Asset Discovery with Symantec Control Compliance Suite
|
|
|
- Barnaby Roberts
- 10 years ago
- Views:
Transcription
1 WHITE PAPER: ASSET DISCOVERY WITH SYMANTEC CONTROL COMPLIANCE SUITE Asset Discovery with Symantec Control Compliance Suite Who should read this paper IT Operations IT Security
2
3 Content Abstract Security Challenges in the Modern Data Center The Need for Fast, Continuous and Accurate Discovery of Assets What Makes Symantec s Asset Discovery Highly Efficient? Summary About Symantec Control Compliance Suite Appendix
4 Abstract Know Your Assets, Know Your Risk. A robust and easily managed host discovery schedule provides for continuous visibility of both authorized and unauthorized assets. Symantec Control Compliance Suite Standards Manager (Symantec CCS SM) features asset discovery, which rapidly discovers and inventories all networks and assets, including managed and unmanaged devices, and allows for network leak detection. This patented technology helps discover the assets quickly without impacting the network performance. Its seamless integration with other modules of Control Compliance Suite (CCS) helps offer a complete and comprehensive security assessment and compliance solution. Security Challenges in the Modern Data Center For IT security professionals today, the pace of change has accelerated dramatically. Trends such as virtualization, cloud computing, and the use of consumer mobile devices raise new security challenges every passing day. Gone are the days when IT departments could afford to take days and weeks in provisioning hardware and deploying applications. Today businesses need to be able to quickly respond to customer needs. The promise of elasticity in scaling up and down the infrastructure is underpinning the emergence of software defined data centers. As a result, Business Unit Owners want their application workloads provisioned and made available for production use in minutes and hours rather than days and weeks. While customers increasingly utilize public clouds (like AWS) and continue to build out their data centers into software-defined environments, they still need to maintain the security and compliance posture of their existing legacy virtual and physical environments. Basic security hygiene requires that customers have continuous visibility on their networks and assets, detect rogue and misconfigured assets, and correlate this with information about vulnerabilities and threats in the environment. The following developments also contribute to the complex data center security challenges customers face today, and underscore the need for fine-grained visibility into the assets and its security posture: The current Internet security threat landscape continues to evolve in both volume and complexity of attacks. The level of sophistication of new attacks is unprecedented. The market for intellectual property and access to critical infrastructure, as well as personally identifiable information (PII) and payment card industry (PCI) credentials, is well established. The new virtual, cloud and mobile technology platforms force IT to carefully balance enhanced agility, potential ROI, and manageable risk. The proliferation of virtual machines creates a new problem for IT how to ensure that every instance is compliant with security policies, controls, and regulations. Virtualization adds a whole new layer of infrastructure for the assignment of software patches and updates, security configuration standards, technical controls, user permissions, exceptions, and audit requirements. The Need for Fast, Continuous and Accurate Discovery of Assets With the proliferation of virtualization, it is common for employees to spin off new applications using homegrown virtual machines. Open source applications, wikis, and databases spring up on new virtual machines and IT, more often than not, is caught off-guard. Since these applications are under the radar, these virtual machines are not included in normal patch cycles and protection updates and therefore vulnerable to attack. This problem of under the radar IT systems is not limited to virtual environments. There are many occasions where network administrators get surprised after running discovery tools to identify even subnets that are unknown to them. 1
