Free Forefront Protection? An investigation into hidden costs.
|
|
- Gwendolyn Barrett
- 8 years ago
- Views:
Transcription
1 Free Forefront Protection? An investigation into hidden costs. Richard Stiennon Chief Research Analyst IT-Harvest 2011 IT-Harvest 1
2 Free Forefront Protection? An investigation into hidden costs. Key Findings This white paper investigates Microsoft s recent updates to ecal pricing and changes to Forefront Security Suite in its Enterprise Client Access License (ECAL). Four primary arguments are presented to demonstrate that the total cost of ownership of Microsoft Forefront Security Suite is higher than using best of breed products from a third party vendor. 1. That there are additional investments in supporting Microsoft services that are not included in ECAL 2. That deployment, management and maintenance of ForeFront requires additional investment in Microsoft infrastructure 3. Microsoft s lack of protection for non-microsoft products means continued investment in security for Unix platforms and does not address the consumerization of IT. 4. Signature updates for Forefront requires Microsoft Software Assurance. Introduction Since it s acquisition of Whale and Antigen, Microsoft has been slowly enhancing the ForeFront Security Suite for endpoint protection and gateway filtering. It s most dramatic enhancement in 2011 was to incorporate endpoint protection management into the SCCMS console. Further enhancements to the management console are expected in the December, 2011 release. Microsoft s message to current customers with Enterprise Client Access Licenses (ecal) is that ForeFront Endpoint Protection is FREE. Is it truly free or are there hidden costs? This white paper evaluates that free claim by examining the additional costs associated with deploying ForeFront and abandoning third party anti-malware solutions. Direct costs include the additional licenses for server products, very high costs for support, and the hidden cost of Software Assurance licenses. We also look at the holes in Microsoft s protection strategy represented by the proliferation of devices (consumerization of IT), multiple OS platforms in most data centers, and the lack of cloud leverage for just-in-time protection. Microsoft has successfully leveraged its near monopoly in the enterprise desktop operating system and productivity tools to make deeper gains in the data center through its server offerings including: Windows Server, Forefront Threat Management Gateway 2010 Server, MSQL, Exchange, Certificate Server, and SharePoint Server. One aspect of computing infrastructures that can be decoupled from network, desktop and server platforms is security. Ironically, the argument has been well made that the very security 2011 IT-Harvest 2
3 problems plaguing most organizations - rapid spread of malware, targeted attacks, and driveby downloads from malicious web sites, is attributable to Microsoft s domination of so many computers worldwide. This mono-culture of computing platforms means that malware created to infect home users with Trojans meant to steal their banking credentials also infects enterprise desktops, servers, and infrastructure. In other words, in their quest to dominate as much of corporate computing budgets as possible, Microsoft has created a world wide security problem that entails investment, lost time, management, compliance and reporting requirements to control. Microsoft s Forefront product suite was acquired in an attempt to address these security issues and protect their dominant position in the enterprise. Enterprise Client Access Licensing Microsoft s Client Access License (CAL) is a blanket end user license agreement that is purchased on a per-server/per-end user basis. It is separate from desktop licensing for Windows, Office or other applications. The Core CAL agreement grants access to Windows Server 2008, Exchange Server 2010, Office SharePoint Server 2010 and Systems Center Configuration (formerly Systems Management Server). Access to additional services is available piecemeal, for either an ala carte pricing or bundled in the Enterprise CAL license (ECAL). These additional services are: Server CAL Core CAL Suite Enterprise CAL Suite Windows Server Exchange Server SharePoint Server Lync Server System Center Forefront Windows Server Standard Active Directory Rights Management Services Exchange server Standard Exchange Server Enterprise SharePoint Server Standard SharePoint Server Enterprise Lync Server Standard Lync Server Enterprise System Center Configuration Manager System Center Client Management Suite Forefront Protection Suite Forefront Endpoint Protection Forefront Unified Access Gateway 2011 IT-Harvest 3
