Endpoint Security Solutions Comparative Analysis Report

Size: px
Start display at page:

Download "Endpoint Security Solutions Comparative Analysis Report"

Transcription

1 Endpoint Security Solutions Comparative Analysis Report (Physical Environment) Vendors Tested Trend Micro McAfee Symantec Sophos Microsoft To: Trend Micro Indusface Contact Kandarp Shah Vice President Indusface A/2-3, 3rd Floor, Status Plaza, Atladara Old Padra Road, Akshar Chowk, Vadodara Tel Fax kandarp.shah@indusface.com

2 Confidentiality INDUSFACE HAS PREPARED THIS DOCUMENT FOR TREND MICRO. NEITHER THIS DOCUMENT NOR ITS CONTENT MAY BE COPIED OR DISTRIBUTED OUTSIDE TREND MICRO, WITHOUT PRIOR WRITTEN APPROVAL FROM INDUSFACE THE CONTENTS OF THIS DOCUMENT ARE PROVIDED TO TREND MICRO, IN CONFIDENCE SOLELY FOR THE PURPOSE OF EVALUATING WHETHER THE CONTRACT SHOULD BE AWARDED TO INDUSFACE. Revision History Date Version Description Author 02/04/ Comparative Analysis on Endpoint Security Harsh Jadia Solutions (Physical Environment) Document Control Activities Responsibility Verified / Cleared Technical Approval Harsh Jadia Verified Final Approval Kandarp Shah Cleared Notice of Ownership THIS DOCUMENT IS THE EXCLUSIVE PROPERTY OF INDUSFACE ALL RIGHTS RESERVED 2 Confidential Copyright 2013 Indusface All Rights Reserved

3 Table of Contents Introduction of Products & Versions... 4 Project Scope... 4 Approach and Methodology... 5 Approach... 5 Test Cases & Execution... 5 Automated Script... 6 Architecture... 7 Lab Details... 7 Lab System - Endpoint Configuration... 8 Executive Summary Overall Ranking Test Results Test Case 1: Baseline Endpoint Client Installation Test Case 2: Signature Update Test Case 3: On Demand Full Scan (Heavy) Test Case 4: Scheduled Full Scan Test Case 5: On Access Scan Test Results Based On Criteria CPU Utilization Observations Memory Utilization Observations Network Utilization Observations Disk Utilization Observations Time Taken Observations Appendix 1 Introduction & Key Features Trend Micro OfficeScan (OSCE) 10.6 SP Sophos Endpoint McAfee VirusScan Enterprise 8.8 (Patch 2) Symantec Endpoint Microsoft System Center 2012 Endpoint Features Comparison Disclaimer Disclaimer of Liability Confidential Copyright 2013 Indusface All Rights Reserved

4 Introduction of Products & Versions Objective performance testing was conducted on the following publicly available enterprise endpoint protection solutions using Windows 7 Professional Edition as the client system. PRODUCTS Trend Micro OfficeScan (OSCE) VERSION 10.6 SP2 McAfee VirusScan Enterprise 8.8 Patch 2 Symantec Endpoint (SEP) Sophos Endpoint 10 Microsoft System Center Endpoint 2012 Refer to Appendix 1 for a brief introduction on the tested endpoint protection products and the key features of each. Project Scope The tests compared the metrics of the system components performance for the following endpoint protection solutions: Trend Micro OfficeScan (OSCE) 10.6 SP2 Sophos Endpoint 10 McAfee VirusScan 8.8 (Patch 2) Symantec Endpoint (SEP) Microsoft System Center 2012 Endpoint 4 Confidential Copyright 2013 Indusface All Rights Reserved

5 Approach and Methodology Approach In order to achieve performance analyses on the endpoint protection solutions, Indusface followed a defined benchmark approach. The approach and methodology for the complete cycle, which consists of four phases, is described in the figure below. ARCHITECTURE: -Server and client setup -Required software setup REPORTING: -Gather and correlate the test results -Provide report analysis EXECUTION: -Execute the test case scripts -Monitor and record the resource utilization using tools -Check the security effectiveness TEST CASES: -Create test cases -Configure test cases Figure 1: Indusface Approach and Methodology Test Cases & Execution The comparative analysis was performed using the following test cases: 1) Baseline Endpoint Client Installation 2) Signature Update 3) Scheduled Full Scan 4) On Demand Full Scan (Heavy) 5) On Access Scans The analyses for each test case were based on CPU and memory usage, and the disk and network resource utilization of the endpoint protection solution. All test cases were performed one time except for the On Access Scan. The On Access Scan test case was performed five times and the average results were evaluated. Xperf is the monitoring tool that was used to record the system resource utilization and the time. 5 Confidential Copyright 2013 Indusface All Rights Reserved

6 The total resource utilization by endpoint client machines for each endpoint protection solution was recorded and the average value used for the final result. Test cases evaluated the usage of the following resources: CPU Memory Network Disk (total hard disk utilized) This report uses the percentage of resources used to display the data derived from the analyses. The percentage values were calculated based on the maximum amount of available resources compared to the actual amount of resources utilized. Automated Script An automated script was created to simulate end user activity. The Windows script was created in Python and can execute the following applications and actions: Microsoft Word Open, minimize, maximize, close, insert text, save modifications Microsoft Outlook Open, minimize, maximize, close, write random words/numbers, save modifications Microsoft Excel Open, minimize, maximize, close, write random numbers, insert/delete columns/rows, copy/paste formulas, save modifications Microsoft PowerPoint Open, minimize, maximize, close, and conduct a slide show presentation Google Chrome Open, minimize, maximize, close, and browse web pages Windows Media Player Open, close, and view a video Mozilla Firefox- Open, minimize, maximize, close, and browse web pages 6 Confidential Copyright 2013 Indusface All Rights Reserved

7 Architecture Lab Details In order to estimate the performance impact on a computing endpoint, a unified test environment was created to simulate the working environment of an average corporate network. A script driven end user automation was then developed to simulate the daily activities of a typical corporate user. Our main aim was to create a baseline image with the fewest possible benchmarks and the least chance of variation caused by external operating system factors. The lab environment was comprised of an endpoint client and a server for each instance of the endpoint protection product. The evaluation process was based on a single end user environment at a given point of time. Baseline Image Creation (Endpoint client): Windows 7 Professional version was used as the client machine operating system for testing purposes. Norton Ghost was used to create a clean baseline image. The baseline image was restored before testing each endpoint protection solution. The steps taken to create the baseline image were as follows: 1) Installed Windows 7 Professional on the client machine. 2) Disabled Automatic Updates for Windows. 3) Disabled Windows Defender to avoid unexpected background activity. 4) Disabled the Windows Firewall to avoid interference with security software. 5) Changed User Account Control settings to Never Notify. 6) Installed Windows Performance Toolkit x86 for testing. 7) Installed Python 2.7 for automated test scripts. 8) Installed Norton Ghost for imaging purposes. 9) Created a baseline image using Norton Ghost. 7 Confidential Copyright 2013 Indusface All Rights Reserved

