 1: BACKUP SITE DATABASE (OPTIONAL) EXERCISE 2: DISABLE REPLICATION EXERCISE 3: STOP THE SYMANTEC ENDPOINT PROTECTION MANAGER SERVICES EXERCISE 4: UPGRADE 1ST SEP MANAGER (SITE 1) EXERCISE 5: UPGRADE 2ND SEP MANAGER (SITE 1) EXERCISE 6 & 7: UPGRADE 3RD SEP MANAGER (SITE 2) EXERCISE 8 & 9: RE-ESTABLISH REPLICATION EXERCISE 10: DEPLOYING SEP 12.1 CLIENTS (OPTIONAL) 8

9 Additional Information 9

10 Thank you! Copyright 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. L06: Migrating to SEP

UP L13: Leveraging the full protection of SEP 12.1.x

UP L13: Leveraging the full protection of SEP 12.1.x UP L13: Leveraging the full protection of SEP 12.1.x Martial RICHARD Principal Field Enablement Manager Endpoint Security UP L13 1 Threat landscape (ISTR Vol.18 April 2013) http://www.symantec.com/threatreport/

More information

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This

More information

Symantec Endpoint Protection Analyzer Report

Symantec Endpoint Protection Analyzer Report Symantec Endpoint Protection Analyzer Report For Symantec Customer Table of Contents Statement of Confidentiality... 3 1. Introduction... 4 2. Environmental Analysis Overview... 5 2.1 Findings Overview...

More information

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd Symantec Endpoint Protection Product Roadmap 1 Safe Harbor Disclaimer Any information regarding pre-release Symantec offerings,

More information

How To Set Up A Shared Insight Cache Server On A Pc Or Macbook With A Virtual Environment On A Virtual Computer (For A Virtual) (For Pc Or Ipa) ( For Macbook) (Or Macbook). (For Macbook

How To Set Up A Shared Insight Cache Server On A Pc Or Macbook With A Virtual Environment On A Virtual Computer (For A Virtual) (For Pc Or Ipa) ( For Macbook) (Or Macbook). (For Macbook SEP 12.1 Best Practices in a Virtual Environment The document is intended to capture the complete set of best practices for installation and configuration of SEP in a virtual environment. 1 Table of Contents

More information

ISL04 : Troubleshooting SEP 12.1 Marcus Brownell (RPM) & Martial Richard (TFE)

ISL04 : Troubleshooting SEP 12.1 Marcus Brownell (RPM) & Martial Richard (TFE) ISL04 : Troubleshooting SEP 12.1 Marcus Brownell (RPM) & Martial Richard (TFE) ISL04 1 Symantec Endpoint Protection Investigator Curriculum 2 Methodology ISL04 WORLDWIDE TECHNICAL SYMPOSIUM 2012 3 From

More information

W H I T E P A P E R : T E C H N I C A L. Understanding and Configuring Symantec Endpoint Protection Group Update Providers

W H I T E P A P E R : T E C H N I C A L. Understanding and Configuring Symantec Endpoint Protection Group Update Providers W H I T E P A P E R : T E C H N I C A L Understanding and Configuring Symantec Endpoint Protection Group Update Providers Martial Richard, Technical Field Enablement Manager Table of Contents Content Introduction...

More information

Symantec Endpoint Protection 12.1.6

Symantec Endpoint Protection 12.1.6 Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly

More information

Direct virtual machine creation from backup with BMR

Direct virtual machine creation from backup with BMR NETBACKUP 7.6 FEATURE BRIEFING DIRECT VIRTUAL MACHINE CREATION FROM BACKUP WITH BMR NetBackup 7.6 Feature Briefing Direct virtual machine creation from backup with BMR Version number: 1.0 Issue date: 5

More information

Symantec Endpoint Security Management Solutions Presentation and Demo for:

Symantec Endpoint Security Management Solutions Presentation and Demo for: Symantec Endpoint Security Management Solutions Presentation and Demo for: University System of Georgia Board of Regents Information Technology Services Executive Summary Business Requirements To migrate

More information

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR RUNNING SEP ON.... AZURE.................................... Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform Who should