4 These Enterprise additions to the Core CAL if purchased separately can cost $256.00/year (System Center Operations Manager Client OML is $32 per license for instance) but if purchased as an ECAL bundle cost $86 on top of the Core CAL pricing. Many Microsoft customers purchase the ECAL bundle to get the additional functionality of one or two services but do not use the full suite. Note that ECAL does not include MSQL or Terminal Services CAL, and that this would be an additional purchase if the customer is not currently licensed for these at a cost ranging from $ $187 per user license. This gives rise to the question: Should an enterprise that has the full ECAL licensing drop their use of a third party anti-virus product because the ECAL suite incorporates Forefront security? Enterprises considering this question should be aware that there are three reasons that using the marginally free Forefront security products entails additional costs. Sometimes free is not free. 1) Direct costs in additional Microsoft licensing requirements and support fees. The list pricing for Forefront Security Suite starts at $12.72 per user or device, per year, for the security agent Microsoft Forefront Endpoint Protection uses Microsoft System Center Configuration Manager (SCCM) which could require additional server acquisitions for most large enterprises. The management console is supposed to support up to 10,000 clients. A large installment would involve multiple licenses for the management consoles along with the costs associated with maintaining the additional Microsoft servers. Forefront Endpoint Protection uses Microsoft SQL Server 2005 (Standard Edition or Enterprise Edition) for detailed report and log generation. SQL Server 2005 Enterprise Edition is needed to support more than 2,000 clients and can be purchased with the Server Subscription License (SSL) for Forefront Security. Microsoft customers interviewed for our research reported that getting premium support for the Forefront security solutions to resolve issues on a timely basis required them to upgrade their support contract for all of the products bundled in ECAL, it could not be broken out separately. This could be extremely expensive as Microsoft s top level of support, Premier Mission Critical, can cost between $200K and $1 million based on the complexity of the deployment. Other levels of support; and Premier Plus, are available in hourly blocks whereas Premier Ultimate is a 24X7 service. A decision to switch to Forefront client and server security based on Microsoft claims that it is free should not be made until the support service costs have been accounted for as well as the server license costs for a large deployment. An anti-malware solution from a non- Microsoft source will have dedicated support options at lower total costs IT-Harvest 4
5 2) Hidden costs in expanding the Microsoft monoculture. Every business has to evaluate risks associated with vendor lock-in. Not only are there risks that the vendor could discontinue support for a particular offering but it also creates a cycle of increased lock-in as the vendor continues to offer more and more products inducing the customer to move to those new products, consolidate support contracts and billing, and ultimately lose the flexibility to choose optimal products or negotiate the best prices. In the particular case of buying security products from Microsoft some consideration is due the concept of diversification. Every Microsoft server product is a member of a community of end points that suffer from continuous cycles of attacks. Microsoft issues software fixes on a monthly schedule with emergency updates announced frequently outside that schedule. Not only do the desktops, web servers, file servers, communication servers, and data base servers have to be patched but the systems hosting the security products themselves have to be patched. This lends additional cost to the overall system maintenance task as well as introduces security issues because the security products are exposed to the same types of attacks that they are deployed to protect against. One IT security manager that we interviewed pointed out that Microsoft Forefront Security Suite had too many moving parts that required more resources to manage. Different skill sets and different people were involved in managing Forefront. Staff from security would handle the AV issues, a database specialist managed SQL Server, and another specialist was required for the server admin. Yet another group s services were required to administer WSUS on the Forefront Security Management server. Responsibility for managing a standalone security product resides with the AV team alone and is therefore less expensive. Note that Microsoft Forefront Client Security Management Console (FCSMC) is no longer needed as its function has been incorporated into SCCMS. However, Forefront Server Security Management Console (FSSMC) is still required to manage Forefront for Exchange, Forefront for SharePoint, and Microsoft Antigen, which entails more Windows servers with MSQL, and MOM instances. FSSMC is not included in ECAL. 3) Costs associated with not having a best of breed security solution. Microsoft has yet to demonstrate that Forefront Security is a best of breed product. While there may be a cost tradeoff between the best products and good enough, products in many areas, such as Certificate Servers, proxies, data base servers, and servers, that argument does not hold with security products where much of the value of those products resides in their ability to provide the best protection possible. For instance an anti-malware product that blocks 1% more malware than another provides more than 1% greater value. The additional costs of cleanup measured in lost productivity and direct IT support resources could be thousands of dollars a month for the typical midsize enterprise. A data breach 2011 IT-Harvest 5
