Symantec Endpoint Security Management Solutions Presentation and Demo for:

Similar documents
Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Secure Your Mobile Workplace

End to End Security do Endpoint ao Datacenter

Symantec Mobile Management Suite

Confidence in a Connected World. MEEC Symantec Product Availability. John Lally MD Education Account Executive John_Lally@symantec.

INFORMATION PROTECTED

Altiris Client Management Suite

#ITtrends #ITTRENDS SYMANTEC VISION

Securing the endpoint and your data

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management 7.1

Symantec Mobile Management 7.2

Mobile Security and Management Opportunities for Telcos and Service Providers

Symantec Mobile Management 7.1

The User is Evolving. July 12, 2011

Symantec Protection Suite Small Business Edition

Proven LANDesk Solutions

Insight. Security Response. Deployment Best Practices

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

Public, Private, Hybrid:

Symantec Endpoint Protection

Endpoint protection for physical and virtual desktops

REVOLUTIONIZING ADVANCED THREAT PROTECTION

IT Self Service and BYOD Markku A Suistola

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Risk and threats everywhere, all the time

Embracing Complete BYOD Security with MDM and NAC

Better Together: Microsoft Office 365 & Symantec Office 365

ForeScout MDM Enterprise

Athena Mobile Device Management from Symantec

Kaseya IT Automation Framework

The ForeScout Difference

Redefining Endpoint Security: Symantec Endpoint Protection Russ Jensen

Unified Security, ATP and more

/Endpoint Security and More Rondi Jamison

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

ITIL and Altiris ServiceDesk. Joseph Carson, Sr. Product Manager October 21, 2009

Symantec Endpoint Protection Analyzer Report

Symantec Protection Suite Small Business Edition

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Mobile App Management:

Symantec Endpoint Protection

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

overview Enterprise Security Solutions

ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones

IBM Security IBM Corporation IBM Corporation

OVERVIEW. Enterprise Security Solutions

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Symantec Federal Solutions

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Symantec Endpoint Protection

UP L13: Leveraging the full protection of SEP 12.1.x

McAfee Server Security

Symantec Consulting Services

Symantec Endpoint Protection

Integrating MSS, SEP and NGFW to catch targeted APTs

Security Information & Event Management (SIEM)

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

Endpoint protection for physical and virtual desktops

overview Enterprise Security Solutions

Mobile workforce management software solutions. Empowering the evolving workforce with an end-to-end framework

McAfee Security Architectures for the Public Sector

Symantec IT Management Suite 7.5 powered by Altiris

10 easy steps to secure your retail network

Small and Midsize Business Protection Guide

Symantec Endpoint Protection

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Best Practices for a BYOD World

IBM United States Software Announcement , dated February 3, 2015

Managing and Securing the Mobile Device Invasion IBM Corporation

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

On and off premises technologies Which is best for you?

AirWatch Solution Overview

Altiris Business Unit Review. Greg Butterfield Group President, Altiris Business Unit

RFI Template for Enterprise MDM Solutions

Countering Insider Threats Jeremy Ho

Readiness Assessments: Vital to Secure Mobility

DOBUS And SBL Cloud Services Brochure

Improving Business Outcomes: Plug in to Security As A Service Adrian Covich

Symantec Mobile Security

Symantec Protection Suite SMB Family: Comparison Matrices and Migration. Presentation Identifier Goes Here 1

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

Confidence in the Cloud Five Ways to Capitalize with Symantec

Transcription:

Symantec Endpoint Security Management Solutions Presentation and Demo for: University System of Georgia Board of Regents Information Technology Services

Executive Summary Business Requirements To migrate University Systems campuses to a common security platform to allow campuses to leverage each other for support and best practices, to centralize and standardize. Symantec Capabilities to Address Systems Management Symantec Management Platform (Altiris): System inventory, management patch management, software delivery, Mobile management To centralize management and reporting on threats facing the campuses and share within community. Develop and publish endpoint policies, standards, and guidelines in direct support of the campuses for endpoint security. Lower the cost of security for the System Threat Management Symantec Protection Center : Central management platform for Symantec threat solutions for RBAC login, reporting. The below are managed from this console Symantec Data Loss Prevention: Prevent confidential information from leaving endpoint or network Symantec Protection Suite: AV protection for endpoints, email and web gateways and includes basic offering of Network Access Control 2