More information

Securing the endpoint and your data

Securing the endpoint and your data #SymVisionEmea #SymVisionEmea Securing the endpoint and your data Piero DePaoli Sr. Director, Product Marketing Marcus Brownell Sr. Regional Product Manager Securing the Endpoint and Your Data 2 Safe harbor

More information

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and

More information

Symantec Endpoint Protection 12.1 Symantec Protection Center 2.0

Symantec Endpoint Protection 12.1 Symantec Protection Center 2.0 Symantec Endpoint Protection 12.1 Symantec Protection Center 2.0 Let me phone a friend Jimmy Sandberg Presale Engineer What s new in Symantec Endpoint Protection 12.1 Unrivaled Security Blazing Performance

More information

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management Managing Remote and Mobile Workers 1 Today s Workforce 79% employees favor

More information

Symantec Desktop and Laptop Option 7.6

Symantec Desktop and Laptop Option 7.6 Automated protection for desktops and laptops Data Sheet: Backup and Disaster Recovery Overview With the majority of business-critical information residing outside the data centers or on off corporate

More information

Q A F 0 3. ger A n A m client dell dell client manager 3.0 FAQ

Q A F 0 3. ger A n A m client dell dell client manager 3.0 FAQ DELL CLIENT MANAGER 3.0 FAQ dell client manager 3.0 FAQ Do i need to license dell client manager standard edition? 2 What are the system requirements and prerequisites for installation? 2 When installing

More information

End to End Security do Endpoint ao Datacenter

End to End Security do Endpoint ao Datacenter do Endpoint ao Datacenter Piero DePaoli & Leandro Vicente Security Product Marketing & Systems Engineering 1 Agenda 1 Today s Threat Landscape 2 From Endpoint: Symantec Endpoint Protection 3 To Datacenter:

More information

Advanced IT Pro Course for Office SharePoint Server 2007 and SharePoint Services 3.0

Advanced IT Pro Course for Office SharePoint Server 2007 and SharePoint Services 3.0 Advanced IT Pro Course for Office SharePoint Server 2007 and SharePoint Services 3.0 50047: Advanced IT Pro Course for Microsoft Office SharePoint Server 2007 and Windows SharePoint Services 3.0 (5 Days)

More information

Symantec Endpoint Protection (SEP) 11.0 Configuring the SEP Client for Self-Protection

Symantec Endpoint Protection (SEP) 11.0 Configuring the SEP Client for Self-Protection SYMANTEC TECHNOLOGY NETWORK: SECURITY Symantec Endpoint Protection (SEP) 11.0 Configuring the SEP Client for Self-Protection Purpose of this Whitepaper:... 3 Overview... 4 The SEP Client Interface... 5

More information

Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide

Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide Symantec Endpoint Protection Small Business Edition Installation and Administration Guide The software described

More information

Reducing Risk Through Effective Certificate Management

Reducing Risk Through Effective Certificate Management Reducing Risk Through Effective Certificate Management Dave Corbett Technical Product Manager 1 Enterprise Challenges for SSL Management Certificate Expiry & Misconfiguration Certificates Not Secure/Compliant

More information

Enterprise Vault 11 Feature Briefing

Enterprise Vault 11 Feature Briefing Enterprise Vault 11 Feature Briefing Enterprise Vault SCOM Enhancements This document is about the new Enterprise Vault SCOM enhancements introduced in Enterprise Vault 11. If you have any feedback or

More information

Symantec Endpoint Protection 12.1.2

Symantec Endpoint Protection 12.1.2 Data Sheet: Endpoint Security Overview offers comprehensive defense against complex attacks for both physical and virtual environments. It integrates ten essential security technologies in a single, high

More information

Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide

Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide Symantec Endpoint Protection Small Business Edition Getting Started Guide The software described in this book is furnished

More information

Symantec Endpoint Encryption Deployment Best Practices and Roadmap

Symantec Endpoint Encryption Deployment Best Practices and Roadmap Symantec Endpoint Encryption Deployment Best Practices and Roadmap Jon Allen Baylor University Chief Information Security Officer & Assistant Vice President Rene Kolga Symantec Principle Product Manager

