Symantec Endpoint Protection 11.0 Securing Virtual Environments Best Practices White Paper. Updated 7/20/2010
|
|
|
- June Walker
- 9 years ago
- Views:
Transcription
1 W H I T E P A P E R : T E C H N I C A L S E C U R I T Y S O L U T I O N S Symantec Endpoint Protection 11.0 Securing Virtual Environments Best Practices White Paper Updated 7/20/2010
2 White Paper: Symantec Enterprise Security Solutions Securing Virtual Environments with Symantec Endpoint Protection Content Scope... 3 Executive Summary... 3 What is Virtualization... 3 Supported Virtualization Platforms... 3 What is Symantec Endpoint Protection... 4 Best Practices for Symantec Endpoint Protection Clients in a Virtual Environment... 4 Best Practices for Security Overview... 4 Best Practices for Performance Overview... 5 Randomizing Virus Definition Updates... 5 Randomizing Scans... 5 Updating Virus Definitions directly from the SEPM... 6 Updating Virus Definitions Using LiveUpdate... 8 Scheduled Scans... 9 Best Practices for Symantec Endpoint Protection Manager on a guest system... 9 Appendix A: Licensing Appendix B: Looking Forward VMSafe... 10
3 Scope This White Paper provides an overview on Best Practices when running Symantec Endpoint Protection in a virtual environment, and offers an overview of what factors to consider when using Symantec Endpoint Protection in virtual environments. It does not give specific sizing guidelines, as many factors can influence performance of multiple guest hosts in a virtual environment. Note: In certain configurations or environments, Symantec Endpoint Protection might not be the recommended solution to maintain security. For example, Symantec Critical System Protection might be the preferred solution for a locked down VDI workstation or similar guest operating system. Please contact a Symantec Sales Engineer or Consultant if you have questions about your particular environment. This White Paper addresses cases where Symantec Endpoint Protection is considered the proper solution for securing a virtual environment. Executive Summary Symantec Endpoint Protection 11.0 fully supports, virtual environments. This White Paper provides an overview of the most common considerations when running Symantec Endpoint Protection in virtual environments. It describes specific points about how to secure virtual environments while maintaining acceptable performance of guest systems. What is Virtualization Virtualization is the abstraction and simulation of resources. Platform virtualization/virtual Machines (VMs) are software simulations of physical machines. Virtualization enables more than one running operating system per physical machine. The technology got its start on mainframes decades ago, allowing administrators to avoid wasting expensive processing power. Symantec Endpoint Protection components run in virtual systems just as on physical hardware, although you may need to slightly increase basic hardware requirements for the physical system account for overhead due to running multiple virtual environments concurrently. Supported Virtualization Platforms The following Virtualization Platforms are supported by Symantec Endpoint Protection 11.0 VMWare (WS 5.0, GSX 3.2, and ESX 2.5, ESX 3.x) Microsoft Virtual Server 2005 Hyper-V Note: this list is current as of the date of this white paper s publication. For a current list of support platforms, please refer to: 3
4 What is Symantec Endpoint Protection Symantec Endpoint Protection 11.0 combines Symantec Antivirus with advanced threat prevention to deliver unmatched defense against malware for laptops, desktops, servers and guest hosts in a virtual environment. It seamlessly integrates essential security technologies in a single agent and management console, increasing protection and helping lower total cost of ownership. Specifically, Symantec Endpoint Protection 11.0 provides the following protection technologies: Antivirus and Antispyware Firewall Intrusion Prevention (both Network and Host based) Device Control Network Access Control (optional add-on) The core components required to run a centrally managed Symantec Endpoint Protection 11.0 environment include: Symantec Endpoint Protection client (on each machine you wish to protect) Symantec Endpoint Protection Manager (a web server, utilizing Microsoft IIS and Apache Tomcat) Database (by default, the SEPM automatically installs an embedded database, based upon Sybase Adaptive Server Anywhere version 9) Symantec Endpoint Protection Manager console (Java-based, can be run from anywhere with network access to the Manager) Best Practices for Symantec Endpoint Protection Clients in a Virtual Environment The main considerations when running Symantec Endpoint Protection in a virtual environment are the same as running on physical hardware: Security and Performance. The following Best Practices address how to ensure security for a virtual environment while maintaining performance and stability. Best Practices for Security Overview Symantec Endpoint Protection protects Windows-based operating systems, and must be installed on each instance of Windows to ensure protection. For example, if an administrator runs a Windows-based host with multiple Windowsbased guest virtual machines, each discrete Windows instance must have Symantec Endpoint Protection installed to avoid any security gaps. In general, the default settings for Symantec Endpoint Protection are appropriate to ensure the security of a guest operating system. 4