Use Case #1 Business Requirements The University System of Georgia has challenges with maintaining a state of compliance for all endpoints. USG systems needs to meet the standards and guidelines established to comply with the written polices. We are looking for an endpoint security solution and a policy, standard, and guidelines on how institutions can implement USG best practices at their campuses RFI Reference Introduction 1.1 Today, IT and Information Security face evolving business processes and connectivity requirements that have become more and more complex. In addition, students, faculty, and staff have pushed IT for support of mobile devices and increasing support of a nomadic workforce. The old network design with defined endpoints has shifted and a new paradigm has emerged. Support and security staff realizes that securing and supporting endpoints the way we currently are is no longer effective, efficient, or economical. 3

Symantec Management Platform Symantec Solutions SECURITY INFORMATION RISK & COMPLIANCE STORAGE INFRASTRUCTURE OPERATIONS BUSINESS CONTINUITY Dell Management Console Dell Client Manager Third-Party Solutions vpro TM enabled computer management Management Platform 7.1 HP Client Manager Endpoint & Mobile Security Management Backup Management Application Virtualization Power Management HelpDesk Management Patch and System Management Symantec Confidential 4

IT Lifecycle Management Service Support and Remote Assistance Transition and Migration Discovery and Inventory Backup and Recovery Contracts and Cost Analysis Monitoring and Reporting Symantec Management Platform Application Packaging and Virtualization Desktop Power Management Imaging and Deployment Patch Management and Compliance Endpoint Protection Intelligent Software Management 5

Lifecycle Management as part of Defense in Depth. Client Service IT Management Server Asset Desk Management Enterprise Mobility & Management *MDM for ios and Droid

Demo Symantec Management Platform Application Distribution Configuration and Patch management Areas to Focus: Discovery Tools Inventory Management Patch Management Compliance Management Device Control/Remote Management Ability to manage existing antivirus 7 2002 Symantec Corporation, All Rights Re

Use Case #2 Business Requirements University System of Georgia requires a method to address the risks and implement Security and Management best practices for mobile devices accessing USG resources. RFI Reference What are all the types of endpoints that your solution manages including but not limited to mobile devices, points of sale, laptops, desktops, barcode readers, smartphones, tablets, etc.? How does your endpoint security management solution handle the following features? Mobility Management (BYOD) 8

Consumerization of Applications Users Adopting Apps Pragmatically Is IT Security the Champion, the Blocker, or Irrelevant?

Apps SaaS Social Media Storage Vision & Security Solution Strategy - Confidential 10

App-Centric Control Mobile Devices in the Enterprise Defining Your Journey BYOD Company Owns an Unmanaged Device Company Controls Relevant Apps & Data Only Unmanaged Managed Company Controls Standard Device Authentication & Access VIP MPKI O3 Information Protection DLP App Center Company Owned Device Control & Management MDM Mobile Security App Distribution & Collaboration App Center Norton Zone 1 Authentication & Access Company Controls Personal Device Authentication & Access VIP MPKI O3 VIP O3 Information Protection DLP App Center Information Protection App Center Personally Owned Device Control & Management MDM Mobile Security App Distribution & Collaboration App Center Norton Zone 3 App Distribution & Collaboration App Center Norton Zone 2 Device-Centric Control

Best Practices in the Mobile Space Your users want mobile access: Give it to them! Set up segregated Guest WiFi environments that they connect their personally owned devices to the Internet; only. They want to do mission critical/business applications on mobile devices: Why?! What is the benefit of doing it on a mobile device? Determine the risk. What is the type of information they will be processing, and should it only reside on enterprise protected assets? Enterprise issued mobile devices: Determine a strong management approach which is risk based Mobile Device Management Enterprise Application Management Information and Application Sandboxing Strong & Unified Application Authentication Internet Security Threat Report, Vol. 17 12

Demo Mobile Device Management Policy and Configurations Content and Applications Areas of Focus: BYOD Management Security Device Control/Remote Management 13 2002 Symantec Corporation, All Rights R