More information

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government

More information

Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes

Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes The software described in this book is furnished

More information

Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines. Regional Product Management Team Endpoint Security

Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines. Regional Product Management Team Endpoint Security Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines Regional Product Management Team Endpoint Security Agenda 1 2 SEPM Architecture and Settings Recommended Client Protection Technologies

More information

Symantec Endpoint Protection 12.1.4

Symantec Endpoint Protection 12.1.4 Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec

More information

Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control

Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in

More information

Getting Started with Symantec Endpoint Protection

Getting Started with Symantec Endpoint Protection Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only

More information

Dell Spotlight on Active Directory 6.8.4. Deployment Guide

Dell Spotlight on Active Directory 6.8.4. Deployment Guide Dell Spotlight on Active Directory 6.8.4 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Symantec Endpoint Protection Shared Insight Cache User Guide

Symantec Endpoint Protection Shared Insight Cache User Guide Symantec Endpoint Protection Shared Insight Cache User Guide Symantec Endpoint Protection Shared Insight Cache User Guide The software described in this book is furnished under a license agreement and

More information

Symantec Backup Exec 2014

Symantec Backup Exec 2014 Symantec Backup Exec 2014 Maxim Tsvetaev Principal Systems Engineer Backup Exec 2014 1 Today s Top Backup and Recovery Challenges Reducing Costs and Complexity Protecting Virtual Machines Meeting Backup

More information

Symantec Endpoint Protection 11.0 Securing Virtual Environments Best Practices White Paper. Updated 7/20/2010

Symantec Endpoint Protection 11.0 Securing Virtual Environments Best Practices White Paper. Updated 7/20/2010 W H I T E P A P E R : T E C H N I C A L S E C U R I T Y S O L U T I O N S Symantec Endpoint Protection 11.0 Securing Virtual Environments Best Practices White Paper Updated 7/20/2010 White Paper: Symantec

More information

Designing a Microsoft SharePoint 2010 Infrastructure

Designing a Microsoft SharePoint 2010 Infrastructure Designing a Microsoft SharePoint 2010 Infrastructure Course Details Course Code: Duration: Notes: 10231B 5 days This course syllabus should be used to determine whether the course is appropriate for the

More information

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group 2 WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.3 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The

More information

Course 2788A: Designing High Availability Database Solutions Using Microsoft SQL Server 2005

Course 2788A: Designing High Availability Database Solutions Using Microsoft SQL Server 2005 Course Syllabus Course 2788A: Designing High Availability Database Solutions Using Microsoft SQL Server 2005 About this Course Elements of this syllabus are subject to change. This three-day instructor-led

More information

Lumension Endpoint Management and Security Suite Patch and Remediation 7.0 Service Pack 1 Migration Guide

Lumension Endpoint Management and Security Suite Patch and Remediation 7.0 Service Pack 1 Migration Guide Lumension Endpoint Management and Security Suite Patch and Remediation 7.0 Service Pack 1 Migration Guide Planning your migration with Service Pack 1 This document provides guidance for customers who plan

More information

Automated Patch Management Service

Automated Patch Management Service Service Data Sheet Automated Patch Management Service Establishes elements for successful and proactive Automated Patch Management strategy for anti-virus signature screens, OS security patching and DeltaV

More information

Building Private Cloud Architectures

Building Private Cloud Architectures Building Private Cloud Architectures Chandra Rangan Sr. Director, Storage & Availability Management Group Symantec Corporation SNW Spring 2011: Building Private Cloud Architectures 1 State of the infrastructure

More information

#ITtrends #ITTRENDS SYMANTEC VISION 2012 1

#ITtrends #ITTRENDS SYMANTEC VISION 2012 1 #ITtrends 1 Strategies for Security and Management in a Mobile and Virtual World Anil Chakravarthy Senior Vice President, Enterprise Security Group 2 MASSIVE INCREASE IN SOPHISTICATED ATTACKS 403 million

More information

Symantec Endpoint Protection Integration Component 7.5 Release Notes

Symantec Endpoint Protection Integration Component 7.5 Release Notes Symantec Endpoint Protection Integration Component 7.5 Release Notes Symantec Endpoint Protection Integration Component 7.5 Release Notes Legal Notice Copyright 2013 Symantec Corporation. All rights reserved.

