Solution Recipe: Improve Networked PC Security with Intel vpro Technology

Size: px
Start display at page:

Download "Solution Recipe: Improve Networked PC Security with Intel vpro Technology"

Transcription

1 Solution Recipe: Improve Networked PC Security with Intel vpro Technology

2 Preface Intel has developed a series of unique Solution Recipes designed for channel members interested in providing complete solutions to their customers, backed by top-quality technology and support. A solution recipe describes how to combine Intel -based ingredients to create new technology solutions for common business challenges. This recipe explains how security for networked PCs can be improved with Intel vpro technology and a suite of highly-regarded third-party software and hardware components. When you are ready to deploy this recipe, please refer to the related Deployment Guide, which includes step-by-step instructions. You can find the guide by visiting: or Common Notations and Terms Trusted Platform Module (TPM): Found on Intel vpro technology platforms, TPM is a microcontroller that stores keys, passwords, and digital certificates for applications such as and secure Web access. Trusted Computing Group (TCG): A not-for-profit organization formed to develop, define, and promote open standards for hardware-enabled, trusted computing and security technologies. Their goal: to help users protect their information assets (for example, data, passwords, keys). Table of Contents Meeting New Market Opportunities 2 Solution Overview 3 Key Technology 4 Solution Benefits 6 Solution Recipe 8 Solution Support 10 Virtual Private Network (VPN): A private communications network used within a company to communicate securely over a public network (Internet). Solution Recipe: Improve Networked PC Security with Intel vpro Technology Page 1

3 Addressing New Market Opportunities Meeting New Market Opportunities One of the most critical challenges facing businesses today is finding ways to keep PCs secure from malicious attacks such as viruses or worms. These attacks typically enter the network via s, attachments, or downloaded files, and they can destroy data and cripple networks. A downed network can freeze productivity and require huge amounts of time and money to repair. Channel members can enhance their relationships with their valued customers by helping them create more secure networks. Your Customers Networks Are at Risk In 2003, computer virus attacks cost global businesses an estimated USD 55 billion in damages. 1 If that number sounds alarming, consider this: 93 percent of companies that lost their data center for 10 days or more due to a disaster filed for bankruptcy within one year of the disaster. In addition, 50 percent of businesses that found themselves without data management for this same time period filed for bankruptcy immediately. 2 These statistics point to an escalating need for sophisticated security solutions. While anti-virus software, combined with a firewall, provides a base level of protection for networks, today s mobile business community demands a new level of vigilance to cover those connecting to the company s network over a wireless connection or from offsite locations. Make Your Customers Networks More Secure So what can you do to raise the level of protection particularly for your small- and medium-sized customers? Help them upgrade their network security by adding another layer of protection with Intel vpro technology. This solution delivers a full security package that includes anti-virus software and firewalls as well as using encrypted data transfer for Virtual Private Networks (VPN) and additional user authentication tools such as biometric devices and Trusted Platform Modules (TPM). And, thanks to this more powerful and secure technology, the opportunity also exists for channel members to deliver on-going IT services to their customers thus creating an additional revenue source. 1 Reuters, news.zdnet.com January 16, 2004, May 30, Data Recovery Performed Remotely white paper, ontrack.com 2003, May 30, Solution Recipe: Improve Networked PC Security with Intel vpro Technology Page 2

4 Solution Overview Every business, regardless of network size, should have a security plan that defines appropriate user behavior and identifies necessary security procedures. Access rights. A business has three options regarding trust and their network: 1) Trust everyone all the time; 2) Trust no one at any time; 3) Trust some people, some of the time. The third option is the most commonly used in business. Remote access. Use antivirus and firewall protection on the computing devices and create a secure VPN connection for remote users. In response to growing security threats, many businesses are looking for ways to take their security systems to the next level. For example, some banks are considering requiring their online banking customers to use biometric identification to access their accounts. More and more, government institutions are using digital signing technology for areas such as recording signatures to authorize an executive or judicial order or for filing of citizen and business tax returns. Yet, for many small- and medium-sized businesses, creating a higher level of secure networks can be challenging. With a number of different products on the market, which ones do they choose to perform different security tasks? And will they all work smoothly together on their system? It can be a difficult, time-consuming task. But PCs equipped with Intel vpro technology, together with powerful third-party software and hardware components, provide a complete solution that is optimized and validated for use with the new, high-performance Intel Core 2 Duo processor family. Information protection. Outline guidelines for processing, storing, and transmitting your business-sensitive IT assets. Virus prevention. Reduce exposure to viruses with security software and user education. Provide users with a primer on safe computing practices. Password use. Require frequent changing of passwords, with alphanumeric, eight-digit passwords or add biometric based user authentication. Backup and recovery. Ensure continuous data backup; create a plan for data recovery. Solution Recipe: Improve Networked PC Security with Intel vpro Technology Page 3