8 Figure 2: Test Lab Environment Lab System - Endpoint Configuration Operating System System Model Windows 7 Professional (build 7600) Installation Language: English (United States) System Locale: English (United States) Processor Enclosure Type: Desktop Main Circuit Board 3.30 Gigahertz Intel Core i Kilobyte primary memory cache 512 Kilobyte secondary memory cache 3072 Kilobyte tertiary memory cache 32-bit ready Multi-core (2 total) Hyper-threaded (4 total) Drives Board: Intel Corporation DH61WW AAG Serial Number: BTWW23400J7J Bus Clock: 25 Megahertz BIOS: Intel Corp. BEH6110H.86A /31/2012 Memory Modules Gigabyte of usable hard drive capacity Gigabyte of hard drive free Space 3496 Megabyte Usable Installed Memory Table 1: Lab System - Endpoint Client Configuration 8 Confidential Copyright 2013 Indusface All Rights Reserved

9 Operating System System Model Operating System Model Windows Server 2008 Enterprise Service Pack 2 (build 6002) Installation Language: English (United States) System Locale: English (United States) Processor Enclosure Type: VMwareESXi Main Circuit Board 2.40 Gigahertz Intel Xeon 512 Kilobyte primary memory cache 64-bit ready Not Hyper-threaded Drives Board: Intel Corporation 440BX Desktop Reference Platform BIOS: Phoenix Technologies LTD /21/2011 Memory Modules Gigabyte of usable hard drive capacity Gigabyte of hard drive free space 3496 Megabyte Usable Installed Memory Table 2: Lab System - Endpoint Server Configuration 9 Confidential Copyright 2013 Indusface All Rights Reserved

10 Executive Summary The project focuses solely on the comparison of endpoint protection client system components against performance metrics for the following products: Trend Micro OfficeScan (OSCE) 10.6 SP2 Sophos Endpoint 10 McAfee VirusScan 8.8 (Patch 2) Symantec Endpoint (SEP) Microsoft System Center 2012 Endpoint The testing demonstrated how each endpoint protection solution utilizes hardware resources in respect to the CPU, Disk, Memory and Network components and also the time taken for the client system to execute the tests under a comparative framework of evaluation. The methodologies used, as described later in this report, were not biased for any solution. From the analysis of the test results, it can be observed that Trend Micro OfficeScan 10.6 SP2 is optimized compared to the other publicly available endpoint protection products. McAfee VirusScan Enterprise 8.8 (Patch 2) scored second in optimization results in comparison to Trend Micro OfficeScan (OSCE) 10.6 SP2. Trend Micro OfficeScan (OSCE) 10.6 SP2 utilized the least amount of system resources while Microsoft System Center 2012 Endpoint utilized the greatest amount of system resources. McAfee VirusScan 8.8 (Patch 2) utilized the greatest amount of CPU resources in ideal conditions and also consumed comparatively more resources during a signature update. It utilized more CPU and Network resources during the On Access Scan. Trend Micro OfficeScan (OSCE) 10.6SP2 utilized the least amount of resources in ideal conditions. It consumed a very low amount of resources in the least amount of time during a signature update. Its Smart Server (which performs caching) made client system resources available during updates and scans. Symantec Endpoint used a considerable amount of resources in all the test cases. It utilized more CPU and Network resources during the On Access Scan in comparison to the other endpoint solutions. Sophos Endpoint 10 consumed comparatively more memory during all test cases. Microsoft System Center 2012 Endpoint consumed a greater amount of time performing all the test cases. It also utilized more CPU resources during both Scheduled Full Scan and the On Demand Full Scan (Heavy). 10 Confidential Copyright 2013 Indusface All Rights Reserved

11 Test Results The following table indicates the scores received by each product during the evaluation of the various test cases. *Mem=Memory Utilization, N/W = Network Utilization, Time = Time taken for execution of each test case, CPU= CPU Utilization. The ranking was determined based on the test results. A score of 1 to 5 was given for each value measured, where 1 indicates the best performance and 5 represents the poorest performance. The following formulas were used to determine the scores given to each of the endpoint solutions for each test case: Baseline - Endpoint Client installation: Average CPU (%) + Average Memory (%) + Average Network (%) + Time taken Signature Update: Average CPU (%) + Average Memory (%) + Average Network (%) + Time taken Scheduled Full Scan: Average CPU (%) + Average Memory (%) + Average Network (%) + Time taken On Demand Full Scan (Heavy): Average CPU (%) + Average Memory (%) + Average Network (%) + Time taken On Access Scan: Average CPU (%) + Average Memory (%) + Average Network (%) + Time taken 11 Confidential Copyright 2013 Indusface All Rights Reserved

12 Note: Product scores of 1 to 5 for particular test cases can be interpreted as follows: Score of 1: Indicates the product that utilized the least amount of resources on the client machine. Score of 5: Indicates the product that utilized more time/resources on the client machine compared to the other products. Products that scored the same overall percentage received the same ranking. For example, if the test results for Microsoft and McAfee both recorded a full scan time of 15 minutes, their rankings are the same and the next slowest product s ranking is one higher. Overall Ranking The following table demonstrates the overall product rankings after analyzing the successful execution of the various test cases. Products Ranking Score Trend Micro OfficeScan (OSCE) 10.6 SP2 1st 38 McAfee VirusScan Enterprise 8.8 (Patch 2) 2nd 54 Symantec Endpoint rd 60 Microsoft System Center 2012 Endpoint 3rd 60 Sophos Endpoint 10 4th Confidential Copyright 2013 Indusface All Rights Reserved