5 Best Practices for Performance Overview When running Symantec Endpoint Protection in a virtual environment, consider how multiple guest systems can impact hardware resources on a host system. This is especially true when routine tasks happen simultaneously on multiple guest systems. Due to extremely high I/O, the following tasks are examples that can degrade performance if run on multiple guest systems simultaneously. Virus Definition Updates Scheduled Scans Symantec recommends using randomization to minimize the impact on hardware resources when these tasks occur. Randomization ensures each client on a guest system does not run a scheduled scan or update virus definitions at the same time. Randomizing Virus Definition Updates Symantec Endpoint Protection clients can update their virus definitions either directly from the Symantec Endpoint Protection Management server or by running the LiveUpdate component on the client to download virus definitions. Randomizing Scans SEP RU6a includes a scan randomization feature designed to ease the load on the host machine by running scans at different times. This feature is especially useful in virtual machine environments helping to reduce the overall load at any given time on the host computer. The need for this feature arose from potential performance and bottleneck issues when scans would start and run simultaneously on host machines running multiple VMs. This feature corrects that bottleneck and ensures scans are not started simultaneously in multiple VM environments thus greatly improving overall performance. The Amber release will include Idle time and Scan Less features further improving performance of scanning VM environments. More information on these Amber features will become available in the coming months. 5
6 Updating Virus Definitions directly from the SEPM Symantec Endpoint Protection 11 Maintenance Release 3 introduced a randomization feature to the Communications Settings for clients which will optimize performance in a virtual environment. These settings are configured via the communications settings within any group. 6
7 Note: Uncheck the box next to Inherit policies and settings from parent group to configure the Group specific settings. In the following Communication Settings dialog box, make the following changes as shown below: 1. Configure clients to use Pull Mode 2. Place a check in the Enable randomization 7
8 Note: Depending on the number of clients in the virtual environment, consider increasing the heartbeat interval as needed. Additionally, if the time at which clients update virus definitions causes a performance impact, consider increasing the randomization window as needed. Updating Virus Definitions Using LiveUpdate Alternatively, clients can be configured to run LiveUpdate to download Virus Definitions directly from Symantec. To prevent many clients from updating Virus Definitions simultaneously, Symantec recommends that you randomize the LiveUpdate schedule. To configure clients to run LiveUpdate with a randomized schedule, configure the LiveUpdate Settings policy as follows: 8
9 1. In the Symantec Endpoint Protection Manager, select the Policy Page and then select LiveUpdate 2. Open or create a LiveUpdate Settings policy for editing. 3. In the Server Settings dialog box uncheck Download Definitions from management server unless the randomization setting has been enabled in the client group s communication settings. 4. Make sure there is a check next to Use a LiveUpdate Server. 5. In the Schedule dialogue enable scheduling and configure a schedule during non peak times 6. Make sure there is a check box next to randomize the start time Scheduled Scans Scheduled scans require consideration in a virtual environment due to the potential for performance degradation. How often and when scheduled scans should be run will depend on security policies in your organizations. The following Knowledge Base articles apply to Scheduled Scan tuning in general and should be considered when configuring scheduled scans for guest systems: Ensure Scan Tuning options are set for Best Application Performance : Consider using multithreading during scheduled scans: Consider utilizing the resumable scan feature: Note: the specific options that are appropriate will depend on your environment. Additionally, Symantec recommends dividing up guest clients in different groups with different scheduled scan times to avoid performance degradation. Also, consider scanning compressed files one or two levels deep (instead of default 3). Best Practices for Symantec Endpoint Protection Manager on a guest system When running a Symantec Endpoint Protection Manager in a guest host, ensure the Symantec Endpoint Protection Manager guest operating system has at least two virtual CPUs and that CPU throttling is disabled in ESX. Furthermore, Symantec recommends following the same recommendations noted above for running multiple guest systems. The previously discussed settings establish how clients communicate with the manager and how the clients receive content from the manager, both of which affect how much CPU and Disk I/O the manager requires. Simultaneous content downloads can severely affect performance of a host virtual environment. In summary, Symantec recommends configuring clients to communicate with the Symantec Endpoint Protection Manager in Pull Mode and enabling randomization for content downloads in the Communications Settings. 9