5 Benefits Key Technology This solution recipe combines a carefully chosen combination of software and hardware components that deliver a complete security solution. Customers can rest assured that these components have been tested and validated to work together, ensuring the highest level of performance. Hardware platform. Security applications consume a great deal of a PC s processor cycles monitoring the flow of bits. But, with powerful new Intel Core 2 Duo processors, Intel vpro technology delivers a significant increase in computing power over previous Intel technology and that means better performance for end-user applications. Trusted Platform Module (TPM). This microcontroller stores keys, passwords, and digital certificates. Built into the motherboard, TPM provides secure storage and key generation capabilities, so it can be used to create and/or store both user and platform identity credentials for use in authentication. Critical applications and capabilities such as secure , secure Web access, and local protection of data are made much more secure using a TPM. Anti-virus. Applications, like Symantec Norton AntiVirus 2006*, can be included on end-user PCs and Symantec AntiVirus 10.0* for servers to automatic detection of viruses, worms, Trojan horses, spyware, and adware. Virtual Private Network (VPN). VPN Client software allows end-user PCs remote access to the company network. NETGEAR ProSafe VPN Firewall* hardware is available for strong encryption and authentication and setting up the VPN Tunnels into the corporate network. Intel Virtualization Technology (Intel VT). This hardware-enhanced virtualization technology from Intel permits one computer or server to run multiple operating systems and applications on the same machine in independent partitions or containers. This allows IT to run critical security applications in one virtual partition while end users continue working uninterrupted in the user partition. TPM management. Key products offer tools to address TPM management. For example, Wave Systems* EMBASSY Trust Suite 5.1* can help IT manage TPM security settings, provides strong authentication tools, robust password management, and TPM key archive capabilities. Biometrics. An optional USB Biometric Fingerprint Reader can create additional layers of security for end users. The USB Biometric Fingerprint reader from APC* is one example, and provides a simple, secure way to manage passwords with this fingerprint reader, the user s fingerprint becomes the password. Firewall. Keep hackers out and control inbound and outbound traffic with powerful applications like Symantec Norton Personal Firewall* software (included as part of Symantec Norton Internet Security 2006*). Solution Recipe: Improve Networked PC Security with Intel vpro Technology Page 4

6 Filtering Threats and Isolating PCs Software-only security solutions can be useful. But they also can be tampered with or disabled by hackers, viruses, or even end users themselves. Once the network is compromised, it is difficult for IT to make repairs, or even locate the PC if its management agents have been disabled. Intel vpro technology enables third-party security software to identify threats before they reach the operating system, isolate compromised PCs more quickly, and ensure that security agents stay active. Hardware filtering of data traffic. Programmable hardware-based filters examine inbound and outbound network traffic to identify threats. When the filter detects a problem, a hardware-based switch can automatically disconnect the computer s operating system from the network to contain threats more quickly. But, in this instance, only the network communications are shut down. Other applications, such as word processing or spreadsheets, are still available to the end user, minimizing the impact on productivity. Filtering Threats and Isolating PCs 3 Layers of Defense Security agent heartbeat checking. PCs with Intel vpro technology use a regular, programmable heartbeat presence check for third-party security agents. This technology uses a watchdog timer so security software can check in with the computer s management engine at programmable, onesecond intervals, confirming that the security agent is still active. If an agent hasn t checked in before the timer goes off, the computer presumes the agent has been removed, tampered with, or disabled. The management engine then logs an alert and notifies the IT console. Non-volatile memory and Intel Virtualization Technology (Intel VT). Even if a threat does get past the other defenses, IT has access to a persistent memory where critical information can be protected. With Intel VT, IT can also use self-contained, dedicated virtual environments to isolate and manage applications and data in the user partition. Creating separate partitions for the security application and end-user applications also keeps the end user from gaining access to crucial security devices, such as firewall settings. Because PCs with Intel vpro technology have the ability to automatically sense threats and then isolate themselves from the rest of the network, they are much less likely to infect other PCs on the system. And, all of these security measures can be executed by IT even if the system power is off, or if the operating system is unavailable. 1 Hardware filtering of data traffic examine network traffic and cut off the network data path when a threat is recognized User OS/ environment 2 Security agent heartbeat checking check traffic for threats, while hardware heartbeats make sure those security agents stay active Server based on Intel Xeon processor 5000 Sequence 3 Non-volatile memory and Intel Virtualization Technology and hardware-based virtual OS isolate critical applications and information from unauthorized access Intel Dual-Core Xeon Processor 5000 sequence w/intel 5000P/V chipset 1000Base-T LAN capable Additional Hardware: Intel Dialog A/C OR Digium A/C Software: RedHat Enterprise Linux 4 LanDesk Management Suite OR SyAM Management Server Solution Recipe: Improve Networked PC Security with Intel vpro Technology Page 5