13 Test Results Test Case 1: Baseline Endpoint Client Installation Approach After the installation of the endpoint client on the baseline system, resource utilization was measured for five minutes without any user activity. The system s CPU, Memory, Network, and Disk utilization was recorded. Test Results CPU (%) Memory (%) Network (%) Disk (%) Trend Micro OfficeScan (OSCE) 10.6 SP McAfee VirusScan 8.8 (Patch 2) Symantec Endpoint Sophos Endpoint Microsoft System Center 2012 Endpoint Table 3: Baseline - Endpoint Client Installation Observations Based on the test results, Trend Micro OfficeScan (OSCE) 10.6 SP2 utilized the least amount of resources following the client installation compared to other endpoints clients. The lower amount of resource utilization (by Trend Micro OfficeScan (OSCE) 10.6 SP2) enables the user to have more resources available for productivity compared to the other endpoint solutions. Test Case 2: Signature Update Approach After the installation of the endpoint protection solution s server, scheduled update was turned off for three days. After three days, updates were collected by the server and were pushed from the server to the client. During the signature push from the server to the client, the system resource utilization was recorded. Test Results CPU (%) Memory (%) Network (%) Disk (%) Time Taken (mm:ss) Trend Micro OfficeScan (OSCE) 10.6 SP :20 McAfee VirusScan 8.8 (Patch 2) :50 Symantec Endpoint :30 Sophos Endpoint :25 Microsoft System Center 2012 Endpoint :15 Table 4: Signature Update 13 Confidential Copyright 2013 Indusface All Rights Reserved

14 Observation Based on the test results, Trend Micro OfficeScan (OSCE) 10.6 SP2 utilized the least amount of resources (8.8% of CPU and 0.025% of Network resources) during the execution of a signature update during the time allotted (20 seconds) for the test execution. All the other endpoint protection suites required more time and/or resources, which would have a negative impact on the client-side user performance. Test Case 3: On Demand Full Scan (Heavy) Approach An On Demand full scan was initiated on the endpoint client using an end user automation script that simulated a heavy workload of an end user s daily activities. The automation script was executed until the On Demand scan was completed. Resource utilization for the On Demand full scan was recorded in terms of CPU, Memory, and Network utilization of the endpoint client. Test Results CPU (%) Memory (%) Network (%) Disk (%) Time Taken (mm:ss) Trend Micro OfficeScan (OSCE) :35 McAfee VirusScan 8.8 (Patch 2) :10 Symantec Endpoint :25 Sophos Endpoint :00 Microsoft System Center 2012 Endpoint :15 Table 5: On Demand Full Scan (Heavy) Observation Based on the test results, Symantec Endpoint utilized the least amount of resources (9.92% of CPU resources) during the execution of the On Demand Full Scan (Heavy) test, but took almost twice the amount of time (11 minutes) compared to Trend Micro OfficeScan (OSCE) 10.6 SP2 (5 minutes and 35 seconds). The increased amount of CPU usage by Microsoft System Center 2012 Endpoint may degrade the overall performance of the system during the On Demand Full Scan. However, Trend Micro OfficeScan (OSCE) 10.6 SP2 completed the scan in the least amount of time by using more resources, which indicates that it provides more efficiency for the client systems. Test Case 4: Scheduled Full Scan Approach For this test case, a full scan was scheduled at a particular time (e.g. 11 PM on Monday). During the test, an ideal client system was implemented (i.e. no user activity was performed). The server initiated a scheduled scan on the endpoint client and the resource utilization of CPU, Memory, Network and Disk was recorded. 14 Confidential Copyright 2013 Indusface All Rights Reserved

15 Test Results Trend Micro OfficeScan (OSCE) 10.6 SP2 CPU (%) Memory (%) Network (%) Disk (%) Time Taken (mm:ss) :50 McAfee VirusScan 8.8 (Patch 2) :25 Symantec Endpoint :00 Sophos Endpoint :15 Microsoft System Center 2012 Endpoint :18 Table 6: Scheduled Full Scan Observation Based on the test results, Microsoft System Center 2012 Endpoint utilized the greatest amount of resources during the execution of the Scheduled Full Scan test case, and required the greatest amount of time. McAfee VirusScan 8.8 (Patch 2) completed the full scan in the least amount of time but utilized 15% of CPU resources, which is a better resource utilization result than Symantec Endpoint (11.6%). Test Case 5: On Access Scan Approach A group of different file types was copied to the endpoint client from a network file server. This group of files (3.47 GB) contained several types of file formats that a Windows user would encounter during daily use. These formats included documents (e.g. Microsoft Office documents, Adobe PDF, ZIP/RAR files), media formats (e.g. Images), system files (e.g. Executable, CAB, MSI, libraries) and miscellaneous files (e.g. ISO, APK, logs, SIG, PEM). The test was executed multiple times and the average of the results was calculated. Test Results CPU (%) Memory (%) Network (%) Disk (%) Time Taken (mm:ss) Trend Micro OfficeScan (OSCE) 10.6 SP :00 McAfee VirusScan 8.8 (Patch 2) :04 Symantec Endpoint :40 Sophos Endpoint :00 Microsoft System Center 2012 Endpoint :30 Table 7: On Access Scan Observation Based on the test results, the overall file transfer process took almost the same amount of time for Trend Micro OfficeScan (OSCE) 10.6 SP2 and McAfee VirusScan 8.8 (Patch 2). Trend Micro OfficeScan (OSCE) 10.6 SP2 utilized the least amount of resources (5.2% of CPU for six minutes) and Symantec Endpoint utilized the greatest amount of resources (45% of memory for seven minutes). 15 Confidential Copyright 2013 Indusface All Rights Reserved

16 Test Results Based On Criteria The following table displays the test results based on the different criteria for each respective endpoint client. These test results highlight the products performance according to the testing criteria. CPU Utilization Observations Baseline - Endpoint Client Installation Signature Update Scheduled Full Scan On Demand Full Scan (Heavy) On Access Scan Trend Micro OfficeScan (OSCE) 10.6 SP2 McAfee VirusScan 8.8 (Patch 2) Symantec Endpoint Sophos Endpoint 10 Microsoft System Center 2012 Endpoint Table 8: CPU Utilization Comparison CPU utilization was measured on: 3.30 Gigahertz Intel Core i Kilobyte primary memory cache 512 Kilobyte secondary memory cache 3072 Kilobyte tertiary memory cache 32-bit ready Multi-core (2 total) Hyper-threaded (4 total) 16 Confidential Copyright 2013 Indusface All Rights Reserved