6 resulting from a Trojan or Bot infection would lead to extraordinary costs from mandated disclosure and reparation requirements, damage to brand equity, and similar costs. According to the 5th Annual US Cost of a Data Breach Study from the Ponemon Institute the average cost of a data breach is over $6 million. The current best practices for malware defense is to leverage the cloud to reduce the time to detection from fi rst appearance of a new attack to when updated signatures are fully deployed. Trend Micro has consistently been the best performing malware solution by this measure. Microsoft ForeFront still relies on the old model of pushing new signatures to every endpoint and gateway. 4) ForeFront security is not a heterogeneous solution Many enterprises have multiple operating systems in their data centers, points of sale, or offi ces including fl avors of Unix from IBM and Sun(Oracle). If malware protection products are deployed to non-microsoft systems, such as Linux servers, or MacBooks, an enterprise has not eliminated the costs associated with maintaining licensing for those systems by going with the Free Forefront offer. Switching to Microsoft Forefront may not reduce the number of vendors or products an enterprise must manage. Microsoft world w/forefront protection BYOD IOS, OSX, Android, Blackberry Unix/Linux Servers Virtual data center and VDI One of the predominant trends in IT computing is the move to mobile devices. Executives and knowledge workers are introducing new devices to the enterprise at an uncontrolled rate. ipads, smart phones from Blackberry, Google, and Apple, predominate and will need additional management and security products to accommodate this consumerization of IT or Bring Your Own Device (BYOD) as it is being called. Much of the value derived from an enterprise class anti-malware product suite comes from its ability to analyze security incidents and create reports. In particular, generating data for compliance reports for government regulations and auditor requirements is not as mature in Microsoft Forefront as it is in established enterprise AV product suites that have been investing heavily in better and better reporting capabilities IT-Harvest 6
7 Software Assurance Licensing In 2005 Microsoft began offering Software Assurance. This extra licensing regime serves to protect customers from the unpredictable release cycle of major new versions of Microsoft products such as Office Productivity and Windows. Because the typical contract is for three years and Microsoft releases often exceed that, many customers opt out of Software Assurance. However, as of August 1, 2011 in order to get signature updates for ForeFront customers must have a paid up Software Assurance license. This could significantly add to the cost of using FEP. According to Forester a desktop Software Assurance License is 29% of the cost of the underlying software and for a server 25%. [14] Product use rights For Forefront Protection Suite are those in effect during the term of corresponding Enterprise CAL Suite Software Assurance coverage. A subscription to Forefront Protection Suite consists of the following online services: Forefront Endpoint Protection Forefront for Office Communications Server (formerly Antigen for Instant Messaging) Forefront Online Protection for Exchange (formerly Exchange Hosted Filtering) Forefront Protection 2010 for Exchange Server Forefront Threat Management Gateway Web Protection Service Forefront Protection 2010 for SharePoint Server In other words, a customer must enroll in Microsoft Software Assurance licensing to get the benefits from Forefront Protection Suite. It is an example of how Microsoft is using the immediacy and urgency of security updates to enhance their revenue stream IT-Harvest 7
8 Cost Model For this study we created two models to quantify the costs of switching to a Microsoft Forefront Security solution. The first is for an enterprise with a centrally managed Microsoft Exchange environment. The second is for a distributed enterprise with twenty locations around the world and a decentralized Microsoft Exchange environment. Model 1 Assumptions: 35,000 desktops with ECAL contracts 4 Forefront Server Security Management Consoles (Client security management is now through System Center Client Management Suite.) Customer already has Microsoft Software Assurance YEAR 1 YEAR 2 YEAR 3 3 YEAR TOTAL Additional staff to support components 156, , , ,750 Premium support for ECAL 240, , , ,000 Deployment 122, ,428 TOTAL COST $ 518,678 $396,250 $396,250 $1,311,178 Displaced vendor Premium Support savings 30,000 30,000 30,000 90,000 Displaced vendor license fees 210, , , ,000 TOTAL ADDITIONAL COSTS $ 278,678 $ 156,250 $ 156,250 $ 591,178 The costs associated with additional Microsoft server products to run ForeFront Security management consoles is not included because most enterprises would also use Microsoft servers to run competing products IT-Harvest 8
9 Model 2 Assumptions: Same as Model 1 but customer has to switch to Microsoft Software Assurance licensing ECAL purchased at 15% discount to $175 price YEAR 1 YEAR 2 YEAR 3 3 YEAR TOTAL Software Assurance premium (4%) 208, , , ,750 Additional staff to support components 156, , , ,750 Premium support for ECAL 240, , , ,000 Deployment 122, ,428 TOTAL COST $ 726,928 $ 604,500 $ 604,500 $ 1,935,928 Displaced vendor Premium Support savings 30,000 30,000 30,000 90,000 Displaced vendor license fees 210, , , ,000 TOTAL ADDITIONAL COSTS $ 486,928 $ 364,500 $ 364,500 $ 1,215,928 IT-Harvest estimates that a typical mid to large enterprise will face over $156K annual increases in the cost of providing anti-malware defense across the enterprise. And $364K in additional costs if the enterprise is forced to acquire Software Assurance licensing. This model does not take into account other drawbacks associated with Microsoft Forefront Suite such as lack of available training, poor reporting, costs assigned to increased risk due to the complicated relationship between Microsoft and the vendors that support Forefront s multiple AV engines and updates, or the increased costs of supporting (updating, patching, cleaning) additional Windows servers. It also does not include costs associated with potentially higher malware infection rates, which are hard to predict and may vary widely from customer to customer. Enterprises would do well to also factor in these and other potential costs when considering a move to Forefront IT-Harvest 9