More information

Symantec Endpoint Protection 12.1.5 Sizing and Scalability Best Practices White Paper

Symantec Endpoint Protection 12.1.5 Sizing and Scalability Best Practices White Paper Symantec Endpoint Protection 12.1.5 Sizing and Scalability Best Practices White Paper Symantec Endpoint Protection Sizing and Scalability Best Practices White Paper Product version: 12.1.5 Documentation

More information

Symantec Endpoint Protection 12.1.5 Datasheet

Symantec Endpoint Protection 12.1.5 Datasheet Symantec Endpoint Protection 12.1.5 Datasheet Data Sheet: Endpoint Security Overview Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that

More information

Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0

Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0 Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0 Release 3.1.0 for Symantec ESM 6.5.x and 9.0.1 Symantec Enterprise Security Manager Modules for Sybase

More information

Veritas Cluster Server Getting Started Guide

Veritas Cluster Server Getting Started Guide Veritas Cluster Server Getting Started Guide Windows Server 2003, Windows Server 2008 5.1 Service Pack 2 21101490 Veritas Cluster Server Getting Started Guide The software described in this book is furnished

More information

Symantec Client Firewall Policy Migration Guide

Symantec Client Firewall Policy Migration Guide Symantec Client Firewall Policy Migration Guide Symantec Client Firewall Policy Migration Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Top Ten Reasons for Deploying Oracle Virtual Networking in Your Data Center

Top Ten Reasons for Deploying Oracle Virtual Networking in Your Data Center Top Ten Reasons for Deploying Oracle Virtual Networking in Your Data Center Expect enhancements in performance, simplicity, and agility when deploying Oracle Virtual Networking in the data center. ORACLE

More information

SP-2002-10231 - Designing a Microsoft SharePoint 2010 Infrastructure

SP-2002-10231 - Designing a Microsoft SharePoint 2010 Infrastructure SP-2002-10231 - Designing a Microsoft SharePoint 2010 Infrastructure Duration: 5 days Course Price: $2,975 Software Assurance Eligible Course Description Course Overview This 5 day ILT training course

More information

Symantec Critical System Protection Configuration Monitoring Edition Release Notes

Symantec Critical System Protection Configuration Monitoring Edition Release Notes Symantec Critical System Protection Configuration Monitoring Edition Release Notes Symantec Critical System Protection Configuration Monitoring Edition Release Notes The software described in this book

More information

Altiris Client Management Suite

Altiris Client Management Suite Altiris Client Management Suite Agenda 1 What DO YOU Need Help With 2 What does Altiris have to Assist 3 What s New with CMS 7 4 Beyond Client Management Altiris Client Management Suite Leads the Way Symantec

More information

Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices

Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR PROTECTING RETAIL....... POS.... SYSTEMS............................. Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices Who

More information

Symantec Enterprise Vault Technical Note. Administering the Monitoring database. Windows

Symantec Enterprise Vault Technical Note. Administering the Monitoring database. Windows Symantec Enterprise Vault Technical Note Administering the Monitoring database Windows December 2006 Symantec Enterprise Vault Administering the Monitoring database Copyright 2006 Symantec Corporation.

More information

Tips and Best Practices for Managing a Private Cloud

Tips and Best Practices for Managing a Private Cloud Deploying and Managing Private Clouds The Essentials Series Tips and Best Practices for Managing a Private Cloud sponsored by Tip s and Best Practices for Managing a Private Cloud... 1 Es tablishing Policies

More information

Confidence in a Connected World. MEEC Symantec Product Availability. John Lally MD Education Account Executive 204-401-7342 John_Lally@symantec.

Confidence in a Connected World. MEEC Symantec Product Availability. John Lally MD Education Account Executive 204-401-7342 John_Lally@symantec. Confidence in a Connected World MEEC Symantec Product Availability John Lally MD Education Account Executive 204-401-7342 John_Lally@symantec.com 1 Agenda New threats means advanced security tactics SEP

More information

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector for Microsoft Windows Quick Reference The software described in this book is furnished under a license agreement

More information

Symantec LiveUpdate Administrator. Getting Started Guide

Symantec LiveUpdate Administrator. Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

More enhanced features.