Use Case #3 Business Requirements University System of Georgia requires the ability to centralize reporting for threat awareness yet delegate operational tasks to local schools. RFI Reference Hierarchical environment such as the University System of Georgia and the Georgia Public Library Service What are the FTE requirements to implement and operate your solution What are the technical specifications for running your solution? a. Server Requirements b. Client Requirements c. Network Requirements d. Storage Requirements e. Virtual Environment requirements if any 14

Reference Architecture Management Symantec Protection Center Databases SEPM SSR ITA Embedded SEPM (ASA) SEP Manager Endpoint Protection Network Access Control ITA for SEP Mail Security Messaging Gateway SMS for Exchange SMS for Domino SMP SSR Manager SSR Desktop Edition Workflow Client Endpoints Server Endpoints Endpoint Protection Symantec Management Agent Endpoint Protection NAC Self-Enforcement SEP for Macintosh Antivirus for Linux Symantec Management Agent BESR Desktop Agent 15

Symantec Protection Center (Security Management Console) 16

Demo Cross Product Reporting Role based Access Adding additional Symantec and 3 rd party solutions Areas of Focus: One Single Pane of Glass or Console Reporting and Dashboard 17 2002 Symantec Corporation, All Rights R

Use Case #4 Business Requirements University System of Georgia requires the ability to centrally deploy and manage endpoint security solutions to prevent interruptions in the learning environment, loss of data and productivity, and reduce risk by blocking malicious files and activities, thereby removing the associated sideeffects of compromised systems. RFI Reference How does your endpoint security management solution handle the following features? Firewall Host Intrusion Prevention Application Management (whitelisting/blacklisting) Host Integrity Checking Anti-Virus Anti-Spyware/Malware Anti-Spam Network Access Control (NAC) 18

Protecting the Infrastructure Protecting Infrastructure and Data with Protection Suite 19

Protection Suite Enterprise Edition Endpoint Security Messaging and Web Security Backup and Recovery Antivirus / Antispyware Antivirus/Antispam/Antiphishing Backup Live Desktops & Laptops Desktop Firewall Reputation-based spam filtering Restore to any Hardware Intrusion Prevention Content Filtering / Compliance Threat Driven Backups Generic Exploit Blocking Data Loss Prevention Device & Application Control Microsoft Exchange Antivirus for Linux Lotus Domino Network Access Control Self Enforcement Symantec Protection Suite Messaging Gateway software subscription 20

Symantec Endpoint Protection Version 12.1 12+ Security Technologies 1 Installed Agent 1 Management Console PC and Mac clients Drastically improved scanning capabilities Optimized for Virtual Clients Real-time No longer dependent on signatures. Insight Reputation Network Access Control Host Integrity Checking Heuristic Detection Location Awareness Application Control Device Control SONAR Firewall Intrusion Prevention Service Antispyware Antivirus

Protect Infrastructure Symantec Insight Proactive Protection from New & Targeted Threats Leverages anonymous telemetry data from 250M+ machines to construct a massive nexus of files, machines and domains Tracks nearly every binary in the world 4 billion files, adding 37 million every week 1 Petabyte of statistical data Uses age, prevalence, source and other attributes to assign a reputation rating to files Can accurately identify and block threats even if just a single Symantec user encounters them Bad Safety Rating File is blocked No Safety Rating Yet IT can set block/ allow thresholds Good Safety Rating File is whitelisted 22

Prevalence Protect Infrastructure Symantec Insight Proactive Protection from New & Targeted Threats Bad Files No existing protection addresses the long tail Unfortunately neither technique works well for the tens of millions of files with low prevalence. (but this is precisely where the majority of today s malware falls) Good Files Blacklisting works well here. For this long tail a new technique is needed. Whitelisting works well here. 23

Demo Policy and Configurations Ensuring Compliance Scalable Architecture Areas to Focus: Antivirus, Anti-spyware, Anti-Malware IPS/Firewall Application Control/HIPS Application Blocking Connection Control Network Access Control 24 2002 Symantec Corporation, All Rights R

Use Case #5 Business Requirements University System of Georgia requires the ability to prevent the loss of personal, private, and confidential data, and reduce the liability with lost or stolen assets. Additionally, USG requires a solution to meet legal requirements for audit, discovery, and compliance. RFI Reference How does your endpoint security management solution handle the following features? Encryption and Device Management Data Leakage Protection e-discovery and Forensics 25

