Small and Midsize Business Protection Guide



Similar documents
Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Symantec Protection Suite Small Business Edition

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

INFORMATION PROTECTED

Symantec Protection Suite Small Business Edition

Endpoint Security More secure. Less complex. Less costs... More control.

Symantec Endpoint Protection

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Symantec Protection Suite Small Business Edition

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Small Business Protection Guide. Don t Leave Your Business at Risk Protect it Completely

Symantec Protection Suite Add-On for Hosted and Web Security

2012 Endpoint Security Best Practices Survey

Proven LANDesk Solutions

How To Protect Your Computer From A Malicious Virus

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

Payment Card Industry Data Security Standard

Norton Personal Firewall for Macintosh

Data Sheet: IT Compliance Payment Card Industry Data Security Standard

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

Symantec Endpoint Protection

Solution Brief: Enterprise Security

Symantec Enterprise Vault for Lotus Domino

Symantec AntiVirus Enterprise Edition

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

Symantec Endpoint Protection

Security survey in the United States

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Symantec Encryption Solutions for , Powered by PGP Technology

Data Sheet: Archiving Altiris Client Management Suite 7.0 from Symantec Deploy, manage, secure, and troubleshoot

Symantec Protection Suite SMB Family: Comparison Matrices and Migration. Presentation Identifier Goes Here 1

Solution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments

Symantec Messaging Gateway powered by Brightmail

Reducing the cost and complexity of endpoint management

Symantec Backup Exec 11d for Windows Servers New Encryption Capabilities

MANAGED SECURITY SERVICES

Data Sheet: Endpoint Management Altiris Client Management Suite 7.0 Deploy, manage, secure, and troubleshoot

Medicaid MITA: Innovative COTS solutions for IT Risk Management

AntiVirus and AntiSpam scanning The Axigen-Kaspersky solution

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

McAfee Server Security

for businesses with more than 25 seats

CA Host-Based Intrusion Prevention System r8.1

Symantec Endpoint Protection 11.0 Securing Virtual Environments Best Practices White Paper. Updated 7/20/2010

Improving Business Outcomes: Plug in to Security As A Service Adrian Covich

Symantec Endpoint Protection

overview Enterprise Security Solutions

BEST PRACTICE GUIDE TO SMALL BUSINESS PROTECTION: BACKUP YOUR SMALL BUSINESS INFORMATION

Advantages of Managed Security Services

Data Sheet: Archiving Altiris Server Management Suite 7.0 from Symantec Essential server management: Discover, provision, manage, and monitor

Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information

Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control

Optimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems

Symantec Mobile Security

Demystifying Virtualization for Small Businesses Executive Brief

Data Sheet: Server Management Altiris Server Management Suite 7.0 Essential server management: Discover, provision, manage, and monitor

Altiris IT Management Suite 7.1 from Symantec

Messaging Security, Availability, and Control for Small and Mid-sized Businesses

INSIDE. Securing Network-Attached Storage Protecting NAS from viruses, intrusions, and blended threats

Altiris IT Management Suite 7.1 from Symantec

Achieve more with less

Protect Your Enterprise With the Leader in Secure Boundary Services

Simplify Your Windows Server Migration

Symantec Federal Solutions

Symantec Backup Exec 2010

Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection

Data Loss Prevention in the Enterprise

NAC at the endpoint: control your network through device compliance

Endpoint protection for physical and virtual desktops

World-class security solutions for your business. Kaspersky. OpenSpaceSecurity

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Securing the Small Business Network. Keeping up with the changing threat landscape

Symantec Backup Exec System Recovery

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

BitDefender Client Security Workstation Security and Management

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Symantec Client Management Suite 8.0

Symantec ServiceDesk 7.1

Archiving, Backup, and Recovery for Complete the Promise of Virtualization

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

10 easy steps to secure your retail network

overview Enterprise Security Solutions

Symantec Backup Exec 2012

The Impact of HIPAA and HITECH

IBM Global Small and Medium Business. Keep Your IT Infrastructure and Assets Secure

OVERVIEW. Enterprise Security Solutions

Minimize the impact of downtime and disruption. Replace time-consuming manual processes with fast, automated recovery.

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment Adaptive Network Security...

The Headache of Managing an Service Top 10 Reasons to Outsource. White Paper July 08

AVG AntiVirus. How does this benefit you?

Securing the endpoint and your data

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform

V1.4. Spambrella Continuity SaaS. August 2

Transcription:

P r o t e c t i o n G u i d e : C l o s e t h e P r o t e c t i o n G a p Small and Midsize Business Protection Guide Close the protection gap and safeguard your business future Confidence in a connected world.