More enhanced features. More enhanced features. Saves time and lowers cost. Upgrade today for complete data and system protection across your virtual and physical server environments. Symantec Backup Exec 12.5 NEW agents for

More information

BlackBerry Enterprise Server Version: 5.0. Upgrade Planning Guide

BlackBerry Enterprise Server Version: 5.0. Upgrade Planning Guide BlackBerry Enterprise Server Version: 5.0 Upgrade Planning Guide SWDT577232-577232-0327090551-001 Contents 1 Overview: BlackBerry Enterprise Server... 3 2 Upgrading a BlackBerry Enterprise Server environment...

More information

Instant Recovery for VMware

Instant Recovery for VMware NETBACKUP 7.6 FEATURE BRIEFING INSTANT RECOVERY FOR VMWARE NetBackup 7.6 Feature Briefing Instant Recovery for VMware Version number: 1.0 Issue date: 2 nd August 2013 This document describes a feature

More information

Symantec Critical System Protection Agent Event Viewer Guide

Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Symantec Critical System Protection Agent Event Viewer Guide

Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide The software described in this book is furnished under a license agreement and

More information

Storage management and business continuity strategy and futures

Storage management and business continuity strategy and futures #SymVisionEmea #SymVisionEmea Storage management and business continuity strategy and futures Petter Sveum Information Availability Solution Lead EMEA Ian Wood Information Management Strategy & GTM Storage

More information

IBM Tivoli Storage Manager for Virtual Environments

IBM Tivoli Storage Manager for Virtual Environments IBM Storage Manager for Virtual Environments Non-disruptive backup and instant recovery: Simplified and streamlined Highlights Simplify management of the backup and restore process for virtual machines

More information

PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes

PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of PGP

More information

Data deduplication is more than just a BUZZ word

Data deduplication is more than just a BUZZ word Data deduplication is more than just a BUZZ word Per Larsen Principal Systems Engineer Mr. Hansen DATA BUDGET RECOVERY & DATACENTER GROWTH PRESSURE DISCOVERY REVOLUTION More Storage Longer Backups Smaller

More information

Administration of Symantec Endpoint Protection

Administration of Symantec Endpoint Protection Administration of Symantec Endpoint Protection Secrets To Acing The Exam and Successful Finding And Landing Your Next Administration of Symantec Endpoint Protection Certified Job 1 2 Write a review to

More information

Symantec Virtual Machine Management 7.1 User Guide

Symantec Virtual Machine Management 7.1 User Guide Symantec Virtual Machine Management 7.1 User Guide Symantec Virtual Machine Management 7.1 User Guide The software described in this book is furnished under a license agreement and may be used only in

More information

Demystifying Virtualization for Small Businesses Executive Brief

Demystifying Virtualization for Small Businesses Executive Brief Demystifying Virtualization for Small Businesses White Paper: Demystifying Virtualization for Small Businesses Demystifying Virtualization for Small Businesses Contents Introduction............................................................................................

More information

Course Syllabus. Implementing and Managing Windows Server 2008 Hyper-V. Key Data. Audience. At Course Completion. Prerequisites

Course Syllabus. Implementing and Managing Windows Server 2008 Hyper-V. Key Data. Audience. At Course Completion. Prerequisites Course Syllabus Implementing and Managing Windows Server 2008 Hyper-V Key Data Product #: 3961 Elements of this syllabus are subject to change. This three-day instructor-led course teaches students how

More information

Symantec NetBackup Desktop and Laptop Option README. Release 6.1 MP7

Symantec NetBackup Desktop and Laptop Option README. Release 6.1 MP7 TM Symantec NetBackup Desktop and Laptop Option README Release 6.1 MP7 2 The software described in this document is furnished under a license agreement and may be used only in accordance with the terms

More information

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data Patrick Gardner VP Engineering Sourabh Satish Distinguished Engineer Symantec Vision 2014 - Big Data