10 Changes to Forefront in 2011 Forefront Client Security has been replaced by Forefront Endpoint Protection 2010 which is part of the Forefront Protection Suite ECAL. Forefront Endpoint Protection is now managed from Systems Center Configuration Manager (SCCM). This saves the costs associated with licensing and managing Forefront Client Management but Server Security Management Consoles will still be needed and organizations are required to upgrade from SMS (System Management Server) to SCCM to take advantage of the new architecture, an investment of $1,321 per server (including MSQL) and $430 for an enterprise Management License (ML.) Cost for core CAL has increased by 10% while ECAL pricing has remained the same. However the new components of ECAL as well as Forefront Protection cannot be enacted unless Software Assurance is purchased. Conclusion Microsoft Enterprise Client Access Licensing gives the enterprise the server and desktop protection products in the Forefront Security Suite, but additional Microsoft products, hardware and support must be purchased to manage Forefront today. Most organizations maintain servers and devices that are not from Microsoft. Abandoning a third party AV vendor completely will not be possible. Security should be treated as a separate layer in IT infrastructure. Basing malware defense on 100% Microsoft products decreases an enterprise s overall security posture because the management and control systems are subject to the same attacks that they are protecting against. The way Microsoft has made Software Assurance a requirement for signature updates to Forefront components is an abject example of the entanglement that can occur when enterprises single source a vendor. Enterprises should not switch to Microsoft Forefront Security Suite. Even though client and server licenses are included in the Enterprise Client Access License bundle, the additional costs could exceed $500,000 annually and the overall value delivered is less IT-Harvest 10
11 This white paper was produced with the sponsorship of Trend Micro. Its conclusions and opinions expressed are solely those of IT-Harvest and not necessarily those of our sponsors. References: 1. Microsoft CAL guide: 2. Dell Licensing Center CAL FAQ: s&cs=04&l=en&s=bsd&~page=5 3. Microsoft pricing for Forefront Client Security: 4. Microsoft Service Offering Plans: 5. Forefront Team blog: 6. System problems 7. Microsoft Premier Mission Critical Description: premier_mcs.mspx 8. New level of premium support 9. Microsoft Forefront TCO WhitePaper 9f38-7c40d /FCS%20TCO%20Whitepaper%20FINAL.docx 10. Miscrosoft Forefront Server Security Management Console Pricing US/ Planning and Deploying the Server Infrastructure for Configuration Manager en-us/library/bb aspx 12. Schedule and Strategy Update for Forefront Endpoint Protection. archive/2009/10/08/schedule-and-strategy-update-for-forefront-endpoint-protection.aspx Network World Magazine Microsoft customers sour on Software Assurance news/2007/ microsoft-customers-sour-on-software.html 15. Microsoft Premier Support page IT-Harvest 11
Business Value of Microsoft System Center 2012 Configuration Manager
Business Value of Microsoft System Center 2012 Configuration Manager Sponsored by: Microsoft Corporation Publish date: February 2013 Abstract: Microsoft System Center 2012 Configuration Manager ( Configuration
More informationChoosing an Email System for the Mid- Sized Business: A Comparison
Whitepaper November 2010 Choosing an Email System for the Mid- Sized Business: A Comparison A J.Gold Associates White Paper Selecting a full featured, cost effective and secure email solution to enable
More informationViewfinity Privilege Management Integration with Microsoft System Center Configuration Manager. By Dwain Kinghorn
4 0 0 T o t t e n P o n d R o a d W a l t h a m, M A 0 2 4 5 1 7 8 1. 8 1 0. 4 3 2 0 w w w. v i e w f i n i t y. c o m Viewfinity Privilege Management Integration with Microsoft System Center Configuration
More informationNessus and Mobile Device Scanning. November 7, 2014 (Revision 12)
Nessus and Mobile Device Scanning November 7, 2014 (Revision 12) Table of Contents Introduction... 3 Standards and Conventions... 3 Overview... 3 Scanning for Mobile Devices with Nessus... 4 Creating a
More informationExecutive Brief on Enterprise Next-Generation Firewalls
Executive Brief on Enterprise Next-Generation Firewalls How security technology can reduce costs, improve compliance and increase employee productivity Enterprise Next-Generation Firewalls protect businesses
More informationHow To Protect Your Network From Threats From Your Network (For A Mobile) And From Your Customers (For An Enterprise)
Plugging the Holes in Mobile Security: The Rising Threat Jennifer M. Pigg, VP of Research, Yankee Group Nick Wade, Group Product Manager, Symantec June 2011 Copyright 2011. Yankee Group Research, Inc.