5 In these scenarios, an effective asset discovery process always forms the first critical steps towards managing security risk and compliance. An effective asset discovery process must exhibit the following characteristics: Comprehensive Asset discovery cannot rely on the existing inventory or scans of only known networks, but must also discover rogue and unmanaged assets. Non-Intrusive Asset discovery must be agent-less in order to run continuously without impacting the network and applications. Fast t and Accurate Asset discovery must be incorporated as a continuous process, which requires speed. The solution should also provide the highest accuracy possible. Flexible IT Admins should be able to schedule the discovery scans the way they want, based on geographies, networks, scan time, etc. Integrated Asset discovery must be capable of integrating with downstream activities such as Vulnerability, Configuration, and Policy management. What Makes Symantec s Asset Discovery Highly Efficient? Knowing your network, and what assets are connected to the network, is essential to identify, prioritize, and mitigate security risks. The Asset Discovery feature in Control Compliance Suite Standards Manager performs a network-based network and asset inventory via high-speed unauthenticated agent-less network scans, delivering the data to the Control Compliance Suite asset system for automatic asset classification and categorization. 2
6 Patented Approach that is Light on Resource Consumption and Quick In Discovery Symantec uses its patented approach, which optimizes the utilization of network connections. It offers many advantages, such as: Parallel communications, resulting in the virtual elimination of time wasted in waiting for replies when communicating with multiple computers. Less memory consumption through the elimination of a separate process for each session. Less processor utilization through the elimination of a separate process for each session. Reduction of port consumption from many to one, resulting in more available resources. Cover All the Bases Using the discovery capabilities in CCS, users can get an entire view of their data center deployment across their entire stack. Network Discovery The Network Discovery capability enables the discovery of all the subnets in the data center. This helps identify all the hidden subnets with the data center. 3
7 Asset Discovery Once the subnets are discovered, CCS helps in discovering all the hosts / endpoints within each of these subnets. Using the light speed technology, the discovery of hosts is fast and lightweight on the network. One can scan a Class C subnet in a little over 10 seconds. Unified View CCS provides capabilities to tie this data to other data sources like Symantec s DLP, Symantec Data Center Security:Server Advanced (formerly branded as Critical Systems Protection), and Symantec Endpoint Protection (SEP), as well as third party data from NESSUS, Red SEAL, etc. to give a complete operational risk posture within your environment. Integrated Solution that Assesses Configuration Risk and Security Compliance of Discovered Assets CCS automatically identifies and catalogues global networks, hosts, and operating systems. These discovered assets are then added to the extremely feature-rich Asset System of CCS. The integrated modules of CCS then take over from there and offer comprehensive Security Compliance Monitoring and Risk Assessment on the discovered assets. Highly Scalable, Customizable & Distributed Architecture Today s IT environments are highly distributed across multiple sites and geographies. CCS has been architected by keeping in mind the large scale and complex deployment scenarios. CCS scales up easily to more networks as they are discovered. CCS offers a very flexible way to discover assets. You can schedule the asset discovery operations by network, business assets, or time. To give complete control to the administrator over the discovery process, CCS includes network/subnet blacklisting & bandwidth throttling ability. It also provides full-featured role-based access control support. Summary IT Security Professionals today face daunting security challenges due to rapidly changing IT environments and complexity of attacks. In these scenarios, effective asset discovery forms the first critical steps towards managing security risk and compliance. Symantec offers a highly scalable, integrated, and efficient solution for asset Discovery, which leverages its patented technology to make it the best-in-class offering. 4
8 About Symantec Control Compliance Suite Symantec Control Compliance Suite (CCS) is a modular, highly scalable, and comprehensive solution for automating security and compliance assessments across the physical and virtual data centers, and across public clouds. Each of the five Control Compliance Suite Modules is available independently or as part of a broader suite. The Control Compliance Suite Control Studio and Infrastructure combines evidence from the multiple modules as well as third party systems, and maps assets and evidence to control statements, standards, and policies and regulations to enable mandate-based reporting and risk assessments. Role-based, customizable Web-based dashboards, and reports enable the organization to measure risk and track the performance of its security and compliance programs. Workflow integration with remediation ticketing systems enable organizations to align security operations with compliance and risk management operations, prioritize risk mitigation and remediation activities, and optimize security and IT