7 Solution Benefits Benefits for Intel Channel Partner Program Members Offer an All-in-One Package Small- to medium-sized businesses are looking for comprehensive security solutions. This need presents channel members with an excellent opportunity to offer a complete, all-in-one package security solution a solution that reduces vulnerabilities and security risks for customers. An Attractive Price-point Intel vpro technology, with powerful new Intel Core 2 Duo processors and Intel VT, is a remarkably robust and reliable hardware option. It is priced accordingly, offering channel members a more attractive margin. In addition, components such as the Trusted Platform Module (TPM) can be added to customers systems, creating an additional revenue opportunity that addresses the specific security requirements at that installation. Ongoing IT Service Beyond that, some channel members may even wish to go as far as offering their customers ongoing IT service. With new remote management capabilities, including the ability to perform security tasks on PCs that may not have power or a functional operating system, channel members now have a cost-effective way of becoming IT contractors for their customers. Solution Recipe: Improve Networked PC Security with Intel vpro Technology Page 6

8 Benefits for Your Customers Today s banks, government agencies, educational institutions, and businesses need the ability to quickly recognize potential technological threats, and contain, and neutralize them. PCs equipped with Intel vpro technology offer those capabilities. Control User Access to Critical Areas Intel VT allows IT to create separate partitions for security and end-user applications. This prevents end users from accidentally disabling anti-virus software or firewalls. If the system does find a problem, the PC is quarantined in its own partition so that it doesn t contaminate other PCs on the network. Improved Authentication Advanced techniques such as TPM and biometric fingerprint readers help ensure that only authorized personnel have access to specific data and restricted areas of the network. monitor security agents to ensure that they are working correctly. If one of the agents goes missing, the management engine logs an alert and notifies the IT console. Higher Performance Powerful Intel Core 2 Duo processors and Intel Core microarchitecture have significantly improved performance, so virus scans, software upgrades, back-ups, and other security tasks can be run in the background without slowing down end-user workflow. Creating a hassle-free, all-in-one security solution like this could be complicated and time-consuming. But with Intel vpro technology, all of the decision making, testing, and optimizing has been done. Customers can buy a complete solution and be comfortable knowing that it will function smoothly. Proactive Intrusion Protection Hardware-based filters monitor network traffic to identify threats and can automatically disconnect the computer s operating system from the network if there is a problem. PCs with Intel vpro technology also have the ability to Solution Recipe: Improve Networked PC Security with Intel vpro Technology Page 7

9 Solution Recipe Intel vpro technology offers customers an opportunity to upgrade their network security to a significantly higher level. To aid this process, Intel has developed a Solution Deployment Guide ( or that demonstrates how critical security concerns can be met with a complete solution. Software Architecture By utilizing Intel vpro technology, you can combine a more complete package of industry leading security software to offer customers improved networked PC security with: Microsoft Windows XP* operating system (solution is Windows Vista*-ready) Symantec Norton Internet Security 2006 NETGEAR ProSafe VPN* client software (remote access from PCs into the company network) Wave Systems EMBASSY Trust Suite 5.1 (helps IT manage TPM security settings and password management) Kingsoft Antivirus* (People s Republic of China) Kaspersky Anti-Virus* 6.0 (Russia) System Architecture Intel vpro technology offers IT the ability to gain much greater control over desktop PC security, thanks to hardware-based security features. Driven by the powerful new Intel Core 2 Duo processor, Intel vpro technology delivers a significant increase in computing power over previous Intel technology. In addition, the solution couples highly-regarded third-party security software with Intel VT, the Trusted Platform Module (TPM), VPN hardware firewalls, and an optional biometric fingerprint reader to create a significant improvement in security. Solution Recipe: Improve Networked PC Security with Intel vpro Technology Page 8