17 CPU Utilization (%) Trend Micro OfficeScan (OSCE) 10.6 SP2 McAfee VirusScan 8.8 (Patch 2) 20 Symantec Endpoint Sophos Endpoint 10 Microsoft System Center 2012 Endpoint 0 Baseline - Endpoint Client Installation Signature Update Scheduled Full Scan On Demand Full Scan (Heavy) On Access Scan The CPU Utilization graph demonstrates: Trend Micro OfficeScan (OSCE) 10.6 SP2 utilized the lowest amount of CPU resources after the Baseline Endpoint Client Installed test and during the Signature Update. Symantec Endpoint utilized the lowest amount of CPU resources during the Scheduled Full Scan and On Demand Full Scan (heavy) tests. Symantec Endpoint , Trend Micro OfficeScan (OSCE) 10.6 SP2, and Microsoft System Center 2012 Endpoint utilized almost the same amount of CPU resources during the On Access Scan test. Memory Utilization Observations Trend Micro OfficeScan (OSCE) 10.6 SP2 McAfee VirusScan 8.8 (Patch 2) Symantec Endpoint Sophos Endpoint 10 Microsoft System Center 2012 Endpoint Baseline - Endpoint Client Installation Signature Update Scheduled Full Scan On Demand Full Scan (Heavy) On Access Scan Table 9: Memory Utilization Comparison 17 Confidential Copyright 2013 Indusface All Rights Reserved

18 Memory utilization was measured on: 3496 Megabytes of usable installed memory o Slot 'DIMM1' had 2048 MB o Slot 'DIMM3' had 2048 MB Memory Utilization (%) Trend Micro OfficeScan (OSCE) 10.6 SP2 McAfee VirusScan 8.8 (Patch 2) Symantec Endpoint Sophos Endpoint Microsoft System Center 2012 Endpoint 0 Baseline - Endpoint Client Installation Signature Update Scheduled Full Scan On Demand Full Scan (Heavy) On Access Scan The Memory Utilization graph demonstrates: Trend Micro OfficeScan (OSCE) 10.6 SP2 utilized the lowest amount of memory after the Baseline Endpoint Client Installation test. McAfee VirusScan Enterprise 8.8 (Patch 2) utilized the greatest amount of memory during the Signature Update. McAfee VirusScan 8.8 (Patch 2) and Microsoft System Center 2012 Endpoint utilized least amount of memory during the Scheduled Full Scan. McAfee VirusScan 8.8 (Patch 2) utilized the least amount of memory during the On Demand Full Scan (Heavy) and On Access Scan. 18 Confidential Copyright 2013 Indusface All Rights Reserved

19 Network Utilization Observations Trend Micro OfficeScan (OSCE) 10.6 SP2 McAfee VirusScan 8.8 (Patch 2) Symantec Endpoint Sophos Endpoint 10 Microsoft System Center 2012 Endpoint Baseline - Endpoint Client Installation Signature Update Scheduled Full Scan On Demand Full Scan (Heavy) On Access Scan Table 10: Network Utilization Comparison Network utilization was measured on: Broadcom NetLink (TM) Gigabit Ethernet (100 MBps) Note: The Network bandwidth of 100 MBps was tested. 12 Network Utilization (%) 10 8 Trend Micro OfficeScan (OSCE) 10.6 SP2 McAfee VirusScan 8.8 (Patch 2) Symantec Endpoint Sophos Endpoint 10 4 Microsoft System Center 2012 Endpoint 2 0 Baseline - Endpoint Client Installation Signature Update Scheduled Full Scan On Demand Full Scan (Heavy) On Access Scan 19 Confidential Copyright 2013 Indusface All Rights Reserved

20 The Network Utilization graph demonstrates: All the endpoint protection solutions utilized almost the same amount of Network resources for the Baseline - Endpoint Client Installation test case. Trend Micro OfficeScan (OSCE) 10.6 SP2 utilized the least amount of Network resources during the Signature Update test and also took less time to update due to its Smart Server (caching) option. All the Endpoint Solutions utilized almost the same amount of Network resources during the Scheduled Full Scan and On Demand Full Scan (Heavy) tests. Trend Micro OfficeScan (OSCE) 10.6 SP2 and Sophos Endpoint 10 utilized the least amount of Network resources during the On Access Scan. Disk Utilization Observations Trend Micro OfficeScan (OSCE) 10.6 SP2 McAfee VirusScan 8.8 (Patch 2) Symantec Endpoint Sophos Endpoint 10 Microsoft System Center 2012 Endpoint Baseline - Endpoint Client Installation Signature Update Scheduled Full Scan On Demand Full Scan (Heavy) On Access Scan Table 11: Disk Utilization Comparison Disk utilization was measured on: 244 Gigabytes of usable hard drive capacity 217 Gigabytes of hard drive free space 20 Confidential Copyright 2013 Indusface All Rights Reserved

21 0.014 Disk Utilization (%) Trend Micro OfficeScan (OSCE) 10.6 SP2 McAfee VirusScan 8.8 (Patch 2) Symantec Endpoint Sophos Endpoint 10 Microsoft System Center 2012 Endpoint 0 Baseline - Endpoint Client Installation Signature Update Scheduled Full Scan On Demand Full Scan (Heavy) On Access Scan The Disk utilization graph demonstrates: All the Endpoint solutions consumed almost the same amount of disk resources on the Baseline Endpoint Client Installation, during the Signature Update and On Access Scan tests. Microsoft System Center 2012 Endpoint utilized the greatest amount of disk space during all the test cases. Time Taken Observations Trend Micro OfficeScan (OSCE) 10.6 SP2 McAfee VirusScan 8.8 (Patch 2) Symantec Endpoint Sophos Endpoint 10 Microsoft System Center 2012 Endpoint Baseline - Endpoint Client Installation Signature Update Scheduled Full Scan On Demand Full Scan (Heavy) On Access Scan 5:00 0:20 5:50 5:35 6:00 5:00 3:50 3:25 7:10 6:04 5:00 1:30 13:00 10:25 6:40 5:00 3:25 8:15 11:00 7:00 5:00 6:15 14:18 15:15 6:30 Table 12: Time Utilization Comparison 21 Confidential Copyright 2013 Indusface All Rights Reserved

22 Time Taken (mm:ss) 16:48 14:24 Trend Micro OfficeScan (OSCE) 10.6 SP2 12:00 McAfee VirusScan 8.8 (Patch 2) 09:36 Symantec Endpoint :12 04:48 Sophos Endpoint 10 02:24 Microsoft System Center 2012 Endpoint 00:00 Baseline - Endpoint Client Installation Signature Update Scheduled Full Scan On Demand Full Scan (Heavy) On Access Scan The Time utilization graph demonstrates: Trend Micro OfficeScan (OSCE) 10.6 SP2 took the least amount of time for the Signature Update and On Demand Full Scan (Heavy) tests. McAfee VirusScan 8.8 (Patch 2) took the least amount of time for the On Demand Scheduled Full Scan test. Sophos Endpoint 10 took the greatest amount of time for the On Access Scan test case (7 minutes). 22 Confidential Copyright 2013 Indusface All Rights Reserved