operations. Appendix Protocols Used The following protocols are used in the discovery process: 1. Transmission Control Protocol (TCP) 2. User Datagram Protocol (UDP) 3. Server Message Block (SMB) 4. Network Time Protocol (NTP) 5. Simple Network Management Protocol (SNMP) 6. NetBios Session Service (NBSS) Protocol 7. NMap (if installed on the system) 8. SinFP (OS fingerprinting) 9. DNS Lookup The following protocols are used in network discovery details: TCP and UDP port scan and Echo request Send TCP SYN, look for TCP SYN/ACK Send empty UDP, look for port unreachable Send ICMP ping, look for echo reply The following protocols are used in host discovery: TCP and UDP port scan and Echo request Send TCP SYN, look for TCP SYN/ACK Send empty UDP, look for port unreachable Send ICMP ping, look for echo reply DNS lookup 5
9 Performs DNS lookup UDP application scan NetBIOS name service name query SNMP get-request TCP application scan SMB Telnet HTTP HTTPS SSH FTP SMTP The following protocols are used in OS discovery: TCP and UDP port scan SMB UDP application scan NBSS NTP DNS SinFP The following are the ports used, with the respective protocols: 1,2,3 UDP 21 TCP/FTP 22 TCP/SSH 23 TCP/Telnet 25 TCP/SMTP 80 TCP/HTTP 135 TCP 137 UDP - used by the NETBIOS Name Service 161 SNMP 443 TCP/HTTPS 445 TCP/SMB 6
10
11 About Symantec Symantec Corporation (NASDAQ: SYMC) is an information protection expert that helps people, businesses, and governments seeking the freedom to unlock the opportunities technology brings anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company operating one of the largest global data intelligence networks, has provided leading security, backup, and availability solutions for where vital information is stored, accessed, and shared. The company's more than 20,000 employees reside in more than 50 countries. Ninety-nine percent of Fortune 500 companies are Symantec customers. In fiscal 2014, it recorded revenue of $6.7 billion. To learn more go to or connect with Symantec at: go.symantec.com/socialmedia. For specific country offices and contact numbers, please visit our website. Symantec World Headquarters 350 Ellis St. Mountain View, CA USA +1 (650) (800) Copyright 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 5/2015
Symantec Control Compliance Suite Standards Manager
Symantec Control Compliance Suite Standards Manager Automate Security Configuration Assessments. Discover Rogue Networks & Assets. Harden the Data Center. Data Sheet: Security Management Control Compliance
DATASHEET CONTROL COMPLIANCE SUITE VENDOR RISK MANAGER 11.1
DATASHEET CONTROL COMPLIANCE SUITE VENDOR RISK MANAGER 11.1 Continuously Assess, Monitor, & Secure Your Information Supply Chain and Data Center Data Sheet: Security Management Is your organization able
Cyber Security Services: Data Loss Prevention Monitoring Overview
WHITE PAPER: DLP MONITORING OVERVIEW........................................ Cyber Security Services: Data Loss Prevention Monitoring Overview Who should read this paper Customers who are interested in
SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5
SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5 Simplify continuous security monitoring for physical and virtual servers as well as private and public clouds. Data Sheet: Security Management Symantec
Achieving Business Agility Through An Agile Data Center
Achieving Business Agility Through An Agile Data Center Overview: Enable the Agile Data Center Business Agility Is Your End Goal In today s world, customers expect or even demand instant gratification
Host-based Protection for ATM's
SOLUTION BRIEF:........................................ Host-based Protection for ATM's Who should read this paper ATM manufacturers, system integrators and operators. Content Introduction...........................................................................................................
Symantec Endpoint Protection 12.1.6
Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly
SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5
SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5 Advanced protection and hardening for advanced threats. Data Sheet: Security Management Symantec Data Center Security: Server Advanced 6.5 Solution Overviewview
Symantec Messaging Gateway 10.6
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
Symantec Server Management Suite 7.6 powered by Altiris technology
Symantec Server Management Suite 7.6 powered by Altiris technology Standardized control for distributed, heterogeneous server environments Data Sheet: Endpoint Management Overviewview Symantec Server Management
How To Monitor Your Entire It Environment
Preparing for FISMA 2.0 and Continuous Monitoring Requirements Symantec's Continuous Monitoring Solution White Paper: Preparing for FISMA 2.0 and Continuous Monitoring Requirements Contents Introduction............................................................................................