The protection gap Computers have long been indispensable for running a small or midsize business (SMB). Although information technology (IT) introduces new risks and management challenges, most businesspeople have a general understanding of its risks and they do their best to address them. More often than not, this means using a network firewall, adding an antivirus and possibly an antispam solution, and implementing some sort of backup schedule. Admittedly, it is difficult to run a business and keep protection up to date at the same time. New research documents the gap: a recent survey 1 showed that 33 percent of small and midsize businesses lack even basic antivirus protection, 47 percent fail to back up desktop PCs, and 20 percent maintain no server backups of any kind. Yet the risks increase, and the business protection gap grows. More complex threats and attacks, some focused on individual businesses, have become routine. The value of data and the cost of losing it are both on the rise. Meanwhile, the technology environment keeps changing as wireless networks, mobile computing devices, Mac OS and Linux machines in the workplace, and Web gateway and server hardware are added to the infrastructure and none of these additions are covered by basic protection. Individual point products may meet specific requirements, but don t work well together because: Duplication among separate products wastes money, time, and effort Gaps and uneven coverage leave critical assets and information at risk Solution management takes skills and time away from tasks that add more business value To close their protection gaps, small and midsize businesses need reliable, comprehensive protection that have compatibility designed in; are sized right; are easy to install, configure, and use; and come from a source they can trust. Phases of protection This guide describes four phases of protection for small and midsize businesses: Phase 0 Do-it-yourself multivendor protection, often assembled from point solutions included with PCs, Internet access services, and external hard drives. May leave coverage gaps; difficult to manage. Phase 1 Single-vendor protection assembled from individual point solutions purchased as needed. Duplicate agents, processes, and consoles may slow performance and complicate management. Phase 2 Single-vendor suites designed specifically to meet the requirements of small and midsize business. Consolidated and streamlined agents, processes, and consoles improve performance and manageability. Phase 3 Advanced singlevendor solutions that extend the capabilities of suites to meet specific business requirements, and are customized by vendors technology partners for key-inlock business alignment. Evaluating your coverage The sidebar Phases of protection outlines the progress of many small and midsize businesses from a patchwork of low-cost solutions toward a mature, scalable security and data protection infrastructure. While many small and midsize businesses have graduated to Phase 1 compatible solutions from a single leading vendor, many more try to make do with Phase 0 protection cobbled together from solutions bundled into their hardware, operating systems, or ISP services and rely on home-built backup and recovery methods. The following sections will outline the protection gaps such approaches can leave, and point out a few of the management challenges they introduce. 1 Applied Research - West, Inc. Storage and Security in SMBs: 2009 survey results. (Cupertino, CA: Symantec Corp. March, 2009), http://eval.symantec.com/mktginfo/enterprise/articles/b-storage_ and_ security_in_smb_03-2009.en-us.pdf. 2

Endpoint Security Technically, endpoint means the origin or destination of a TCP/IP or other transport layer connection. Practically, it means servers, desktops, laptops, and mobile devices that send or receive information. It is important to secure endpoints because devices and information now cross network perimeters routinely for example, as employees connect at airports or coffee shops, contractors bring in their own laptops, or thieves try to establish a WiFi connection from your parking lot. Perimeter security is still important to defend against wholesale attack but it is no longer enough. Phase 1 endpoint security coordinates antivirus, firewall, intrusion prevention, and other protection to ease system, user, and management burdens. Phase 2 protection goes one step further, integrating multiple solutions into an easy-to-administer whole: Antivirus and anti-spyware are the most familiar forms of endpoint protection. Today s best solutions offer deep protection against insidious rootkit malware, operate using fewer system resources, and adapt to user performance requirements more effectively than ever before. Network threat protection is a host-based firewall that protects the network by enforcing network traffic rules instead of looking for signatures of past attacks. This type of endpoint protection blocks threats based on what they are designed to do, even if they have never been encountered before. Proactive threat protection is a rules-based client-side engine that serves as a final line of defense, even against brand-new threats. Single-agent and single-console management keep endpoint computing loads and administrative burdens manageable to coordinate security technologies with minimum investment of time and resources. Phase 3 endpoint security enhances Phase 2 protection with additional solutions to meet specialized requirements for example: Network access control in software or appliance format maintains and enforces policies granting or restricting network permissions, regardless of how the endpoints access resources. Endpoint data-loss prevention scans incoming and outgoing communications for critical patterns such as those of Social Security or credit-card numbers, enforcing policies that restrict how many critical patterns an individual message may contain or an employee may send. Protection for specialized devices covers the increasing number of Mac OS, Linux, and mobile devices found on today s heterogeneous networks. Messaging Security Spam remains a waste and a menace, but Internet service providers Phase 0 antispam protection solutions have diminished the sense of urgency with which many small and midsize businesses approach it. Phase 1 solutions go further than ISP offerings, adding more effective filtering at the cost of a little more work for administrators. But ISP protections fail against attacks focused on individual companies or people. And even the best Phase 1 antispam solutions are not designed to protect against inappropriate and legally risky content, confidential information, or malware transmitted through outbound email. 3