23 Appendix 1 Introduction & Key Features Trend Micro OfficeScan (OSCE) 10.6 SP2 Trend Micro OfficeScan (OSCE) 10.6 SP2 joins endpoint and mobile security with a unified management infrastructure that offers global threat intelligence to stop malware in the cloud, and provides virtual patching against zero day threats, and optimized security for virtual desktops. Optional modules allow instant deployment of data loss prevention, mobile device management and Mac protection. Key Features as listed by Trend Micro are: Unique plug-in architecture Optimized for desktop Virtualization Security Superior malware protection Easy to manage Sophos Endpoint 10 Sophos Endpoint 10 protects tablet, phone, and laptop or desktop, everywhere. Mainly Endpoint security, mobile device management, web protection, data protection, network protection, protection and central management are integrated with it. It makes security easier whether it s enabling BYOD, day-today administration with streamlined management, or getting support when you need it. Key Features as listed by Sophos are: Gives you endpoint security and mobile device management, all in one Secures Windows, Mac, Linux, ios, Android, and more Provides integrated encryption (Allows users to store and share data securely) Makes web browsing safe with built-in URL filtering Simplifies management with workflows engineered for business Reduces complexity with a single license from a single vendor Threat-aware patch assessment Integrated Encryption: Integrated full disk encryption in Endpoint encryption 10 McAfee VirusScan Enterprise 8.8 (Patch 2) McAfee VirusScan Enterprise 8.8 (Patch 2) combines anti-virus, anti-spyware, firewall, and intrusion prevention technologies to stop and remove malicious software. It also extends coverage to new security risks and reduces the cost of responding to outbreaks with the industry s lowest impact on system performance. Key Features as listed by McAfee are: Block multiple threats Stop malware in real time Safeguard programs Low impact on performance Get high-performance security Lessen damage from outbreaks Defend against threats that target Microsoft applications 23 Confidential Copyright 2013 Indusface All Rights Reserved

24 Symantec Endpoint Symantec Endpoint is built on multiple layers of protection, including Symantec Insight and SONAR both of which provide protection against new and unknown threats. Built for virtual environments, it can integrate with VMware vshield Endpoint for dramatically improved performance. Symantec Endpoint includes the latest features for improved security, performance and management. Key Features as listed by Symantec are: Integration with VMware s vshield Tuned for Windows 8 and Windows Server 2012performance Support for Mac OSX 10.8 (Mountain Lion) Support for HTTPS in trusted web domain exceptions Enhanced security features Improved management Microsoft System Center 2012 Endpoint Microsoft System Center 2012 Endpoint (previously known as Forefront Endpoint 2012) protects client and server operating systems against the latest malware and exploits. Built on System Center 2012 Configuration Manager, it reduces IT management and operating costs by providing a single, integrated platform for managing and securing your desktops. Key Features as listed by MSSC are: Single console for endpoint management and security Central policy creation Enterprise scalability Highly accurate and efficient threat detection Behavioral threat detection Automated agent replacement Windows Firewall management 24 Confidential Copyright 2013 Indusface All Rights Reserved

25 Features Comparison This is a list of notable Endpoint product features in the form of a comparison table. Features Endpoint Security Microsoft System Center 2012 Endpoint Product Features Comparison McAfee VirusScan Enterprise 8.8(Patch 2) Symantec Endpoint (SEP) Sophos Endpoint 10 Trend Micro OfficeScan (OSCE) 10.6 SP2 Antivirus Endpoint Web Filtering X Application Control Device Control DLP Patch Web & Gateway X Encryption Mobile Backup & Recovery X X Behavioral threat detection X Central Management Console Supported Platform Windows Mac X Linux Built for Virtual Environment Advanced Firewall In the Cloud X IDS/IPS X Zero Day Attack Scanning Full Scan Smart/Active Scan X X Scheduled Scan On Demand Scan 25 Confidential Copyright 2013 Indusface All Rights Reserved

26 On Access Scan Point Desktops, Laptops, Servers Microsoft Exchange Server *All of the above information has been derived from the publicly available data. 26 Confidential Copyright 2013 Indusface All Rights Reserved

27 Disclaimer The product versions covered in the report are the latest available at the time of testing. The versions are specified under the Product Scope section of the report. The list of products tested is not exhaustive of all products available in the comparative business security market. Products used for the comparative testing were the evaluation versions available (free/trial/demo). Disclaimer of Liability Every effort has been made to ensure that the information presented in this report is accurate however, Indusface shall not be liable in any manner whatsoever for damages caused by the use of this information. 27 Confidential Copyright 2013 Indusface All Rights Reserved

Endpoint Security Solutions (Physical & VDI Environment) Comparative Testing Analysis

Endpoint Security Solutions (Physical & VDI Environment) Comparative Testing Analysis Endpoint Security Solutions (Physical & VDI Environment) Comparative Testing Analysis Vendors Tested: McAfee Sophos Symantec Trend Micro Executive Summary Indusface was commissioned by Trend Micro Inc.

More information

INFORMATION PROTECTED

INFORMATION PROTECTED INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

Symantec Endpoint Protection 12.1.2

Symantec Endpoint Protection 12.1.2 Data Sheet: Endpoint Security Overview offers comprehensive defense against complex attacks for both physical and virtual environments. It integrates ten essential security technologies in a single, high

More information

Symantec Protection Suite Small Business Edition

Symantec Protection Suite Small Business Edition Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business is an easyto-use, all-in-one suite that secures your critical business assets and information against today s complex

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

Virtual Desktops Security Test Report

Virtual Desktops Security Test Report Virtual Desktops Security Test Report A test commissioned by Kaspersky Lab and performed by AV-TEST GmbH Date of the report: May 19 th, 214 Executive Summary AV-TEST performed a comparative review (January

More information

Symantec Endpoint Protection 12.1.4

Symantec Endpoint Protection 12.1.4 Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec

More information

Trend Micro Endpoint Comparative Report Performed by AV Test.org

Trend Micro Endpoint Comparative Report Performed by AV Test.org Trend Micro Endpoint Comparative Report Performed by AV Test.org Results from December 2009 Executive Summary In December of 2009, AV Test.org performed endpoint security benchmark testing on five market

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

Symantec Protection Suite Small Business Edition

Symantec Protection Suite Small Business Edition Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business Edition is an easyto-use, all-in-one suite that secures your critical business assets and information against today