How to Unlock Agility by Backing up to, from, and in the Cloud
WHITE PAPER: HOW TO UNLOCK AGILITY BY BACKING UP TO, FROM,....... AND.... IN.. THE.... CLOUD....................... How to Unlock Agility by Backing up to, from, and in the Cloud Who should read this paper
The Symantec Approach to Defeating Advanced Threats
WHITE PAPER: THE SYMANTEC APPROACH TO DEFEATING ADVANCED........... THREATS............................. The Symantec Approach to Defeating Advanced Threats Who should read this paper For security practioners
Symantec Enterprise Vault and Symantec Enterprise Vault.cloud
Symantec Enterprise Vault and Symantec Enterprise Vault.cloud Better store, manage, and discover business-critical information Solution Overview: Archiving Introduction The data explosion that has burdened
5 Must-Haves for an Enterprise Mobility Management (EMM) Solution
SOLUTION BRIEF: 5 MUST-HAVES FOR AN ENTERPRISE MOBILITY......... MANAGEMENT.............. (EMM)...... SOLUTION........... 5 Must-Haves for an Enterprise Mobility Management (EMM) Solution Who should read
Microsoft Office 365 Migrations with Symantec Enterprise Vault.cloud
WHITE PAPER: MICROSOFT OFFICE 365 MIGRATIONS WITH SYMANTEC........... ENTERPRISE........... VAULT.CLOUD.................. Microsoft Office 365 Migrations with Symantec Enterprise Vault.cloud Who should
Backup Exec 2014: Protecting Microsoft SharePoint
TECHNICAL BRIEF: BACKUP EXEC 2014: PROTECTING MICROSOFT SHAREPOINT........................................ Backup Exec 2014: Protecting Microsoft SharePoint Who should read this paper Technical White Papers
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks
IPsonar provides visibility into every IP asset, host, node, and connection on the network, performing an active probe and mapping everything that's on the network, resulting in a comprehensive view of
Symantec Client Management Suite 8.0
IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,
Symantec Cyber Security Services: DeepSight Intelligence
Symantec Cyber Security Services: DeepSight Intelligence Actionable intelligence to get ahead of emerging threats Overview: Security Intelligence Companies face a rapidly evolving threat environment with
Symantec Control Compliance Suite. Overview
Symantec Control Compliance Suite Overview Addressing IT Risk and Compliance Challenges Only 1 in 8 best performing organizations feel their Information Security teams can effectively influence business
SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION
SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION Frequently Asked Questions WHAT IS SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION 1? Symantec Endpoint Protection Small Business Edition is built
Backup Exec 15: Protecting Microsoft SQL
TECHNICAL BRIEF: BACKUP EXEC 15: PROTECTING MICROSOFT SQL........................................ Backup Exec 15: Protecting Microsoft SQL Who should read this paper Technical White Papers are designed
Keeping GE Healthcare Universal Viewer Highly Available with Symantec ApplicationHA
Keeping GE Healthcare Universal Viewer Highly Available with Symantec ApplicationHA Solution Overview: High Availability Introduction Providing high availability to clinical applications like GE Universal
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Confidently Virtualize Business-critical Applications in Microsoft Hyper-V with Symantec ApplicationHA
WHITE PAPER: VIRTUALIZE BUSINESS-CRITICAL APPLICATIONS.............. WITH..... CONFIDENCE..................... Confidently Virtualize Business-critical Applications in Microsoft Hyper-V with Symantec ApplicationHA
The Impact of HIPAA and HITECH
The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients
Simplify Your Windows Server Migration
SOLUTION BRIEF: ENDPOINT MANAGEMENT........................................ Simplify Your Windows Server Migration Who should read this paper Windows Server 2003 customers looking to migrate to the latest
Backup Exec 2014: Protecting Microsoft SQL
TECHNICAL BRIEF: BACKUP EXEC 2014: PROTECTING MICROSOFT SQL........................................ Backup Exec 2014: Protecting Microsoft SQL Who should read this paper Technical White Papers are designed
Symantec Enterprise Vault for Microsoft Exchange Server
Symantec Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving performance and users can enjoy
Symantec RuleSpace Data Sheet
OEM URL Categorization Database and Real-time Web Categorization Technology Data Sheet: Security Intelligence OVERVIEW A major challenge today is ensuring a safe web environment for users and companies
Partner Technical Support Benefits Quick Guide
PARTNER BRIEF: TECHNICAL SUPPORT BENEFITS........................................ Symantec Secure One Partner Technical Support Benefits Who should read this paper Symantec Partners supporting end user