10 Components Necessary to Build PCs equipped with Intel vpro technology and security software solutions (see Software Architecture) Integrated TPM eliminates need for external tokens Netgear ProSafe VPN Firewall* hardware VPN tunnel for data encryption Servers with Intel Xeon processor 5000 Sequence Wireless access point Broadband modem Networked PC Security Solution VPN Firewall (supports up to 8 tunnels) VPN Tunnel encrypts your data Internet Broadband Modem Broadband Modem Servers with Intel Xeon processor 5000 Sequence Intel vpro technologybased PC Intel vpro technologybased PC Intel vpro technologybased PC Solution Recipe: Improve Networked PC Security with Intel vpro Technology Page 9

11 Support Solution Support Intel has tested and verified the components in this security solution recipe. Please continue to use your existing Intel Support Services ( For your convenience, Intel has worked with several independent software, open source, and application vendors to streamline technical support for this solution. For more information on the third-party hardware and software products, please download the Solution Deployment Guide ( go/reseller/vpro or to obtain the specific list of vendors and contacts. Solution Recipe: Improve Networked PC Security with Intel vpro Technology Page 10

12 Intel, the Intel logo, Intel. Leap ahead. the Intel. Leap ahead. logo, Intel vpro, the vpro logo, Xeon, the Xeon logo, Intel Core and Core Inside are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. *Other names and brands may be claimed as the property of others. Copyright 2006, Intel Corporation. Intel Literature Center: Order Number: US Printed in USA/06/06/JW/KC/PDF Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document. Except as provided in Intel s terms and conditions of sale for such products, Intel assumes no liability whatsoever, and Intel disclaims any express or implied warranty, relating to sale and/or use of Intel products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right.

Solution Recipe: Remote PC Management Made Simple with Intel vpro Technology and Intel Active Management Technology

Solution Recipe: Remote PC Management Made Simple with Intel vpro Technology and Intel Active Management Technology Solution Recipe: Remote PC Management Made Simple with Intel vpro Technology and Intel Active Management Technology Preface Intel has developed a series of unique Solution Recipes designed for channel

More information

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed

More information

PC Solutions That Mean Business

PC Solutions That Mean Business PC Solutions That Mean Business Desktop and notebook PCs for small business Powered by the Intel Core 2 Duo Processor The Next Big Thing in Business PCs The Features and Performance to Drive Business Success

More information

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc. May 2012 Agenda Intel + McAfee: What it means Computing trends

More information

Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp

Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp Intel Cyber Security Briefing: Trends, Solutions, and Opportunities Matthew Rosenquist, Cyber Security Strategist, Intel Corp Legal Notices and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION

More information

Proven LANDesk Solutions

Proven LANDesk Solutions LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations

More information

Dell Client. Take Control of Your Environment. Powered by Intel Core 2 processor with vpro technology

Dell Client. Take Control of Your Environment. Powered by Intel Core 2 processor with vpro technology Dell Client Systems Take Control of Your Environment Powered by Intel Core 2 processor with vpro technology Simplifying IT As IT infrastructures grow, heterogeneous environments expand. Growing infrastructures

More information

Intel Trusted Platforms Overview

Intel Trusted Platforms Overview Intel Trusted Platforms Overview Greg Clifton Intel Customer Solutions Group Director, DoD & Intelligence 2006 Intel Corporation Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION

More information

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities. John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc.

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities. John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc. Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc. Agenda Intel + McAfee: What it means Computing trends and security

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

An Oracle Technical White Paper May 2015. How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance

An Oracle Technical White Paper May 2015. How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance An Oracle Technical White Paper May 2015 How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance Table of Contents Introduction... 2 How VSCAN Works... 3 Installing Kaspersky

More information

Getting Started with Symantec Endpoint Protection

Getting Started with Symantec Endpoint Protection Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only

More information

Solution Recipe: Voice over IP for Business Communications Built on an Intel Server Platform

Solution Recipe: Voice over IP for Business Communications Built on an Intel Server Platform Product Name Industry Business Subject Solution Recipe: Voice over IP for Business Communications Built on an Intel Server Platform Preface Intel has developed unique Solution Recipes that will enable

More information

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1 JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us

More information

Trusted Platform Module (TPM) Quick Reference Guide

Trusted Platform Module (TPM) Quick Reference Guide Trusted Platform Module (TPM) Quick Reference Guide System builders/integrators should give this Guide to the system owners to assist them in enabling and activating the Trusted Platform Module. Warning

More information

What Do You Mean My Cloud Data Isn t Secure?