More informationOVERVIEW. Enterprise Security Solutions
Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s
More informationVirtual Patching: a Proven Cost Savings Strategy
Virtual Patching: a Proven Cost Savings Strategy An Ogren Group Special Report December 2011 Executive Summary Security executives, pushing the limits of traditional labor-intensive IT patch processes
More informationSECURE YOUR BUSINESS WHEREVER IT TAKES YOU. Protection Service for Business
SECURE YOUR BUSINESS WHEREVER IT TAKES YOU Protection Service for Business IT S A MOBILE WORLD Wifi Today, we use more devices over more connections than ever before. Choosing when, where and how to work
More informationSymantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
More informationKaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
More informationEnabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments Efficiently and Cost- Effectively Managing Mobility Risks in the Age of IT Consumerization Table of Contents EXECUTIVE
More informationINNOVATION & SUPPORT CENTER
INNOVATION & SUPPORT CENTER About the Center The Innovation and Support Center is managed by highly trained and qualified professional Omanis; not only to keep pace with global development in the provision
More informationReducing the cost and complexity of endpoint management
IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and
More informationSecure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
More informationSECURING TODAY S MOBILE WORKFORCE
WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table
More informationITSM & Enterprise Mobility Management
ITSM & Enterprise Mobility Management Jason Lunghusen Introduction 1. Context - Client Computing 2012-2014 2. Context - ITS Our Service Management Maturity 3. You now own mobile telephony 4. What does
More informationWHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
More informationAgenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details
Agenda Enterprise challenges Hybrid identity Mobile device management Data protection Offering details 2 The time to address enterprise mobility is now 29% of today s global workforce use 3+ devices, work
More informationSA Series SSL VPN Virtual Appliances
SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by
More informationMicrosoft licensing for the Consumerization of IT
Volume Licensing brief Microsoft licensing for the Consumerization of IT Table of Contents This brief applies to all Microsoft Volume Licensing programs. Summary... 1 What s New in this Brief?... 1 Introduction...
More information1 System Center 2012 Licensing Changes In Plain English
1 System Center 2012 Licensing Changes In Plain English System Center 2012 Licensing Changes In Plain English Revision 1 5/30/2012 Windows Server and System Center portions applicable to all licensing
More informationTHREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS
THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS Learn more about Symantec security here OVERVIEW Data and communication protection isn t a problem limited to large enterprises. Small and
More informationINTRODUCING isheriff CLOUD SECURITY
INTRODUCING isheriff CLOUD SECURITY isheriff s cloud-based, multi-layered, threat protection service is the simplest and most cost effective way to protect your organization s data and devices from cyber-threats.