10 Appendices Appendix A: Licensing Section 17.2 in the End User License Agreement states that each running instance of Symantec Endpoint Protection Client requires a license. This includes a running instance that exists due to cloning a virtual system. The exact wording is as follows: Notwithstanding anything to the contrary contained in this License Agreement, if the Licensed Software is Symantec Endpoint Protection, each running instance (physical and/or virtual) of such Software must be licensed. You create an instance of software by executing the software s setup or install procedure. You also create an instance of software by duplicating an existing instance. References to software include instances of the software. You run an instance of software by loading it into memory and executing one or more of its instructions. Once running, an instance is considered to be running (whether or not its instructions continue to execute) until it is removed from memory. Appendix B: Looking Forward VMSafe VMsafe is an API provided by VMWare to enhance security in virtual environments. Symantec is partnering with VMWare to leverage this technology to improve security and performance of virtual environments. For more information please refer to VMWare s VMSafe website: This White Paper will be updated as more information about Symantec s VMSafe technology is made available. 10
11 About Symantec Symantec is a global leader in providing security, storage and systems management solutions to help businesses and consumers secure and manage their information. Headquartered in Cupertino, Calif., Symantec has operations in 40 countries. More information is available at For specific country offices and contact numbers, please visit our Web site. For product information in the U.S., call toll-free 1 (800) Symantec Corporation World Headquarters Stevens Creek Boulevard Cupertino, CA USA +1 (408) (800) Copyright 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
How To Set Up A Shared Insight Cache Server On A Pc Or Macbook With A Virtual Environment On A Virtual Computer (For A Virtual) (For Pc Or Ipa) ( For Macbook) (Or Macbook). (For Macbook
SEP 12.1 Best Practices in a Virtual Environment The document is intended to capture the complete set of best practices for installation and configuration of SEP in a virtual environment. 1 Table of Contents
Symantec Endpoint Protection (SEP) 11.0 Configuring the SEP Client for Self-Protection
SYMANTEC TECHNOLOGY NETWORK: SECURITY Symantec Endpoint Protection (SEP) 11.0 Configuring the SEP Client for Self-Protection Purpose of this Whitepaper:... 3 Overview... 4 The SEP Client Interface... 5
W H I T E P A P E R : T E C H N I C A L. Understanding and Configuring Symantec Endpoint Protection Group Update Providers
W H I T E P A P E R : T E C H N I C A L Understanding and Configuring Symantec Endpoint Protection Group Update Providers Martial Richard, Technical Field Enablement Manager Table of Contents Content Introduction...
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
Symantec Endpoint Protection
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group
2 WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.3 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The
Symantec Endpoint Protection
The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,
Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform
TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR RUNNING SEP ON.... AZURE.................................... Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform Who should
Small and Midsize Business Protection Guide
P r o t e c t i o n G u i d e : C l o s e t h e P r o t e c t i o n G a p Small and Midsize Business Protection Guide Close the protection gap and safeguard your business future Confidence in a connected
How To Protect Your Computer From A Malicious Virus
Trusted protection from malware and email-borne threats for multiplatform environments Overview safeguards enterprise assets and lowers risk by providing unmatched protection against threats for laptops,
Redefining Endpoint Security: Symantec Endpoint Protection Russ Jensen
Redefining Endpoint Security: Symantec Endpoint Protection Russ Jensen Sr. Presales Engineer, CISSP, MCSE Key Ingredients for Endpoint Protection Antivirus World s leading AV solution Most (44) consecutive
Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex
Symantec Endpoint Protection 12.1.6
Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly
Improve Backup Performance by Upgrading to Symantec Backup Exec 12.5 with Service Pack 2
Improve Backup Performance by Upgrading to Symantec Backup Exec 12.5 with Service Pack 2 Test Report to Show How Existing Backup Exec Customers Can Improve Backup Performance and Reduce Backup Windows
Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection
The gold standard in Windows data protection Overview Symantec Backup Exec 12.5 delivers market-leading backup and recovery protection from server to desktop, providing complete data protection for the
WHITE PAPER: TECHNICAL OVERVIEW. NetBackup Desktop Laptop Option Technical Product Overview
WHITE PAPER: TECHNICAL OVERVIEW NetBackup Desktop Laptop Option Technical Product Overview Mayur Dewaikar, Sr. Technical Product Manager NetBackup Platform Symantec Technical Network White Paper EXECUTIVE
Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement
Comprehensive Endpoint Enforcement Overview is a complete, end-to-end network access control solution that enables organizations to efficiently and securely control access to corporate networks through
Symantec Backup Exec System Recovery
The Gold Standard in Complete Windows System Recovery Overview Symantec Backup Exec System Recovery 8 is a complete, disk-based system recovery solution for Microsoft Windows based servers, desktops, and
Symantec Endpoint Protection 12.1.4
Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec
Optimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems
Symantec Backup Exec 12.5 for Windows Small Business Server Premium and Standard Editions Comprehensive data protection and system recovery for Microsoft Windows Small Business Server Overview Symantec
Symantec Endpoint Protection 11.0
SYMANTEC TECHNOLOGY NETWORK: SECURITY Symantec Endpoint Protection 11.0 Terminal Server and Citrix Best Practices White Paper Contents Scope... 4 Executive Summary... 4 What is Windows Terminal Services...