#ITtrends #ITTRENDS SYMANTEC VISION 2012 1
#ITtrends 1 Strategies for Security and Management in a Mobile and Virtual World Anil Chakravarthy Senior Vice President, Enterprise Security Group 2 MASSIVE INCREASE IN SOPHISTICATED ATTACKS 403 million
White Paper: Consensus Audit Guidelines and Symantec RAS
Addressing the Consensus Audit Guidelines (CAG) with the Symantec Risk Automation Suite (RAS) White Paper: Consensus Audit Guidelines and Symantec RAS Addressing the Consensus Audit Guidelines (CAG) with
Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape
WHITE PAPER: SYMANTEC GLOBAL INTELLIGENCE NETWORK 2.0.... ARCHITECTURE.................................... Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Who
Realizing the True Potential of Software-Defined Storage
Realizing the True Potential of Software-Defined Storage Who should read this paper Technology leaders, architects, and application owners who are looking at transforming their organization s storage infrastructure
Confidence in the Cloud Five Ways to Capitalize with Symantec
Five Ways to Capitalize with Symantec Solution Brief: Confidence in the Cloud Confidence in the Cloud Contents Overview...............................................................................................
Backup Exec 15: Protecting Microsoft Hyper-V
TECHNICAL BRIEF: BACKUP EXEC 15: PROTECTING MICROSOFT HYPER-V........................................ Backup Exec 15: Protecting Microsoft Hyper-V Who should read this paper Technical White Papers are
The Modern Service Desk: How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver Business Confidence
How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver White Paper: BEST PRACTICES The Modern Service Desk: Contents Introduction............................................................................................
Capstone Compliance Using Symantec Archiving and ediscovery Solutions
WHITE PAPER: CAPSTONE COMPLIANCE........................................ Capstone Compliance Using Symantec Archiving and ediscovery Solutions Who should read this paper IT decision-makers, architects,
Symantec Advanced Threat Protection: Network
Symantec Advanced Threat Protection: Network Data Sheet: Advanced Threat Protection The Problem Today s advanced attacks hide themselves on legitimate websites, leverage new and unknown vulnerabilities,
Kaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
Symantec Mobile Security
Advanced threat protection for mobile devices Data Sheet: Endpoint Management and Mobility Overview The combination of uncurated app stores, platform openness, and sizeable marketshare, make the Android
Delivering Performance and Value through Multiple Deduplication Pools
SOLUTION BRIEF: SYMANTEC NETBACKUP........................................ Delivering Performance and Value through Multiple Deduplication Pools Who should read this paper - Directors of IT and IT Managers
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 Gordon MacKay Digital Defense, Inc. Chris Wysopal Veracode Session ID: Session Classification: ASEC-W25 Intermediate AGENDA Risk Management Challenges
Backup Exec 15: Deduplication Option
TECHNICAL BRIEF: BACKUP EXEC 15: DEDUPLICATION OPTION........................................ Backup Exec 15: Deduplication Option Who should read this paper Technical White Papers are designed to introduce
Symantec Messaging Gateway 10.5
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
Top 5 Reasons to Choose User-Friendly Strong Authentication
SOLUTION BRIEF: USER-FRIENDLY STRONG AUTHENTICATION........................................ Top 5 Reasons to Choose User-Friendly Strong Authentication Who should read this paper This executive brief asserts
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments
Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments Introduction Server virtualization and private cloud services offer compelling benefits, including hardware consolidation,
Symantec Client Management Suite 7.6 powered by Altiris technology
Symantec Client Management Suite 7.6 powered by Altiris technology IT flexibility. User freedom. Data Sheet: Endpoint Management Overview With so many new devices coming into the workplace and users often
Securing Mobile App Data - Comparing Containers and App Wrappers
WHITE PAPER: SECURING MOBILE APP DATA - COMPARING CONTAINERS............ AND..... APP... WRAPPERS.................... Securing Mobile App Data - Comparing Containers and App Wrappers Who should read this
8 Key Requirements of an IT Governance, Risk and Compliance Solution
8 Key Requirements of an IT Governance, Risk and Compliance Solution White Paper: IT Compliance 8 Key Requirements of an IT Governance, Risk and Compliance Solution Contents Introduction............................................................................................