What Do You Mean My Cloud Data Isn t Secure? Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there

More information

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Driving Company Security is Challenging. Centralized Management Makes it Simple. Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary

More information

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is

More information

Managing Security Risks in Modern IT Networks

Managing Security Risks in Modern IT Networks Managing Security Risks in Modern IT Networks White Paper Table of Contents Executive summary... 3 Introduction: networks under siege... 3 How great is the problem?... 3 Spyware: a growing issue... 3 Feeling

More information

How To Get A Client Side Virtualization Solution For Your Financial Services Business

How To Get A Client Side Virtualization Solution For Your Financial Services Business SOLUTION BRIEF Financial Services Industry 2nd Generation Intel Core i5 vpro and Core i7 vpro Processors Benefits of Client-Side Virtualization A Flexible, New Solution for Improving Manageability, Security,

More information

Zone Labs Integrity Smarter Enterprise Security

Zone Labs Integrity Smarter Enterprise Security Zone Labs Integrity Smarter Enterprise Security Every day: There are approximately 650 successful hacker attacks against enterprise and government locations. 1 Every year: Data security breaches at the

More information

IT@Intel. Virtualizing the Client PC: A Proof of Concept. White Paper Intel Information Technology Computer Manufacturing Client Virtualization

IT@Intel. Virtualizing the Client PC: A Proof of Concept. White Paper Intel Information Technology Computer Manufacturing Client Virtualization White Paper Intel Information Technology Computer Manufacturing Client Virtualization Virtualizing the Client PC: A Proof of Concept To determine whether virtualizing client PC operating systems could

More information

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions June 2013 Dirk Roziers Market Manager PC Client Services Intel Corporation

More information

Intel Embedded Virtualization Manager

Intel Embedded Virtualization Manager White Paper Kelvin Lum Fee Foon Kong Platform Application Engineer, ECG Penang Intel Corporation Kam Boon Hee (Thomas) Marketing Development Manager, ECG Penang Intel Corporation Intel Embedded Virtualization

More information

Building A Secure Microsoft Exchange Continuity Appliance

Building A Secure Microsoft Exchange Continuity Appliance Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

ACER ProShield. Table of Contents

ACER ProShield. Table of Contents ACER ProShield Table of Contents Revision History... 3 Legal Notices... 4 Executive Summary... 5 Introduction... 5 Protection against unauthorized access... 6 Why ACER ProShield... 7 ACER ProShield...

More information

Intel vpro Technology. How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration

Intel vpro Technology. How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration Intel vpro Technology How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration Document Release Date: September 14, 2012 Revision History Revision Revision History

More information

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Getting started Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Copyright 2003 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/03 Symantec and the Symantec

More information

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements

More information

Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide

Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide Symantec Endpoint Protection Small Business Edition Getting Started Guide The software described in this book is furnished

More information

Intel Active Management Technology Embedded Host-based Configuration in Intelligent Systems

Intel Active Management Technology Embedded Host-based Configuration in Intelligent Systems WHITE PAPER Intel vpro Technology Embedded Host-based Configuration in Intelligent Systems Easy activation of Intel vpro technology remote manageability without trade-offs in security, functionality, and

More information

McAfee epolicy Orchestrator * Deep Command *

McAfee epolicy Orchestrator * Deep Command * SOLUTION BLUEPRINT IT SECURITY MANAGEMENT McAfee epolicy Orchestrator * Deep Command * Industry IT security management across industries Business Challenge Comprehensive security management solution allowing

More information

Trusted Platform Module (TPM) Quick Reference Guide

Trusted Platform Module (TPM) Quick Reference Guide Trusted Platform Module (TPM) Quick Reference Guide System builders/integrators should pass this Guide on to the system owner to assist them in enabling and activating the TPM. Warning of Potential Data

More information

Endpoint Security Management

Endpoint Security Management Endpoint Security Management LANDESK SOLUTION BRIEF Protect against security threats, malicious attacks and configuration vulnerabilities through strong endpoint security control and maintenance. Protect

More information

Norton Personal Firewall for Macintosh

Norton Personal Firewall for Macintosh Norton Personal Firewall for Macintosh Evaluation Guide Firewall Protection for Client Computers Corporate firewalls, while providing an excellent level of security, are not always enough protection for

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding

More information

Symantec Endpoint Protection Getting Started Guide

Symantec Endpoint Protection Getting Started Guide Symantec Endpoint Protection Getting Started Guide 12167130 Symantec Endpoint Protection Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

Mobile Network Access Control

Mobile Network Access Control Mobile Network Access Control Extending Corporate Security Policies to Mobile Devices WHITE PAPER Executive Summary Network Access Control (NAC) systems protect corporate assets from threats posed by devices