More informationComprehensive Resource for Licensing and Pricing
1 Comprehensive Resource for Licensing and Pricing Windows Server, System Center, and Forefront Licensing Guide Table of Contents What s New in This Guide 2 Windows Server 2008 R2 Offerings 2 Windows Server
More informationIntelligent End User Compute Strategy. Ted Smith Nigel Brown
Intelligent End User Compute Strategy Ted Smith Nigel Brown Introduction Microserve Technical Service Managed Services Professional Services BCNet provider of Desktops, notebooks, tablets, displays, print
More informationSOFTWARE LICENSING ADVISORS
SOFTWARE LICENSING ADVISORS SOFTWARE LICENSING ADVISORS LICENSING BRIEF LICENSING BRIEF WINDOWS SERVER EXTERNAL ACCESS AND AUTHENTICATION Changes in Windows Server 2012 permit External Users to access
More informationConvergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager
Convergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager Contents INTRODUCTION: UNDERSTANDING HOW ALIGNING DESKTOP SECURITY AND
More informationThe Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know
The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,
More informationMy CEO wants an ipad now what? Mobile Security for the Enterprise
My CEO wants an ipad now what? Mobile Security for the Enterprise Agenda Introductions Emerging Mobile Trends Mobile Risk Landscape Response Framework Closing Thoughts 2 Introductions Amandeep Lamba Manager
More informationBuilding a Business Case:
Building a Business Case: Cloud-Based Security for Small and Medium-Size Businesses table of contents + Key Business Drivers... 3... 4... 6 A TechTarget White Paper brought to you by Investing in IT security
More informationNext Generation IPS and Reputation Services
Next Generation IPS and Reputation Services Richard Stiennon Chief Research Analyst IT-Harvest 2011 IT-Harvest 1 IPS and Reputation Services REPUTATION IS REQUIRED FOR EFFECTIVE IPS Reputation has become
More informationStatement of Work Office 365 Migration. Gateway Unified School District
May 07, 2013 Statement of Work Office 365 Migration Gateway Unified School District Prepared by: Nicholas Vossburg Prepared for: Scott Sorrells Statement
More informationNetwork Access Protection (NAP)
Executive Summary Management and consistent availability of servers and endpoints in a business means higher productivity. Period. When employees no longer have to be concerned with the availability of
More information70-671. Designing and Providing Microsoft Volume Licensing Solutions to. Small and Medium Organizations Exam. http://www.examskey.com/70-671.
Microsoft 70-671 Designing and Providing Microsoft Volume Licensing Solutions to Small and Medium Organizations Exam TYPE: DEMO http://www.examskey.com/70-671.html Examskey Microsoft70-671 exam demo product
More informationSophos Endpoint Security and Control on-premise installation best practice guide. Endpoint Security and Control 10 Enterprise Console 5
Sophos Endpoint Security and Control on-premise installation best practice guide Endpoint Security and Control 10 Enterprise Console 5 Document date: May 2014 Contents 1 About this guide...3 2 What software
More informationDeep Security Vulnerability Protection Summary
Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security
More informationIT Agility that Drives Business Forward
IT Agility that Drives Business Forward Richard Stiennon Chief Research Analyst Introduction There are six factors that drive the ever changing information technology space: Growth in Users Bandwidth Processing
More informationSTRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
More informationKaspersky Security for Business
Kaspersky Security for Business Licensing Program Renewals and Upgrades: A Migration Guide Introducing Kaspersky s Security for Business software licensing program. Table 1: Renew and Upgrade to Increased
More informationKASPERSKY SECURITY FOR BUSINESS
KASPERSKY SECURITY FOR BUSINESS Licensing Program RENEWALS AND UPGRADES: A Migration Guide INTRODUCING KASPERSKY S SECURITY FOR BUSINESS SOFTWARE LICENSING PROGRAM. Kaspersky s latest endpoint release
More informationIntroducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com
Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com 1 Business drivers and their impact on IT AGILITY! Move fast, be nimble
More informationWhere are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players
The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,
More informationSANS Mobility/BYOD Security Survey
Sponsored by Bradford Networks, MobileIron, and HP Enterprise Security Products SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey
More informationJuly 2015. Bytes are an Award Winning Microsoft Partner
July Bytes are an Award Winning Microsoft Partner Licensing changes Windows, MDOP, ECS and EMS 2 Licensing changes Bridge CAL, System Center, Azure 3 Licensing changes How to benefit your organisation
More informationIT Cost Reduction Strategies Report: Managed Environments and Virtual Desktops
IT Cost Reduction Strategies Report: Managed Environments and Virtual Desktops Background: In April, V.C. Marc Hoit requested an investigation of potential savings across campus from the use of managed
More informationTotal Defense Endpoint Premium r12
DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious
More informationCloud-Client Enterprise Security Impact Report Increased Protection at a Lower Cost
y Cloud-Client Enterprise Security Impact Report Increased Protection at a Lower Cost An Osterman Research White Paper Published January 2009 SPONSORED BY onsored by Phone: +1 877-21-TREND www.trendmicro.com/go/smartprotection
More informationBEST PRACTICES IN BYOD
1 BEST PRACTICES IN BYOD How Smart Enterprises Are Making It Work Whitepaper Whitepaper 2 In a recent report, research firm Ovum concludes that: It is clear that when it comes to planning and implementing
More informationUnified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
More informationBIGFIX. Free Software Is Not Free: A Quantitative TCO Analysis. Executive Summary