More information

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex

More information

Information Security Recommendation Report

Information Security Recommendation Report Information Security Recommendation Report Prepared for Baker and Company Prepared by Alma Ruiz May 3, 2013 Table of Contents ii Table of Contents Introduction... 1 Methods for Evaluation... 3 Results

More information

Consumer Internet Security Products Performance Benchmarks (Sept 2011)

Consumer Internet Security Products Performance Benchmarks (Sept 2011) Performance Benchmarks (Sept 2011) ESET vs. 9 Competitors Document: Consumer Internet Security Products Performance Benchmarks (Sept 2011) Authors: C. Richards, D. Wren Company: Date: Edition: Edition

More information

Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT

Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT TESTED PRODUCTS: AVG Internet Security Network Edition v8.0 Kaspersky Total Space Security v6.0 McAfee Total Protection for Endpoint Sophos

More information

Symantec Protection Suite Small Business Edition

Symantec Protection Suite Small Business Edition Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business Edition is an easy-to-use, all-in-one suite that secures your critical business assets and information against

More information

ORACLE VIRTUAL DESKTOP INFRASTRUCTURE

ORACLE VIRTUAL DESKTOP INFRASTRUCTURE ORACLE VIRTUAL DESKTOP INFRASTRUCTURE HIGHLY SECURE AND MOBILE ACCESS TO VIRTUALIZED DESKTOP ENVIRONMENTS KEY FEATURES Centralized virtual desktop management and hosting Facilitates access to VDI desktops

More information

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

Symantec Endpoint Security Management Solutions Presentation and Demo for:

Symantec Endpoint Security Management Solutions Presentation and Demo for: Symantec Endpoint Security Management Solutions Presentation and Demo for: University System of Georgia Board of Regents Information Technology Services Executive Summary Business Requirements To migrate

More information

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform) McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload

More information

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM

PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM EMPLOYEES WORK ON THE MOVE, WITH MULTIPLE DEVICES MEETING CUSTOMERS WORKING FROM HOME BUSINESS TRIP CLOUD SERVICES ARE ENABLERS OF MOBILE

More information

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure. McAfee Endpoint Protection for SMB You grow your business. We keep it secure. Big Protection for Small to Medium-Sized Businesses With the Internet and connected devices now an integral part of your business,

More information

Confidence in a Connected World. MEEC Symantec Product Availability. John Lally MD Education Account Executive 204-401-7342 John_Lally@symantec.

Confidence in a Connected World. MEEC Symantec Product Availability. John Lally MD Education Account Executive 204-401-7342 John_Lally@symantec. Confidence in a Connected World MEEC Symantec Product Availability John Lally MD Education Account Executive 204-401-7342 John_Lally@symantec.com 1 Agenda New threats means advanced security tactics SEP

More information

Devising a Server Protection Strategy with Trend Micro

Devising a Server Protection Strategy with Trend Micro Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud

More information

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This

More information

Symantec Endpoint Protection

Symantec Endpoint Protection The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,

More information

Devising a Server Protection Strategy with Trend Micro

Devising a Server Protection Strategy with Trend Micro Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper» Trend Micro s portfolio of solutions meets and exceeds Gartner s recommendations on how to devise a server protection strategy.

More information

How To Protect A Virtual Desktop From Attack

How To Protect A Virtual Desktop From Attack Endpoint Security: Become Aware of Virtual Desktop Infrastructures! An Ogren Group Special Report May 2011 Executive Summary Virtual desktops infrastructures, VDI, present IT with the unique opportunity

More information

Symantec Endpoint Protection 12.1.5 Datasheet

Symantec Endpoint Protection 12.1.5 Datasheet Symantec Endpoint Protection 12.1.5 Datasheet Data Sheet: Endpoint Security Overview Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that

More information

Determining Your Computer Resources

Determining Your Computer Resources Determining Your Computer Resources There are a number of computer components that must meet certain requirements in order for your computer to perform effectively. This document explains how to check

More information

Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide

Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide Symantec Endpoint Protection Small Business Edition Getting Started Guide The software described in this book is furnished

More information

Worry-FreeTM. Business Security Standard and Advanced Editions. System Requirements. Administrator s Guide. Securing Your Journey to the Cloud8

Worry-FreeTM. Business Security Standard and Advanced Editions. System Requirements. Administrator s Guide. Securing Your Journey to the Cloud8 Worry-FreeTM Business Security Standard and Advanced Editions Securing Your Journey to the Cloud8 Administrator s Guide System Requirements Trend Micro Incorporated reserves the right to make changes to

More information

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus

More information

CLOUD SERVICE SCHEDULE Newcastle

CLOUD SERVICE SCHEDULE Newcastle CLOUD SERVICE SCHEDULE Newcastle 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule,

More information

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses A simple, effective and affordable solution designed for small businesses Overview Symantec Protection Suite Small Business Edition is a simple, affordable, security and backup solution. It is designed

More information

Endpoint Business Products Testing Report. Performed by AV-Test GmbH

Endpoint Business Products Testing Report. Performed by AV-Test GmbH Business Products Testing Report Performed by AV-Test GmbH January 2011 1 Business Products Testing Report - Performed by AV-Test GmbH Executive Summary Overview During November 2010, AV-Test performed

More information

Getting Started with Symantec Endpoint Protection

Getting Started with Symantec Endpoint Protection Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only

More information

Symantec Backup Exec 2010

Symantec Backup Exec 2010 Reliable Backup and Recovery Designed for Your Growing Business Overview delivers market leading backup and recovery protection from server to desktop. Easily protect more data while you reduce storage

More information

Security Industry Market Share Analysis

Security Industry Market Share Analysis Security Industry Market Share Analysis September 2011 Introduction The Research OPSWAT releases quarterly market share reports for several sectors of the security industry. This quarter s report includes

More information

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Kaspersky Endpoint Security 10 for Windows. Deployment guide Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses

More information

Technical Specifications

Technical Specifications Technical Specifications Deployment and Integration The zero footprint web architecture ensures no intrusion on your users computers. Use ZAP CubeXpress to bring in Microsoft Dynamics customizations and

More information

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...