More information

Redefining Endpoint Security: Symantec Endpoint Protection Russ Jensen

Redefining Endpoint Security: Symantec Endpoint Protection Russ Jensen Redefining Endpoint Security: Symantec Endpoint Protection Russ Jensen Sr. Presales Engineer, CISSP, MCSE Key Ingredients for Endpoint Protection Antivirus World s leading AV solution Most (44) consecutive

More information

Simplify Your Windows Server Migration

Simplify Your Windows Server Migration SOLUTION BRIEF: ENDPOINT MANAGEMENT........................................ Simplify Your Windows Server Migration Who should read this paper Windows Server 2003 customers looking to migrate to the latest

More information

Symantec Endpoint Protection 12.1.6 MP1a and 12.1.6 MP1 Release Notes

Symantec Endpoint Protection 12.1.6 MP1a and 12.1.6 MP1 Release Notes Symantec Endpoint Protection 12.1.6 MP1a and 12.1.6 MP1 Release Notes Symantec Endpoint Protection Release Notes Product version: 12.1.6 MP1a / 12.1.6 MP1 Documentation version: 1 This document was last

More information

Release Notes for Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control

Release Notes for Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control Release Notes for Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control Version 12.1, Release Update 1 Symantec Endpoint Protection, Symantec

More information

Symantec Enterprise Security Manager Patch Policy Release Notes

Symantec Enterprise Security Manager Patch Policy Release Notes Symantec Enterprise Security Manager Patch Policy Release Notes Symantec Enterprise Security Manager Patch Policy Release Notes The software described in this book is furnished under a license agreement

More information

Advanced Solutions of Microsoft SharePoint Server 2013 (20332) H6C76S

Advanced Solutions of Microsoft SharePoint Server 2013 (20332) H6C76S HP Education Services course data sheet Advanced Solutions of Microsoft SharePoint Server 2013 (20332) H6C76S Course Description In this class, you will learn how to design, configure, and manage a SharePoint

More information

INFORMATION PROTECTED

INFORMATION PROTECTED INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never

More information

Bring the cloud to your datacenter

Bring the cloud to your datacenter Bring the cloud to your Tension drives change Christian Moser Senior PMM, & Enterprise Business Group Western Europe The today is an architecture Traditional Tight coupling between infrastructure and apps

More information

Server Consolidation with SQL Server 2008

Server Consolidation with SQL Server 2008 Server Consolidation with SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 supports multiple options for server consolidation, providing organizations

More information

Symantec NetBackup OpenStorage Solutions Guide for Disk

Symantec NetBackup OpenStorage Solutions Guide for Disk Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a

More information

Solution Brief: Enterprise Security

Solution Brief: Enterprise Security Symantec Brightmail Gateway and VMware Solution Brief: Enterprise Security Symantec Brightmail Gateway and VMware Contents Corporate overview......................................................................................

More information

Quantum Q-Cloud Backup-as-a-Service Reference Architecture

Quantum Q-Cloud Backup-as-a-Service Reference Architecture Quantum Q-Cloud Backup-as-a-Service Reference Architecture NOTICE This Technology Brief may contain proprietary information protected by copyright. Information in this Technology Brief is subject to change

More information

Risk and threats everywhere, all the time

Risk and threats everywhere, all the time Risk and threats everywhere, all the time Hackers Cloud Remote Offices/ Workers Authentication & Encryption Mobile Devices Virtualization Malicious & Well-meaning Users Cyber Threats Social Media Compliance

More information

Symantec Endpoint Protection (SEP) Technical Consultancy Services

Symantec Endpoint Protection (SEP) Technical Consultancy Services Symantec Endpoint Protection (SEP) Technical Consultancy Services Computer Security Technology Ltd (CSTL) provides advanced consultancy and on-site technical services for the installation, deployment and

More information

SolarWinds Migrating SolarWinds NPM Technical Reference

SolarWinds Migrating SolarWinds NPM Technical Reference SolarWinds Migrating SolarWinds NPM Technical Reference Copyright 1995-2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified,