IT Security & Compliance. On Time. On Budget. On Demand.
IT Security & Compliance On Time. On Budget. On Demand. IT Security & Compliance Delivered as a Service For businesses today, managing IT security risk and meeting compliance requirements is paramount
Taking the Leap to Virtualization
WHITE PAPER: TAKING THE LEAP TO VIRTUALIZATION........................................ Taking the Leap to Virtualization Who should read this paper Midsized Business IT Directors, IT Managers and IT Administration
INFORMATION PROTECTED
INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never
Finding Email Security in the Cloud
WHITE PAPER: FINDING EMAIL SECURITY IN THE CLOUD Finding Email Security in the Cloud CONTENTS Introduction 3 I. Why Good Enough Security is Never Good Enough 3 Mind your security gaps 4 II. Symantec Email
Symantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
Intro to QualysGuard IT Risk & Asset Management. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe
Intro to QualysGuard IT Risk & Asset Management Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe A Unified and Continuous View of ICT Security, Risks and Compliance
IT Security at the Speed of Business: Security Provisioning with Symantec Data Center Security
IT Security at the Speed of Business: Security Provisioning with Symantec Data Center Security Today s data centers are transitioning into software-defined data centers (SDDC). In the SDDC, the core elements
White Paper. Time for Integrated vs. Bolted-on IT Security. Cyphort Platform Architecture: Modular, Open and Flexible
White Paper Time for Integrated vs. Bolted-on IT Security Cyphort Platform Architecture: Modular, Open and Flexible Overview This paper discusses prevalent market approaches to designing and architecting
Virtualization Essentials
Virtualization Essentials Table of Contents Introduction What is Virtualization?.... 3 How Does Virtualization Work?... 4 Chapter 1 Delivering Real Business Benefits.... 5 Reduced Complexity....5 Dramatically
IBM Proventia Network Enterprise Scanner
Protecting corporate data with preemptive risk identification IBM Proventia Network Enterprise Scanner Identifying risk and prioritizing protection IBM Proventia Network Enterprise Scanner * (Enterprise
Backup Exec 2014: Deduplication Option
TECHNICAL BRIEF: BACKUP EXEC 2014: DEDUPLICATION OPTION........................................ Backup Exec 2014: Deduplication Option Who should read this paper Technical White Papers are designed to
Leveraging a Maturity Model to Achieve Proactive Compliance
Leveraging a Maturity Model to Achieve Proactive Compliance White Paper: Proactive Compliance Leveraging a Maturity Model to Achieve Proactive Compliance Contents Introduction............................................................................................
locuz.com Professional Services Security Audit Services
locuz.com Professional Services Security Audit Services Today s Security Landscape Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System layer.
Total Protection for Compliance: Unified IT Policy Auditing
Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.