Free Software Is Not Free: A Quantitative TCO Analysis Executive Summary A famous catch phrase coined during the Great Depression of the 1920s and 1930s was There Ain t No Such Thing as a Free Lunch. The
More informationTCO for Application Servers: Comparing Linux with Windows and Solaris
TCO for Application Servers: Comparing Linux with Windows and Solaris Robert Frances Group August 2005 IBM sponsored this study and analysis. This document exclusively reflects the analysis and opinions
More informationEndpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
More informationNew possibilities in latest OfficeScan and OfficeScan plug-in architecture
New possibilities in latest OfficeScan and OfficeScan plug-in architecture Märt Erik AS Stallion Agenda New in OfficeScan 10.5 OfficeScan plug-ins» More Active Directory support» New automated client grouping
More informationTop 10 Reasons Enterprises are Moving Security to the Cloud
ZSCALER EBOOK Top 10 Reasons Enterprises are Moving Security to the Cloud A better approach to security Albert Einstein defined insanity as doing the same thing over and over again and expecting different
More informationGOOGLE APPS & MICROSOFT EXCHANGE SERVER 2007 TOTAL COST OF OWNERSHIP ANALYSIS
GOOGLE APPS & MICROSOFT EXCHANGE SERVER 2007 TOTAL COST OF OWNERSHIP ANALYSIS Sara Radicati, Ph.D. Principal Analyst THE RADICATI GROUP, INC. 595 Lytton Avenue Palo Alto, CA 94301 Tel: 650-322-8059 Fax:
More informationHow To Protect A Virtual Desktop From Attack
Endpoint Security: Become Aware of Virtual Desktop Infrastructures! An Ogren Group Special Report May 2011 Executive Summary Virtual desktops infrastructures, VDI, present IT with the unique opportunity
More informationEndpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
More informationWhat Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
More informationSeven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS
Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS Traditionally, IT risk management has balanced security investment and the impact of the threat, allowing each business
More informationSystem Center 2012 Suite SYSTEM CENTER 2012 SUITE. BSD BİLGİSAYAR Adana
2013 System Center 2012 Suite SYSTEM CENTER 2012 SUITE BSD BİLGİSAYAR Adana Configure and manage apps, services, computers, and VMs... 1 Operations Manager... 3 Configuration Manager... 4 Endpoint Protection...
More informationMonthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month
SERVICE COVERAGE AND FEE SCHEDULE Base Package Fees Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month Live Desk Services Live Desk Telephone
More informationDeploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite
WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents
More informationDatacenter Management Optimization with Microsoft System Center
Datacenter Management Optimization with Microsoft System Center Disclaimer and Copyright Notice The information contained in this document represents the current view of Microsoft Corporation on the issues
More informationThe Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
More informationTOP 3. Reasons to Give Insiders a Unified Identity
TOP 3 Reasons to Give Insiders a Unified Identity Although much publicity around computer security points to hackers and other outside attacks, insider threats can be particularly insidious and dangerous,
More informationTivoli Endpoint Manager. Increasing the Business Value of IT, One Endpoint at a Time
1 Tivoli Endpoint Manager Increasing the Business Value of IT, One Endpoint at a Time Endpoint Management Cost Today s Endpoint Management Challenges Drive IT Costs Up More than 50% of end users change
More informationTechnology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
More informationEasily integrate Mac into Microsoft System Center
Master your Macs in the Business Easily integrate Mac into Microsoft System Center Sascha Uhl Business Development Manager suhl@parallels.com Leader in Cloud Services Enablement and Desktop Virtualization
More informationVirtual Patching: a Compelling Cost Savings Strategy
Virtual Patching: a Compelling Cost Savings Strategy An Ogren Group Special Report November 2010 Executive Summary IT patch processes are at a critical crossroads. Exploits appear in the wild only a day
More informationAn Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
More informationBYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy
More informationLicensing Guide. Published: March 2013
Licensing Guide Published: March 2013 Disclaimer: The Lync 2013 Licensing Guide is provided to customers and partners to assist in understanding the options for acquiring Lync Server 2013, Lync client
More informationIBM MobileFirst Managed Mobility
Enterprise Mobility IBM MobileFirst Managed Mobility Service Profile 1 The service 2Service components 3Transition/ deployment 4Service delivery 5Getting started A brief summary of the service and the
More informationMicrosoft Windows Intune: Cloud-based solution
Microsoft Windows Intune: Cloud-based solution So what exactly is Windows Intune? Windows Intune simplifies and helps businesses manage and secure PCs using Windows cloud services and Windows 7. Windows
More informationWhitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION
Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION A RECENT SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PARED WITH THE FACT THAT
More informationProtecting the Irreplacable. November 2013 Athens Ian Whiteside, F-Secure Ian.Whiteside@f-secure.com
Protecting the Irreplacable November Athens Ian Whiteside, F-Secure Ian.Whiteside@f-secure.com PC Sales continue to fall. Lack of innovation and no excitement Windows 8 doesn t seem to have excited the
More informationClient Access Licenses Suite Bridges Overview
Volume Licensing brief Client Access Licenses Suite Bridges Overview This brief applies to all Microsoft Volume Licensing programs. Table of Contents Summary... 1 What s New in this Brief... 1 Details...