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Intel vpro. Technology-based PCs SETUP & CONFIGURATION GUIDE FOR

Intel vpro. Technology-based PCs SETUP & CONFIGURATION GUIDE FOR SETUP & CONFIGURATION GUIDE FOR Intel vpro Technology-based PCs This Setup Guide details what makes a true Intel vpro technology-based PC, and how to set up and configure Intel AMT (Active Management Technology)

More information

Information Technology Solutions. Managed IT Services

Information Technology Solutions. Managed IT Services Managed IT Services System downtime, viruses, spyware, lost productivity; if these problems are impacting your business, it is time to make technology work for you. At ITS, we understand the importance

More information

Types of cyber-attacks. And how to prevent them

Types of cyber-attacks. And how to prevent them Types of cyber-attacks And how to prevent them Introduction Today s cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual

More information

Achieving PCI-Compliance through Cyberoam

Achieving PCI-Compliance through Cyberoam White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit

More information

Managing Wireless Clients with the Administrator Tool. Intel PROSet/Wireless Software 10.1

Managing Wireless Clients with the Administrator Tool. Intel PROSet/Wireless Software 10.1 Managing Wireless Clients with the Administrator Tool Intel PROSet/Wireless Software 10.1 This document is provided as is with no warranties whatsoever, including any warranty of merchantability, noninfringement

More information

How to Configure Symantec Protection Engine for Network Attached Storage for the Oracle ZFS Storage Appliance

How to Configure Symantec Protection Engine for Network Attached Storage for the Oracle ZFS Storage Appliance An Oracle Technical White Paper January 2014 How to Configure Symantec Protection Engine for Network Attached Storage for the Oracle ZFS Storage Appliance Table of Contents Introduction... 3 How VSCAN

More information

Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms

Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms Solution Brief Intel Xeon Processors Lanner Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms Internet usage continues to rapidly expand and evolve, and with it network

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,

More information

Total Defense Endpoint Premium r12

Total Defense Endpoint Premium r12 DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious

More information

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,

More information

White Paper. ZyWALL USG Trade-In Program

White Paper. ZyWALL USG Trade-In Program White Paper ZyWALL USG Trade-In Program Table of Contents Introduction... 1 The importance of comprehensive security appliances in today s world... 1 The advantages of the new generation of zyxel usg...

More information

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is

More information

Overcoming Security Challenges to Virtualize Internet-facing Applications

Overcoming Security Challenges to Virtualize Internet-facing Applications Intel IT IT Best Practices Cloud Security and Secure ization November 2011 Overcoming Security Challenges to ize Internet-facing Applications Executive Overview To enable virtualization of Internet-facing

More information

V1.4. Spambrella Email Continuity SaaS. August 2

V1.4. Spambrella Email Continuity SaaS. August 2 V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable

More information

SECURITY IN OPERATING SYSTEM VIRTUALISATION

SECURITY IN OPERATING SYSTEM VIRTUALISATION SECURITY IN OPERATING SYSTEM VIRTUALISATION February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in

More information

Factory-Installed, Standards-Based Hardware Security. Steven K. Sprague President & CEO, Wave Systems Corp.

Factory-Installed, Standards-Based Hardware Security. Steven K. Sprague President & CEO, Wave Systems Corp. Factory-Installed, Standards-Based Hardware Security Steven K. Sprague President & CEO, Wave Systems Corp. The challenge We are having a little problem with identity and data theft. It is time to reduce

More information

Best Practices in Deploying Anti-Malware for Best Performance

Best Practices in Deploying Anti-Malware for Best Performance The Essentials Series: Increasing Performance in Enterprise Anti-Malware Software Best Practices in Deploying Anti-Malware for Best Performance sponsored by by Eric Schmidt Be st Practices in Deploying

More information

WatchGuard Technologies, Inc. 505 Fifth Avenue South Suite 500, Seattle, WA 98104 www.watchguard.com

WatchGuard Technologies, Inc. 505 Fifth Avenue South Suite 500, Seattle, WA 98104 www.watchguard.com SMALL BUSINESS NETWORK SECURITY GUIDE WHY A REAL FIREWALL PROVIDES THE BEST NETWORK PROTECTION AUGUST 2004 SMALL BUSINESS NETWORK SECURITY GUIDE: WHY A REAL FIREWALL PROVIDES THE BEST NETWORK PROTECTION

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information

Hardware-Assisted Workspace Virtualization RingCube vdesk on Intel Core vpro Processors