Phase 2 protection integrates multiple content controls such as these: Scanning of outbound as well as inbound traffic for viruses, spam, and phishing attacks Content filtering to keep sensitive, confidential, or inappropriate content from being sent, to cut risks of fraud, intellectual property theft, and unintentional disclosure of confidential information Signature-based spam protection with regular signature updates for real-time protection, even against new threats Specialized Phase 3 solutions include: Gateway antispam in software, appliance, or new virtual appliance formats, to provide added protection and offload processing burdens from networks and clients Protection for specialized servers such as SharePoint and other content-management systems Archiving and recovery management tools for large email-intensive environments, or where regulatory or courtordered e-discovery is a significant risk Backup and Recovery Many small and midsize businesses ignore backup and recovery processes, or treat them at most as a nagging concern. However, half of surveyed businesses have lost important business data such as financial, legal, and personnel records; service-level agreements; and information held on behalf of third parties. A third of them have lost business as a result. In the 25 percent of SMBs that perform no backups at all and in the more than 50 percent that store backup files in the same location as the computers they are intended to protect, these vulnerabilities persist. Backups that use Phase 0 solutions such as copying to USB drives or portable media are inconvenient especially in the middle of an urgent project, when the risk and cost of data loss are greatest. Moreover, file-based backups will not protect against system crashes or make sure that all servers and workstations are backed up. Phase 1 point solutions are a big step up. The best of them move backup copies to centralized network storage or secure storage online, while complementary point solutions offer system backup and recovery and even centralized management. But the greatest vulnerability insufficient capability for timely and effective system recovery remains. Data and system protection in Phase 2 suites addresses management head-on, with capabilities such as these: Background operation to create full system backups while you work, with no interruption of productivity Centralized monitoring to show the backup status of every computer system on your network Application protection for critical Microsoft mail, content management, and other solutions Full system recovery, including protection for virtual environments Phase 3 solutions address special backup requirements of servers, remote offices, and databases, including the following: Special requirements to address industry-specific regulations and standards frameworks Server solutions that protect information stored in Web, database, and other critical servers Unique capabilities to meet the unique requirements of individual company business models 4

Symantec Protection Suite Symantec has a more than 25-year history of helping customers to secure, back up, and recover critical business information; In addition to carefully monitoring the protection requirements of small and midsize businesses, the company through the Symantec Global Intelligence Network also watches the threats its customers face, and integrates its experience and research into a solution suite for small and midsize business customers based on these principles: Complete protection multilayer coverage that moves beyond antivirus and basic backup to address today s full spectrum of business requirements Easy management streamlined technologies that deploy quickly, fit together seamlessly, and protect effortlessly Confidence, always clear, automated processes and strong support for complete desktop and laptop recovery with minimal downtime so that businesses can avoid emergencies entirely, or face them with the assurance that comes from a solid plan and good tools Symantec Protection Suite is an advanced Phase 2 solution that addresses the most pressing endpoint, messaging, and backup protection requirements of small and midsize businesses. Available in separate editions for small businesses with 5 to 99 employees and midsize businesses with 100 to 499 employees, it combines advanced capabilities available from no other source. These include: The industry s longest unbroken record of flawless performance in independent tests of antivirus effectiveness Policy-based filtering of email and instant-message content Recovery of critical files or folders in seconds and of complete systems in minutes, even to different hardware or virtual systems Advanced manageability from coordination across technologies and a consistent management interface Symantec Protection Suite is sold through and supported by Symantec Solution Partners a worldwide team of security and data-protection specialists with the knowledge, experience, and resources to put the right solution in place. It provides an unmatched foundation for advanced Phase 3 solutions configured, implemented, and managed by local partners with a deep understanding of small and midsize business technology and business requirements. 5

About Symantec Symantec is a global leader in providing security, storage, and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. For specific country offices and contact numbers, please visit our website. For product information in the U.S., call toll-free 1 (800) 745 6054. Symantec Corporation World Headquarters 20330 Stevens Creek Boulevard Cupertino, CA 95014 USA +1 (408) 517 8000 1 (800) 721 3934 www.symantec.com Copyright 2009 Symantec Corporation. All rights reserved. Symantec, the Symantec logo, and Backup Exec are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Mac and Mac OS are trademarks of Apple, Inc., registered in the U.S. and other countries. Linux is the registered trademark of Linus Torvalds. Microsoft is a U.S. registered trademark of Microsoft Corporation. Other names may be trademarks of their respective owners. 07/09 20050014