Symantec Endpoint Protection 12.1.2
Data Sheet: Endpoint Security Overview offers comprehensive defense against complex attacks for both physical and virtual environments. It integrates ten essential security technologies in a single, high
Consulting Services for Veritas Storage Foundation
Reducing the complexity of enterprise storage management The continued explosive growth in corporate data, combined with the proliferation of disparate storage management tools and technologies, has created
Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control
Award-winning messaging security for inbound protection and outbound control Overview The delivers inbound and outbound messaging security for email and IM, with effective and accurate antispam and antivirus
Virtual Desktops Security Test Report
Virtual Desktops Security Test Report A test commissioned by Kaspersky Lab and performed by AV-TEST GmbH Date of the report: May 19 th, 214 Executive Summary AV-TEST performed a comparative review (January
Data Sheet: Backup & Recovery Symantec Backup Exec System Recovery Windows Small Business Server Edition
Symantec Backup Exec System Recovery Windows Small Business Server Edition Overview Regardless of the size of your company, data drives your business. Your ability to keep that data available can often
Data Sheet: Backup & Recovery Symantec Backup Exec System Recovery The Gold Standard in Complete Windows System Recovery
The Gold Standard in Complete Windows System Recovery Overview Symantec Backup Exec System Recovery 8.5 is a complete, disk-based system recovery solution for Microsoft Windows based servers, desktops,
Symantec AntiVirus Enterprise Edition
Symantec AntiVirus Enterprise Edition Comprehensive threat protection for every network tier, including client-based spyware prot e c t i o n, in a single product suite Overview Symantec AntiVirus Enterprise
Virtual Machine Protection with Symantec NetBackup 7
Overview There s little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped IT departments are racing to embrace the promise of virtualization for
Symantec Desktop and Laptop Option 7.6
Automated protection for desktops and laptops Data Sheet: Backup and Disaster Recovery Overview With the majority of business-critical information residing outside the data centers or on off corporate
Symantec LiveUpdate Administrator. Getting Started Guide
Symantec LiveUpdate Administrator Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide The software described in this book is furnished under a license agreement and may be used
Symantec Endpoint Protection 12.1.5 Datasheet
Symantec Endpoint Protection 12.1.5 Datasheet Data Sheet: Endpoint Security Overview Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that
Data Sheet: Storage Management Veritas Virtual Infrastructure Bringing enterprise-class storage management to virtual server environments
Bringing enterprise-class storage management to virtual server environments Overview Veritas Virtual Infrastructure delivers the first unified enterprise-class virtualization solution, bringing industry-leading
INFORMATION PROTECTED
INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never
Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices
TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR PROTECTING RETAIL....... POS.... SYSTEMS............................. Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices Who
Symantec Protection Suite Small Business Edition
Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business Edition is an easyto-use, all-in-one suite that secures your critical business assets and information against today
Symantec Mobile Security
Advanced threat protection for mobile devices Data Sheet: Endpoint Management and Mobility Overview The combination of uncurated app stores, platform openness, and sizeable marketshare, make the Android
Veritas Cluster Server by Symantec
Veritas Cluster Server by Symantec Reduce application downtime Veritas Cluster Server is the industry s leading clustering solution for reducing both planned and unplanned downtime. By monitoring the status
How To Protect A Virtual Desktop From Attack
Endpoint Security: Become Aware of Virtual Desktop Infrastructures! An Ogren Group Special Report May 2011 Executive Summary Virtual desktops infrastructures, VDI, present IT with the unique opportunity
WHITE PAPER: ENTERPRISE SOLUTIONS. Quick Recovery of Microsoft Active Directory Using Symantec Backup Exec 11d Agent for Active Directory
WHITE PAPER: ENTERPRISE SOLUTIONS Quick Recovery of Microsoft Active Directory Using Symantec Backup Exec 11d For use with Microsoft Windows 2000 Server and Windows Server 2003 White Paper: Enterprise
Minimize the impact of downtime and disruption. Replace time-consuming manual processes with fast, automated recovery.