Hardware-Assisted Workspace Virtualization RingCube vdesk on Intel Core vpro Processors Hardware-Assisted Workspace Virtualization RingCube vdesk on Intel Core vpro Processors About the Authors Dr. Charlton Barreto Platform Architect Intel Corporation Charlton Barreto is a member of Intel

More information

LANDesk White Paper. LANDesk Management Suite for Lenovo Secure Managed Client

LANDesk White Paper. LANDesk Management Suite for Lenovo Secure Managed Client LANDesk White Paper LANDesk Management Suite for Lenovo Secure Managed Client Introduction The Lenovo Secure Managed Client (SMC) leverages the speed of modern networks and the reliability of RAID-enabled

More information

How To Manage A System Vulnerability Management Program

How To Manage A System Vulnerability Management Program System Vulnerability Management Definitions White Paper October 12, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that allows

More information

An Oracle Technical White Paper January 2014. How to Configure the Trend Micro IWSA Virus Scanner for the Oracle ZFS Storage Appliance

An Oracle Technical White Paper January 2014. How to Configure the Trend Micro IWSA Virus Scanner for the Oracle ZFS Storage Appliance An Oracle Technical White Paper January 2014 How to Configure the Trend Micro IWSA Virus Scanner for the Oracle ZFS Storage Appliance Table of Contents Introduction... 2 How VSCAN Works... 3 Installing

More information

10 easy steps to secure your retail network

10 easy steps to secure your retail network 10 easy steps to secure your retail network Simple step-by-step IT solutions for small business in retail to leverage advanced protection technology in ways that are affordable, fast and easy October 2015

More information

Windows 7. Qing Liu Qing.Liu@chi.frb.org Michael Stevens Michael.Stevens@chi.frb.org

Windows 7. Qing Liu Qing.Liu@chi.frb.org Michael Stevens Michael.Stevens@chi.frb.org Windows 7 Qing Liu Qing.Liu@chi.frb.org Michael Stevens Michael.Stevens@chi.frb.org 1 Overview 1. Financial Institution s Preliminary Steps 2. User Interface 3. Data Protection 4. User and Group Changes

More information

Managed Service Plans

Managed Service Plans Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely

More information

System Security Policy Management: Advanced Audit Tasks

System Security Policy Management: Advanced Audit Tasks System Security Policy Management: Advanced Audit Tasks White Paper October 6, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that

More information

Intel Centrino 2 with vpro Technology and Intel Core 2 Processor with vpro Technology

Intel Centrino 2 with vpro Technology and Intel Core 2 Processor with vpro Technology White Paper Intel Centrino 2 with vpro Technology Intel Core 2 Processor with vpro Technology Intel Centrino 2 with vpro Technology and Intel Core 2 Processor with vpro Technology Remotely manage both

More information

Section 12 MUST BE COMPLETED BY: 4/22

Section 12 MUST BE COMPLETED BY: 4/22 Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege

More information

INSIDE. Securing Network-Attached Storage Protecting NAS from viruses, intrusions, and blended threats

INSIDE. Securing Network-Attached Storage Protecting NAS from viruses, intrusions, and blended threats Symantec Enterprise Security WHITE PAPER Securing Network-Attached Storage Protecting NAS from viruses, intrusions, and blended threats INSIDE Executive Summary Challenges to securing NAS An effective

More information

What is a Managed Service Provider (MSP)? What is the best solution for an MSP?

What is a Managed Service Provider (MSP)? What is the best solution for an MSP? Managed Service Providers An Introductory Overview Agenda Managed Services What is a Managed Service Provider (MSP)? Why become an MSP? How do you become an MSP? What is the best solution for an MSP? Where

More information

How To Get A New Computer For Your Business

How To Get A New Computer For Your Business Selling Security to SMBs with 4 th gen Intel Core Processors 1 After this Sales Training, You Will Learn: Where new opportunities lie in the small and medium business market segment Why IT security is

More information

CA Anti-Virus r8.1. Benefits. Overview. CA Advantage

CA Anti-Virus r8.1. Benefits. Overview. CA Advantage PRODUCT BRIEF: CA ANTI-VIRUS CA Anti-Virus r8.1 CA ANTI-VIRUS IS THE NEXT GENERATION IN COMPREHENSIVE ANTI-VIRUS SECURITY FOR BUSINESS PCS, SERVERS AND PDAS. IT COMBINES PROACTIVE PROTECTION AGAINST MALWARE

More information

Small and Midsize Business Protection Guide

Small and Midsize Business Protection Guide P r o t e c t i o n G u i d e : C l o s e t h e P r o t e c t i o n G a p Small and Midsize Business Protection Guide Close the protection gap and safeguard your business future Confidence in a connected