More informationSymantec Client Management Suite 7.5 powered by Altiris
Symantec Client Management Suite 7.5 powered by Altiris IT flexibility. User freedom. Data Sheet: Endpoint Management Overview technology enables IT to make better decisions, be more flexible, improve
More informationisheriff CLOUD SECURITY
isheriff CLOUD SECURITY isheriff is the industry s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console
More informationSay Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER
Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER FORTINET Say Yes to BYOD PAGE 2 Introduction Bring Your Own Device (BYOD) and consumerization
More informationSecuring Your Business s Bank Account
Commercial Banking Customers Securing Your Business s Bank Account Trusteer Rapport Resource Guide For Business Banking January 2014 Table of Contents 1. Introduction 3 Who is Trusteer? 3 2. What is Trusteer
More informationAVeS Cloud Security powered by SYMANTEC TM
Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting
More informationVirtual Desktops Security Test Report
Virtual Desktops Security Test Report A test commissioned by Kaspersky Lab and performed by AV-TEST GmbH Date of the report: May 19 th, 214 Executive Summary AV-TEST performed a comparative review (January
More informationDriving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder
Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats Eva Chen CEO and Co-Founder Consistent Vision for 25 Years A world safe for exchanging
More informationDedicated Hosted Exchange 2013
About inty Dedicated Exchange Server 2013 The inty Dedicated Exchange 2013 Solution is a fully managed implementation with the following features: High-availability and built to Microsoft s reference architecture
More informationEndpoint Security: Moving Beyond AV
Endpoint Security: Moving Beyond AV An Ogren Group Special Report July 2009 Introduction Application whitelisting is emerging as the security technology that gives IT a true defense-in-depth capability,
More informationDOBUS And SBL Cloud Services Brochure
01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted
More informationKaspersky Endpoint Security 10 for Windows. Deployment guide
Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses
More information4 Steps to Effective Mobile Application Security
Mobile Application Security Whitepaper 4 Steps to Effective Mobile Application Security Table of Contents Executive Summary 3 Mobile Security Risks in Enterprise Environments 4 The Shortcomings of Traditional
More informationSecuring Corporate Email on Personal Mobile Devices
Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...
More informationEnterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
More informationRequirements Checklist for Choosing a Cloud Backup and Recovery Service Provider
Whitepaper: Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider WHITEPAPER Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Requirements Checklist
More informationClosing the Antivirus Protection Gap
A comparative study on effective endpoint protection strategies May 2012 WP-EN-05-07-12 Introduction Corporate economic concerns have put increased pressure on already limited IT resources in recent years
More informationManaging Web Security in an Increasingly Challenging Threat Landscape
Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.
More informationComprehensive Resource for Licensing and Pricing
1 Comprehensive Resource for Licensing and Pricing Windows Server, System Center, and Forefront Licensing Guide Table of Contents What s New in This Guide 2 Windows Server 2008 R2 Offerings 2 Windows Server
More informationCAL UPDATE FAQ. Affected CALS:
CAL UPDATE FAQ Affected CALS: Bing Maps Server CAL Core CAL Suite Enterprise CAL Suite Exchange Server Standard and Enterprise CALs Lync Server Standard and Enterprise CALs Project Server CAL SharePoint
More informationProtecting Content and Securing the Organization Through Smarter Endpoint Choices
Protecting Content and Securing the Organization Through Smarter Endpoint Choices Prepared by Dan O Farrell Dell Cloud Client-Computing Finally a practical approach to protecting content and securing desktops
More informationSichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce
Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce Richard Javet, Partner Business Manager Gabriel Kälin, Technical Consultant Trend Micro Schweiz, August 2014 8/27/2014 Copyright 2013
More information