Protect Against Business Downtime and Disaster with Rapid, Reliable Backup and Recovery Overview Symantec Backup Exec System Recovery 2010 is a simple, cost-effective backup and recovery solution for small
WHITE PAPER: DATA PROTECTION. Veritas NetBackup for Microsoft Exchange Server Solution Guide. Bill Roth January 2008
WHITE PAPER: DATA PROTECTION Veritas NetBackup for Microsoft Exchange Server Solution Guide Bill Roth January 2008 White Paper: Veritas NetBackup for Microsoft Exchange Server Solution Guide Content 1.
Symantec Backup Exec.cloud
Automatic, continuous, and secure protection that backs up data to the cloud, or via a hybrid approach combining on-premise and cloud-based backup. Data Sheet: Symantec.cloud Only 21 percent of SMBs are
Norton Personal Firewall for Macintosh
Norton Personal Firewall for Macintosh Evaluation Guide Firewall Protection for Client Computers Corporate firewalls, while providing an excellent level of security, are not always enough protection for
Host-based Protection for ATM's
SOLUTION BRIEF:........................................ Host-based Protection for ATM's Who should read this paper ATM manufacturers, system integrators and operators. Content Introduction...........................................................................................................
Data Sheet: Archiving Altiris Server Management Suite 7.0 from Symantec Essential server management: Discover, provision, manage, and monitor
Essential server management: Discover, provision, manage, and monitor Overview Complexity with physical and virtual machine proliferation increases the challenges involved in managing servers. Server administrators
Data Sheet: Server Management Altiris Server Management Suite 7.0 Essential server management: Discover, provision, manage, and monitor
Essential server management: Discover, provision, manage, and monitor Overview Complexity with physical and virtual machine proliferation increases the challenges involved in managing servers. Server administrators
Confidence in a connected world. Veritas NetBackup 6.5 for VMware 3.x Best Practices
WHITE PAPER: Best Practices Confidence in a connected world. Veritas NetBackup 6.5 for VMware 3.x Best Practices White Paper: Best Practices Veritas NetBackup 6.5 for VMware 3.x Best Practices November
Data Sheet: Storage Management Veritas CommandCentral Storage 5.1 Centralized visibility and control across heterogeneous storage environments
Centralized visibility and control across heterogeneous storage environments Overview Veritas CommandCentral Storage is an industry standard based, comprehensive software solution that seamlessly integrates
Veritas InfoScale Availability
Veritas InfoScale Availability Delivers high availability and disaster recovery for your critical applications Overview protects your most important applications from planned and unplanned downtime. InfoScale
UP L17 Virtualization: Security Without Sacrificing Performance
UP L17 Virtualization: Security Without Sacrificing Performance Hands on lab Description In this hands on lab you will learn how to optimize SEP 12 for your virtual desktops to get maximum protection without
Athena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
Veritas Cluster Server from Symantec
Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster
Two Great Ways to Protect Your Virtual Machines From Malware
Two Great Ways to Protect Your Virtual Machines From Malware By Maxim Weinstein, CISSP, Senior Product Marketing Manager Virtualization promises to reduce operational costs, simplify management and increase
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
Symantec Workspace Streaming: Enabling the Dynamic Management of Software Licenses
WHITE PAPER: LICENSE MANAGEMENT........................................ Symantec Workspace Streaming: Enabling the Dynamic Management of Software Licenses Who should read this paper IT organizations that