More information

Comparative Performance Review

Comparative Performance Review Comparative Performance Review Endpoint Security Performance in Desktop Virtualization Environments A Trend Micro White Paper Executive Summary In June 2010, Indusface Consulting Ltd performed a test that

More information

VDI Without Compromise with SimpliVity OmniStack and Citrix XenDesktop

VDI Without Compromise with SimpliVity OmniStack and Citrix XenDesktop VDI Without Compromise with SimpliVity OmniStack and Citrix XenDesktop Page 1 of 11 Introduction Virtual Desktop Infrastructure (VDI) provides customers with a more consistent end-user experience and excellent

More information

Dell KACE K1000 System Management Appliance Version 5.4. Patching and Security Guide

Dell KACE K1000 System Management Appliance Version 5.4. Patching and Security Guide Dell KACE K1000 System Management Appliance Version 5.4 Patching and Security Guide October 2012 2004-2012 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without

More information

Druva insync: Simplified, Robust Endpoint Data Protection Date: August 2011 Author: Tony Palmer, Senior Lab Engineer /Analyst

Druva insync: Simplified, Robust Endpoint Data Protection Date: August 2011 Author: Tony Palmer, Senior Lab Engineer /Analyst ESG Lab Review Druva insync: Simplified, Robust Endpoint Data Protection Date: August 2011 Author: Tony Palmer, Senior Lab Engineer /Analyst Abstract: This ESG Lab review documents hands-on testing of

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

AVeS Cloud Security powered by SYMANTEC TM

AVeS Cloud Security powered by SYMANTEC TM Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting

More information

ENTERPRISE EPP COMPARATIVE ANALYSIS

ENTERPRISE EPP COMPARATIVE ANALYSIS ENTERPRISE EPP COMPARATIVE ANALYSIS Socially Engineered Malware Randy Abrams, Jayendra Pathak, Ahmed Garhy Tested Products Fortinet Fortigate 100D Management station Forticlient- 5.0.7.333 McAfee VirusScan

More information

Symantec Endpoint Protection 12.1.6

Symantec Endpoint Protection 12.1.6 Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly

More information

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection Technology Blueprint Secure Your Virtual Desktop Infrastructure Optimize your virtual desktop infrastructure for performance and protection LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL

More information

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned

More information

Secure Your Mobile Workplace

Secure Your Mobile Workplace Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in

More information

Symantec Messaging Gateway 10.5

Symantec Messaging Gateway 10.5 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

Microsoft Software Update Services and Managed Symantec Anti-virus. Michael Satut TSS/Crown IT Support m-satut@northwestern.edu

Microsoft Software Update Services and Managed Symantec Anti-virus. Michael Satut TSS/Crown IT Support m-satut@northwestern.edu Microsoft Software Update Services and Managed Symantec Anti-virus Michael Satut TSS/Crown IT Support m-satut@northwestern.edu Introduction The recent increase in virus and worm activity has created the

More information

Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms

Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms Intel Cloud Builders Guide Intel Xeon Processor-based Servers RES Virtual Desktop Extender Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms Client Aware Cloud with RES Virtual

More information

Project Virtual Reality Check

Project Virtual Reality Check Project Virtual Reality Check #DUTCHVMUG Jeroen van de Kamp CTO j.kamp@loginconsultants.nl Ruben Spruijt CTO rsp@pqr.nl Project Virtual Reality Check. Jeroen van de Kamp: j.kamp@loginconsultants.nl @thejeroen

More information

McAfee Server Security

McAfee Server Security Security Secure server workloads with low performance impact and integrated management efficiency. Suppose you had to choose between securing all the servers in your data center physical and virtual or

More information

Endpoint Protection Performance Benchmarks

Endpoint Protection Performance Benchmarks Endpoint Protection Performance Benchmarks GFI Software conducted objective performance testing on four, publically available business endpoint protection security software products on Windows 7 Professional

More information

Symantec Client Management Suite 8.0

Symantec Client Management Suite 8.0 IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,

More information

Backup Exec System Recovery Management Solution 2010 FAQ

Backup Exec System Recovery Management Solution 2010 FAQ Backup Exec System Recovery Management Solution 2010 FAQ Contents Overview... 1 Supported Backup Exec System Recovery Versions and Configurations... 6 Backup Exec System Recovery Management Solution Installation

More information

Security Industry Market Share Analysis

Security Industry Market Share Analysis Security Industry Market Share Analysis December Introduction The Research OPSWAT releases quarterly market share reports for several sectors of the security industry. This report includes both worldwide

More information

Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows

Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows Compulink Business Systems, Inc. 2645 Townsgate Road, Suite 200 Westlake Village, CA 91361 2013 Compulink

More information

Windows 8 Malware Protection Test Report

Windows 8 Malware Protection Test Report Windows 8 Malware Protection Test Report A test commissioned by Kaspersky Lab and performed by AV-Test GmbH Date of the report: January 11 th, 2013, last update: January 11 th, 2013 Executive Summary In

More information

Deep Security Vulnerability Protection Summary

Deep Security Vulnerability Protection Summary Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security

More information

What to Look for When Evaluating Next-Generation Firewalls

What to Look for When Evaluating Next-Generation Firewalls What to Look for When Evaluating Next-Generation Firewalls Using independent tests to compare performance, cost and functionality Table of Contents Why Use Independent Tests in Evaluations?... 3 What to

More information

Oracle Database Scalability in VMware ESX VMware ESX 3.5

Oracle Database Scalability in VMware ESX VMware ESX 3.5 Performance Study Oracle Database Scalability in VMware ESX VMware ESX 3.5 Database applications running on individual physical servers represent a large consolidation opportunity. However enterprises

More information

For Businesses with more than 25 seats. www.eset.com

For Businesses with more than 25 seats. www.eset.com For Businesses with more than 25 seats www.eset.com ESET Endpoint Protection Standard Whether your business is just starting or Simple and Straightforward established, there are a few things you expect

More information

Minimum Computer System Requirements

Minimum Computer System Requirements Minimum Computer System Requirements http://ualr.edu/blackboard/welcome/system- requirements/ The following minimum hardware and software requirements are necessary in order to access an online class through

More information

Business Value of Microsoft System Center 2012 Configuration Manager

Business Value of Microsoft System Center 2012 Configuration Manager Business Value of Microsoft System Center 2012 Configuration Manager Sponsored by: Microsoft Corporation Publish date: February 2013 Abstract: Microsoft System Center 2012 Configuration Manager ( Configuration

More information

Best Practice Configurations for OfficeScan (OSCE) 10.6

Best Practice Configurations for OfficeScan (OSCE) 10.6 Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan

More information

http://docs.trendmicro.com/en-us/smb/worry-free-business-security.aspx

http://docs.trendmicro.com/en-us/smb/worry-free-business-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

http://docs.trendmicro.com/en-us/smb/worry-free-business-security.aspx

http://docs.trendmicro.com/en-us/smb/worry-free-business-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Cisco WebEx Meetings Server System Requirements