Delivering a New Level of Data Protection Resiliency with Appliances
SOLUTION BRIEF: SYMANTEC NETBACKUP........................................ Delivering a New Level of Data Protection Resiliency with Appliances Who should read this paper - Directors of IT and IT Managers
Symantec Endpoint Protection 12.1.5 Datasheet
Symantec Endpoint Protection 12.1.5 Datasheet Data Sheet: Endpoint Security Overview Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
White Paper. Enhancing Website Security with Algorithm Agility
ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today
Detection of illegal gateways in protected networks
Detection of illegal gateways in protected networks Risto Vaarandi and Kārlis Podiņš Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia [email protected] 1. Introduction In this
Leveraging Symantec CIC and A10 Thunder ADC to Simplify Certificate Management
Leveraging Symantec CIC and A10 Thunder ADC to Simplify Certificate Management Identify, Monitor and Manage All SSL Certificates Present Datasheet: Leveraging Symantec CIC and A10 Thunder ADC The information
Managing SSL Certificates with Ease
WHITE PAPER: MANAGING SSL CERTIFICATES WITH EASE White Paper Managing SSL Certificates with Ease Best Practices for Maintaining the Security of Sensitive Enterprise Transactions Managing SSL Certificates
Secure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
Network Access Control in Virtual Environments. Technical Note
Contents Security Considerations in.... 3 Addressing Virtualization Security Challenges using NAC and Endpoint Compliance... 3 Visibility and Profiling of VMs.... 4 Identification of Rogue or Unapproved
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Simplify security management in the cloud
Simplify security management in the cloud IBM Endpoint Manager and IBM SmartCloud offerings provide complete cloud protection Highlights Ensure security of new cloud services by employing scalable, optimized
Cloud Storage Backup for Storage as a Service with AT&T
WHITE PAPER: CLOUD STORAGE BACKUP FOR STORAGE AS A SERVICE........ WITH..... AT&T........................... Cloud Storage Backup for Storage as a Service with AT&T Who should read this paper Customers,
Symantec Endpoint Protection 12.1.4
Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec
Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE
Virtual Server and DDNS For BIPAC 741/743GE August, 2003 1 Port Number In TCP/IP and UDP networks, a port is a 16-bit number, used by the host-to-host protocol to identify to which application program
Symantec Workspace Virtualization 7.6
Simplifies application packaging and delivery, eliminates application conflicts, supports normal visibility Data Sheet: Endpoint Management Improve the control and management of your organization s endpoints
IBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
Symantec Asset Management Suite 8.0
Take control of your assets, ensure compliance, and uncover savings Data Sheet: Endpoint Management Are you paying for unused software licenses? Are you prepared for your next vendor software audit? Take
NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015
NEXPOSE ENTERPRISE METASPLOIT PRO Effective Vulnerability Management and validation March 2015 KEY SECURITY CHALLENGES Common Challenges Organizations Experience Key Security Challenges Visibility gaps
Simplify SSL Certificate Management Across the Enterprise
WHITE PAPER White Paper Simplify SSL Certificate Management Across the Enterprise Simplify SSL Certificate Management Across the Enterprise Contents introduction 1 A Platform for Single-Point Control and
Symantec Endpoint Protection 12.1.2
Data Sheet: Endpoint Security Overview offers comprehensive defense against complex attacks for both physical and virtual environments. It integrates ten essential security technologies in a single, high
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
Symantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment... 2. Adaptive Network Security...
WHITEPAPER Top 4 Network Security Challenges in Healthcare Addressing Them with Adaptive Network Security Executive Summary... 1 Top 4 Network Security Challenges Addressing Security Challenges with Adaptive
Demystifying Virtualization for Small Businesses Executive Brief
Demystifying Virtualization for Small Businesses White Paper: Demystifying Virtualization for Small Businesses Demystifying Virtualization for Small Businesses Contents Introduction............................................................................................
Medicaid MITA: Innovative COTS solutions for IT Risk Management
Medicaid MITA: Innovative COTS solutions for IT Risk Management White Paper: COTS Solutions for MITA 2.0 Medicaid MITA: Innovative COTS solutions for IT Risk Management Contents Introduction to MITA &
CA IT Client Manager Asset Inventory and Discovery
DATA SHEET: ASSET INVENTORY AND DISCOVERY CA IT Client Manager Asset Inventory and Discovery CA IT CLIENT MANAGER DELIVERS EXTENSIVE ASSET INVENTORY AND DISCOVERY CAPABILITIES THAT HELP YOU MAINTAIN ACCURATE
Bringing Continuous Security to the Global Enterprise
Bringing Continuous to the Global Enterprise Asset Discovery Network Web App Compliance Monitoring Threat Protection The Most Advanced Platform 3+ Billion IP Scans/Audits a Year 1+ Trillion Events The
Software-defined Storage Architecture for Analytics Computing
Software-defined Storage Architecture for Analytics Computing Arati Joshi Performance Engineering Colin Eldridge File System Engineering Carlos Carrero Product Management June 2015 Reference Architecture