VDI Security for Better Protection and Performance
VDI Security for Better Protection and Performance Addressing security and infrastructure challenges in your VDI deployments Trend Micro, Incorporated» See why you need security designed for VDI environments
Symantec Backup Exec 2012
Better backup for all Data Sheet: Backup and Disaster Recovery Overview is one integrated product that protects virtual and physical environments, simplifies both backup and disaster recovery, and recovers
Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection
Technology Blueprint Secure Your Virtual Desktop Infrastructure Optimize your virtual desktop infrastructure for performance and protection LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL
WHITE PAPER: HIGH CUSTOMIZE AVAILABILITY AND DISASTER RECOVERY
WHITE PAPER: HIGH CUSTOMIZE AVAILABILITY AND DISASTER RECOVERY Confidence in a connected world. Protecting Business-Critical Applications in a VMware Infrastructure 3 Environment Using Veritas Cluster
Deputy Secretary for Information Technology Date Issued: November 20, 2009 Date Revised: December 20, 2010. Revision History Description:
Information Technology Policy Commonwealth of Pennsylvania Governor's Office of Administration/Office for Information Technology ITP Number: ITP-SYM008 ITP Title: Server Virtualization Policy Issued by:
Symantec NetBackup 7 Clients and Agents
Complete protection for your information-driven enterprise Overview Symantec NetBackup provides a simple yet comprehensive selection of innovative clients and agents to optimize the performance and efficiency
Advanced Server Virtualization: Vmware and Microsoft Platforms in the Virtual Data Center
Advanced Server Virtualization: Vmware and Microsoft Platforms in the Virtual Data Center Marshall, David ISBN-13: 9780849339318 Table of Contents BASIC CONCEPTS Introduction to Server Virtualization Overview
PST Migration with Enterprise Vault 8.0: Part 1 - Solution Overview. Author: Andy Joyce, EV Technical Product Management Date: April, 2009
WHITE PAPER: TECHNICAL PST Migration with Enterprise Vault 8.0: Part 1 - Solution Overview Author: Andy Joyce, EV Technical Product Management Date: April, 2009 White Paper: Symantec Technical PST Migration
Symantec Backup Exec System Recovery
Symantec Backup Exec System Recovery The Gold Standard in Complete Windows System Recovery Overview 7.0 is a complete, disk-based system recovery solution for Microsoft Windows based servers, desktops,
Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses
A simple, effective and affordable solution designed for small businesses Overview Symantec Protection Suite Small Business Edition is a simple, affordable, security and backup solution. It is designed
Getting Started with Symantec Endpoint Protection
Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only
Symantec Backup Exec 11d for Windows Servers New Encryption Capabilities
WHITE PAPER: ENTERPRISE SECURITY Symantec Backup Exec 11d for Windows Servers New Encryption Capabilities White Paper: Enterprise Security Symantec Backup Exec 11d for Windows Servers Contents Executive
Virtualization of CBORD Odyssey PCS and Micros 3700 servers. The CBORD Group, Inc. January 13, 2007
Virtualization of CBORD Odyssey PCS and Micros 3700 servers January 13, 2007 61 Brown Road Ithaca, NY 14850 (607) 257-2410 Document Revision: 2 Last revised: January 13, 2007 Changes are periodically made
VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE
VMware Security Briefing Rob Randell, CISSP Senior Security Specialist SE Agenda Security Advantages of Virtualization Security Concepts in Virtualization Architecture Operational Security Issues with
McAfee MOVE / VMware Collaboration Best Practices
McAfee MOVE / VMware Collaboration Best Practices Christie J. Karrels Sales Engineer Federal DoD January 11, 2013 1 P a g e Contents Introduction... 3 Traditional Anti-Malware vs. Optimized Anti-Malware...