Protect Information Encryption as part of Defense in Depth. Insight Reputation Network Access Control Host Integrity Checking Heuristic Detection Location Awareness Application Control Device Control SONAR Firewall IPS E N C R Y P T I O N Risk-based deployment: Whole Disk Encryption Removable Media Encryption Network Fileshare Encryption Gateway Email Encryption Desktop Email Encryption Antispyware Antivirus

Protect Information Data Loss Prevention as part of Defense in Depth. Three different Languages Insight Reputation Network Access Control Host Integrity Checking Heuristic Detection Location Awareness Application Control Device Control SONAR Firewall IPS Antispyware Antivirus E N C R Y P T I O N D L P DISCOVER MONITOR PROTECT Three different Countries ENDPOINT NETWORK STORAGE *Detection Technologies *Data Insight w/ *DLP for Tablets

Demo Storage Network Endpoint 28 2002 Symantec Corporation, All Rights R

Use Case #6 Business Requirements University System of Georgia requires the ability to enable efficient and reliable cloud services to increase security levels and reduce the overhead of administration and maintaining proficient staffing while providing separation of duties. RFI Reference How does your endpoint security management solution handle the following features? Cloud Security Management Cloud Sourcing (Real Time Updates/Protection) 29

A New Security Layer Above the Cloud Access Control Information Protection O Cloud Visibility 3 Control Security Compliance Private Cloud To embrace the cloud with confidence 30

Enable the Cloud Securely. Consume Security as a Service customers consume our products and solutions information from the cloud Extend Solutions to enable customers to extend their security reach for cloud services Build Solutions that enable the creation of secure and well managed public and private clouds

Best Practices in the embracing the Cloud What does the Cloud mean to my organization? Public Cloud Private Cloud Government Cloud Hybrid Cloud There has not been a significant Cloud breach, yet. The strong majority of breaches are using legacy systems; through 4 key aspects: Incursion, Discovery, Capture, Exfiltration Categorization/Classification of Information Many insist that it is to early to move sensitive information to the Public Cloud; the security models are not mature enough. Only move Public Information to the Cloud. Utilize the Cloud for what is was designed for: ease of access, reduced capital expenditures, ability to access NON-sensitive data anytime, anywhere. Internet Security Threat Report, Vol. 17 32

Demo Symantec O3 33 2002 Symantec Corporation, All Rights R

Demo- Using Symantec Endpoint Protection.cloud to Protect Your Business CISO Summit - November 2010

Use Case #7 Business Requirements University System of Georgia is interested in other solutions that may address similar issues or compliment the solutions already addressed by extending the feature set. RFI Reference How does your endpoint security management solution handle the following features? Workflow IT Analytics Automating Governance Infrastructure for incident response Infrastructure for audit retention compliance 35

Thank you! Copyright 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. CISO Summit - November 2010

Additional Demo Videos Installation Videos

Demo - Mobile Management 7.1 - Installation CISO Summit - November 2010

Demo Installing Symantec Protection Center CISO Summit - November 2010

Demo Installing Symantec Endpoint Protection CISO Summit - November 2010

Additional Videos Product Demos CISO Summit - November 2010

Demo - Topology Viewer Video Demo part of Server Management Suite 7.1 CISO Summit - November 2010

Demo Delivering a Endpoint Recovery (V-Pro) 43 2002 Symantec Corporation, All Rights R

Demo Delivering a Temp Environment (V-Pro) 44 2002 Symantec Corporation, All Rights R

Demo Symantec Mobile Management 7.1 CISO Summit - November 2010

Demo- Symantec Endpoint Protection 12: Insight CISO Summit - November 2010

Demo Reputation Based Security CISO Summit - November 2010

Demo- Critical System Protection: Maximum Security for Physical, Virtual, and Cloud Servers CISO Summit - November 2010

Demo- Control Compliance Suite v11 CISO Summit - November 2010

Demo VIP Two Factor Auth CISO Summit - November 2010

Demo of CCS and DLP Integration CISO Summit - November 2010

Demo Whole Disk Encryption CISO Summit - November 2010