More information

Symantec Protection Center Enterprise 3.0. Release Notes

Symantec Protection Center Enterprise 3.0. Release Notes Symantec Protection Center Enterprise 3.0 Release Notes Symantec Protection Center Enterprise 3.0 Release Notes The software described in this book is furnished under a license agreement and may be used

More information

EMC Replication Manager and Kroll Ontrack PowerControls for Granular Recovery of SharePoint Items

EMC Replication Manager and Kroll Ontrack PowerControls for Granular Recovery of SharePoint Items EMC Replication Manager and Kroll Ontrack PowerControls for Granular Recovery of SharePoint Items Applied Technology Abstract This white paper discusses how Kroll Ontrack PowerControls integrates with

More information

ACI ON DEMAND DELIVERS PEACE OF MIND

ACI ON DEMAND DELIVERS PEACE OF MIND DELIVERS PEACE OF MIND SERVICE LINE FLYER ACI ON DEMAND ACCESS TO THE LATEST RELEASES OF FEATURE-RICH SOFTWARE AND SYSTEMS, INCLUDING INTEGRATION WITH VALUE- ADDED THIRD PARTIES IMPLEMENTATION CONFIGURED

More information

Deploying Exchange Server 2007 SP1 on Windows Server 2008

Deploying Exchange Server 2007 SP1 on Windows Server 2008 Deploying Exchange Server 2007 SP1 on Windows Server 2008 Product Group - Enterprise Dell White Paper By Ananda Sankaran Andrew Bachler April 2008 Contents Introduction... 3 Deployment Considerations...

More information

GIVE YOUR ORACLE DBAs THE BACKUPS THEY REALLY WANT

GIVE YOUR ORACLE DBAs THE BACKUPS THEY REALLY WANT Why Data Domain Series GIVE YOUR ORACLE DBAs THE BACKUPS THEY REALLY WANT Why you should take the time to read this paper Speed up backups (Up to 58.7 TB/hr, Data Domain systems are about 1.5 times faster

More information

Improve Backup Performance by Upgrading to Symantec Backup Exec 12.5 with Service Pack 2

Improve Backup Performance by Upgrading to Symantec Backup Exec 12.5 with Service Pack 2 Improve Backup Performance by Upgrading to Symantec Backup Exec 12.5 with Service Pack 2 Test Report to Show How Existing Backup Exec Customers Can Improve Backup Performance and Reduce Backup Windows

More information

California ISO Secure File Transfer Service (SFTS) Technical Specification

California ISO Secure File Transfer Service (SFTS) Technical Specification California ISO Secure File Transfer Service (SFTS) Technical Specification Version: 2.0 May 20, 2007 Copyright 2007 CALIFORNIA INDEPENDENT SYSTEM OPERATOR. All rights reserved. This document contains proprietary

More information

IC L10: Seamless Encryption of Data Sync'ing to Dropbox Using Symantec File Share Encryption

IC L10: Seamless Encryption of Data Sync'ing to Dropbox Using Symantec File Share Encryption IC L10: Seamless Encryption of Data Sync'ing to Dropbox Using Symantec File Share Encryption Jeremy Tully, Douglas Rivers, Matt Dawdy Technical Field Enablement 1 Is your Enterprise Data secure in the

More information

Course 20465C: Designing a Data Solution with Microsoft SQL Server

Course 20465C: Designing a Data Solution with Microsoft SQL Server Course 20465C: Designing a Data Solution with Microsoft SQL Server Module 1: Introduction to Enterprise Data Architecture As organizations grow to enterprise scale, their IT infrastructure requirements

More information

ITIL and Altiris ServiceDesk. Joseph Carson, Sr. Product Manager October 21, 2009

ITIL and Altiris ServiceDesk. Joseph Carson, Sr. Product Manager October 21, 2009 ITIL and Altiris ServiceDesk Joseph Carson, Sr. Product Manager October 21, 2009 Agenda Altiris Portfolio Overview IT Lifecycle Management Service Framework Establish the Face of IT to the Business Automate

More information

Find the needle in the security haystack

Find the needle in the security haystack Find the needle in the security haystack Gunnar Kristian Kopperud Principal Presales Consultant Security & Endpoint Management Technology Day Oslo 1 Find the needle in the security haystack Manually deep

More information