Direct virtual machine creation from backup with BMR
NETBACKUP 7.6 FEATURE BRIEFING DIRECT VIRTUAL MACHINE CREATION FROM BACKUP WITH BMR NetBackup 7.6 Feature Briefing Direct virtual machine creation from backup with BMR Version number: 1.0 Issue date: 5
WHITE PAPER: ENTERPRISE SECURITY. Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions
WHITE PAPER: ENTERPRISE SECURITY Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions for Microsoft Exchange Server 2003 and Microsoft SQL Server White Paper: Enterprise Security Symantec
Endpoint Virtualization for Healthcare Providers
WHITE PAPER: xxxxxx BEST PRACTICES [00-Cover_Bar] FOR HEALTHCARE Endpoint Virtualization for Healthcare Providers Confidence in a connected world. White Paper: Best Practices for Healthcare Endpoint Virtualization
Symantec Virtual Machine Management 7.1 User Guide
Symantec Virtual Machine Management 7.1 User Guide Symantec Virtual Machine Management 7.1 User Guide The software described in this book is furnished under a license agreement and may be used only in
TECHNICAL WHITE PAPER. Symantec pcanywhere Security Recommendations
TECHNICAL WHITE PAPER Symantec pcanywhere Security Recommendations Technical White Paper Symantec pcanywhere Security Recommendations Introduction... 3 pcanywhere Configuration Recommendations... 4 General
Table of Contents Introduction and System Requirements 9 Installing VMware Server 35
Table of Contents Introduction and System Requirements 9 VMware Server: Product Overview 10 Features in VMware Server 11 Support for 64-bit Guest Operating Systems 11 Two-Way Virtual SMP (Experimental
Code Injection From the Hypervisor: Removing the need for in-guest agents. Matt Conover & Tzi-cker Chiueh Core Research Group, Symantec Research Labs
Code Injection From the Hypervisor: Removing the need for in-guest agents Matt Conover & Tzi-cker Chiueh Core Research Group, Symantec Research Labs SADE: SteAlthy Deployment and Execution Introduction
WHITE PAPER: customize. Comprehensive Backup and Recovery of VMware Virtual Infrastructure Symantec Backup Exec 12.5 for Windows Servers
WHITE PAPER: customize Symantec Solutions for Windows Confidence in a connected world. Comprehensive Backup and Recovery of VMware Virtual Infrastructure Symantec Backup Exec 12.5 for Windows Servers White
Symantec Endpoint Protection Analyzer Report
Symantec Endpoint Protection Analyzer Report For Symantec Customer Table of Contents Statement of Confidentiality... 3 1. Introduction... 4 2. Environmental Analysis Overview... 5 2.1 Findings Overview...
Kronos Workforce Central on VMware Virtual Infrastructure
Kronos Workforce Central on VMware Virtual Infrastructure June 2010 VALIDATION TEST REPORT Legal Notice 2010 VMware, Inc., Kronos Incorporated. All rights reserved. VMware is a registered trademark or
Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure
Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus
Veritas NetBackup 6.0 Server Now from Symantec
Veritas NetBackup 6.0 Server Now from Symantec Innovative data protection As the recognized leader for enterprise-class backup and recovery, Veritas NetBackup Server software is designed to help provide
Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it
Complete and high performance protection where you need it Overview delivers high-performance protection against physical and virtual server downtime with policy based prevention, using multiple protection
VMware/Hyper-V Backup Plug-in User Guide
VMware/Hyper-V Backup Plug-in User Guide COPYRIGHT No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying,
HP Virtual Controller and Virtual Firewall for VMware vsphere 1-proc SW LTU
HP Virtual Controller and Virtual Firewall for VMware vsphere 1-proc SW LTU Data sheet Product overview The HP TippingPoint Virtual Controller + Virtual Firewall (vcontroller+vfw) extends our leading intrusion
Symantec NetBackup 5000 Appliance Series
A turnkey, end-to-end, global deduplication solution for the enterprise. Data Sheet: Data Protection Overview Symantec NetBackup 5000 series offers your organization a content aware, end-to-end, and global
Demystifying Virtualization for Small Businesses Executive Brief
Demystifying Virtualization for Small Businesses White Paper: Demystifying Virtualization for Small Businesses Demystifying Virtualization for Small Businesses Contents Introduction............................................................................................
Virtualization Support - Real Backups of Virtual Environments
Virtualization Support Real Backups of Virtual Environments Contents Virtualization Challenges 3 The Benefits of Agentless Backup 4 Backup and Recovery Built for Virtualized Environments 4 Agentless in
Symantec Endpoint Protection 11.0 Home Use & Student Use Overview
This document is intended to clarify for Symantec-internal employees and Symantec partners the purpose and restrictions of the Home Use and Student Use licenses for Symantec Endpoint Protection 11.0. All