Cisco WebEx Meetings Server System Requirements First Published: October 21, 2012 Last Modified: October 21, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 8 526-00 800 553-NETS

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

Microsoft Dynamics NAV 2015 Hardware and Server Requirements. Microsoft Dynamics NAV Windows Client Requirements

Microsoft Dynamics NAV 2015 Hardware and Server Requirements. Microsoft Dynamics NAV Windows Client Requirements Microsoft Dynamics NAV 2015 Hardware and Server Requirements Microsoft Dynamics NAV Windows Client Requirements Windows client. operating systems Hardware resources Reports Windows 8.1 Professional or

More information

Symantec Messaging Gateway 10.6

Symantec Messaging Gateway 10.6 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

Banker Malware Protection Test Report

Banker Malware Protection Test Report Banker Malware Protection Test Report A test commissioned by Kaspersky Lab and performed by AV-Test GmbH Date of the report: April 10 th,, last update: April 10 th, Executive Summary In March, AV-Test

More information

REDCENTRIC MANAGED ARCHIVE SERVICE SERVICE DEFINITION

REDCENTRIC MANAGED ARCHIVE SERVICE SERVICE DEFINITION REDCENTRIC MANAGED ARCHIVE SERVICE SERVICE DEFINITION SD005 V2.0 Issue Date 02 July 2014 1) SERVICE OVERVIEW Redcentric's Managed Archive Service allows customers to regain control of their Microsoft Exchange

More information

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro Udo_Schneider@trendmicro.de 26.03.2013

More information

WildFire Overview. WildFire Administrator s Guide 1. Copyright 2007-2015 Palo Alto Networks

WildFire Overview. WildFire Administrator s Guide 1. Copyright 2007-2015 Palo Alto Networks WildFire Overview WildFire provides detection and prevention of zero-day malware using a combination of malware sandboxing and signature-based detection and blocking of malware. WildFire extends the capabilities

More information

Signal Customized Helpdesk Course

Signal Customized Helpdesk Course Signal Customized Helpdesk Course This course is a combination of modules taken from two Microsoft Courses: 50311A and 50331A. It is geared toward staff who handle helpdesk calls and troubleshoot end user

More information

McAfee Data Loss Prevention Endpoint 9.4.0

McAfee Data Loss Prevention Endpoint 9.4.0 Release Notes Revision A McAfee Data Loss Prevention Endpoint 9.4.0 For use with McAfee epolicy Orchestrator Contents About this release New features Enhancements Installation instructions Known issues

More information

MEGA Web Application Architecture Overview MEGA 2009 SP4

MEGA Web Application Architecture Overview MEGA 2009 SP4 Revised: September 2, 2010 Created: March 31, 2010 Author: Jérôme Horber CONTENTS Summary This document describes the system requirements and possible deployment architectures for MEGA Web Application.

More information

Endpoint Security for DeltaV Systems

Endpoint Security for DeltaV Systems DeltaV Systems Service Data Sheet Endpoint Security for DeltaV Systems Essential protection that consolidates endpoint and data security. Reduces the time and effort spent deploying and managing security

More information

Symantec Protection Suite Add-On for Hosted Email and Web Security

Symantec Protection Suite Add-On for Hosted Email and Web Security Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication

More information

Microsoft Exchange Server 2003 Deployment Considerations

Microsoft Exchange Server 2003 Deployment Considerations Microsoft Exchange Server 3 Deployment Considerations for Small and Medium Businesses A Dell PowerEdge server can provide an effective platform for Microsoft Exchange Server 3. A team of Dell engineers

More information

Bitdefender GravityZone Sales Presentation

Bitdefender GravityZone Sales Presentation 6 March 2014 Page 1 Bitdefender GravityZone Sales Presentation 1 Page 2 Bitdefender at a Glance The #1 Anti-Malware Security Technology in the world First security software vendor to receive top recommendations

More information

UP L17 Virtualization: Security Without Sacrificing Performance

UP L17 Virtualization: Security Without Sacrificing Performance UP L17 Virtualization: Security Without Sacrificing Performance Hands on lab Description In this hands on lab you will learn how to optimize SEP 12 for your virtual desktops to get maximum protection without

More information

Anti-spam Comparison Report

Anti-spam Comparison Report January 2009 Anti-spam Comparison Report www.westcoastlabs.com 1 Test Laboratory Details US Headquarters and Test Facility West Coast Labs, 16842 Von Karman Avenue, Suite 125 Irvine, CA 92606, U.S.A.,

More information

Chief Security Strategist Symantec Public Sector

Chief Security Strategist Symantec Public Sector Chief Security Strategist Symantec Public Sector Advanced Persistent Threat Further things to understand about the APT Compromised Game Networks Lulzec Anonymous/YamaTough WikiLeaks 101 Global Intelligence

More information

Symantec Desktop and Laptop Option 7.6

Symantec Desktop and Laptop Option 7.6 Automated protection for desktops and laptops Data Sheet: Backup and Disaster Recovery Overview With the majority of business-critical information residing outside the data centers or on off corporate

More information

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices The Payment Card Industry (PCI) Data Security Standard (DSS) provides an actionable framework for developing a robust payment card data security process. The Payment Application Data Security Standard

More information

ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows

ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows Products Details ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity

More information

F-Secure Internet Gatekeeper Virtual Appliance

F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance TOC 2 Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper Virtual Appliance.3 Chapter 2: Deployment...4

More information

Microsoft Forefront Endpoint Protection 2010 Evaluation Guide

Microsoft Forefront Endpoint Protection 2010 Evaluation Guide Forefront Endpoint Protection 2010, the next version of Forefront Client Security, enables businesses to simplify and improve endpoint protection while greatly reducing infrastructure costs. It builds

More information

Virtual Desktop Infrastructure (VDI) made Easy

Virtual Desktop Infrastructure (VDI) made Easy Virtual Desktop Infrastructure (VDI) made Easy HOW-TO Preface: Desktop virtualization can increase the effectiveness of information technology (IT) teams by simplifying how they configure and deploy endpoint

More information

DOBUS And SBL Cloud Services Brochure

DOBUS And SBL Cloud Services Brochure 01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted

More information

Compulink Advantage Online TM

Compulink Advantage Online TM Compulink Advantage Online TM COMPULINK ADVANTAGE ONLINE TM INSTALLATION, CONFIGURATION AND PERFORMANCE GUIDE FOR WINDOWS (Revised 07/08/2011) 2011 Compulink Business Systems, Inc. All rights reserved

More information