More information

AVeS Cloud Security powered by SYMANTEC TM

AVeS Cloud Security powered by SYMANTEC TM Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting

More information

INFORMATION PROTECTED

INFORMATION PROTECTED INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

Resolving the Top Three Patch Management Challenges

Resolving the Top Three Patch Management Challenges LANDesk Technical White Paper Resolving the Top Three Patch Management Challenges Technical White Paper Visit www.landesk.com for more information. To the maximum extent permitted under applicable law,

More information

Reference Architecture: Enterprise Security For The Cloud

Reference Architecture: Enterprise Security For The Cloud Reference Architecture: Enterprise Security For The Cloud A Rackspace Whitepaper Reference Architecture: Enterprise Security for the Cloud Cover Table of Contents 1. Introduction 2 2. Network and application

More information

New Value for Managed Service Providers: Extending Out of Band Remote Management to Servers

New Value for Managed Service Providers: Extending Out of Band Remote Management to Servers Use Case Study New Value for Managed Service Providers: Extending Out of Band Remote Management to Servers Version 1.0 February, 2010 Intel Active Management Technology Lenovo ThinkServer* TS200v Level

More information

Sygate Secure Enterprise and Alcatel

Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and

More information

Consensus Policy Resource Community. Lab Security Policy

Consensus Policy Resource Community. Lab Security Policy Lab Security Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY FACT: WORKSTATIONS AND SERVERS ARE STILL AT RISK CONVENTIONAL TOOLS NO LONGER MEASURE

More information

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE ebook Series 2 Headlines have been written, fines have been issued and companies around the world have been challenged to find the resources, time and capital

More information

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions SURVEY REPORT: cyber security Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions Confidence in a connected world. Executive summary An online survey revealed that while U.S.

More information

HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances

HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances Introduction............................................................ 2 What is Virtualization?....................................................2

More information

Symantec Mail Security for Microsoft Exchange

Symantec Mail Security for Microsoft Exchange Symantec Mail Security for Microsoft Exchange Getting Started Guide v7.0 Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license

More information

MaaS360 Mobile Service

MaaS360 Mobile Service Services > Overview MaaS360 Mobile Service Go Mobile! Everything for mobile work - visibility, control, easy mobile connectivity, management tools and security - all in one economical, hosted solution.

More information

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards

More information

Intel vpro Technology. How To Purchase and Install Go Daddy* Certificates for Intel AMT Remote Setup and Configuration

Intel vpro Technology. How To Purchase and Install Go Daddy* Certificates for Intel AMT Remote Setup and Configuration Intel vpro Technology How To Purchase and Install Go Daddy* Certificates for Intel AMT Remote Setup and Configuration Revision 1.4 March 10, 2015 Revision History Revision Revision History Date 1.0 First

More information

Intel Identity Protection Technology (IPT)

Intel Identity Protection Technology (IPT) Intel Identity Protection Technology (IPT) Enabling improved user-friendly strong authentication in VASCO's latest generation solutions June 2013 Steve Davies Solution Architect Intel Corporation 1 Copyright

More information

Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide

Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide Symantec Endpoint Protection Small Business Edition Installation and Administration Guide The software described

More information

SyAM Software* Server Monitor Local/Central* on a Microsoft* Windows* Operating System

SyAM Software* Server Monitor Local/Central* on a Microsoft* Windows* Operating System SyAM Software* Server Monitor Local/Central* on a Microsoft* Windows* Operating System with Internal Storage Focusing on IPMI Out of Band Management Recipe ID: 19SYAM190000000011-01 Contents Hardware Components...3

More information

DTR Business Systems, Inc. Rene Beltran

DTR Business Systems, Inc. Rene Beltran DTR Business Systems, Inc. Rene Beltran Established 1983 Provide on premise and off premise server based technology for Small Business users. Provide hardware, network and operating systems support for

More information

Next Gen Firewall and UTM Buyers Guide

Next Gen Firewall and UTM Buyers Guide Next Gen Firewall and UTM Buyers Guide Implementing and managing a network protected by point solutions is far from simple. But complete protection doesn t have to be complicated. This buyers guide explains

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

Database Security in Virtualization and Cloud Computing Environments

Database Security in Virtualization and Cloud Computing Environments White Paper Database Security in Virtualization and Cloud Computing Environments Three key technology challenges in protecting sensitive data Table of Contents Securing Information in Virtualization and

More information