Email/Endpoint Security and More Rondi Jamison



Similar documents
Securing the endpoint and your data

Secure Your Mobile Workplace

Better Together: Microsoft Office 365 & Symantec Office 365

Symantec Endpoint Protection

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

Microsoft Windows Intune: Cloud-based solution

Norton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360.

On and off premises technologies Which is best for you?

Endpoint Protection Small Business Edition 2013?

Symantec Endpoint Security Management Solutions Presentation and Demo for:

Chief Security Strategist Symantec Public Sector

End to End Security do Endpoint ao Datacenter

INFORMATION PROTECTED

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Symantec Endpoint Protection

UAB Cyber Security Ini1a1ve

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

Symantec Endpoint Protection Datasheet

Symantec Mobile Management for Configuration Manager 7.2

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform

Symantec Endpoint Protection Analyzer Report

Symantec Endpoint Protection

4 Steps to Effective Mobile Application Security

Symantec VIP and Intel IPT Tecnologia e sicurezza on the cloud

AVeS Cloud Security powered by SYMANTEC TM

Athena Mobile Device Management from Symantec

UP L13: Leveraging the full protection of SEP 12.1.x

2012 Endpoint Security Best Practices Survey

Internet threats: steps to security for your small business

Symantec Protection Suite Add-On for Hosted and Web Security

Symantec Mobile Security

Public, Private, Hybrid:

Proven LANDesk Solutions

Integrating MSS, SEP and NGFW to catch targeted APTs

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

Protecting the Infrastructure: Symantec Web Gateway

ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones

Symantec Mobile Management Suite

Sophos Ltd. All rights reserved.

SUMMIT. November 2010

For Businesses with more than 25 seats.

How To Get A Cloud Service For A Small Business

Symantec Mobile Management 7.2

Symantec Client Management Suite 8.0

Symantec Mobile Management 7.1

for businesses with more than 25 seats

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Security.cloud Configuring DLP on to your flow and applying security to your hosted deployment

Symantec Endpoint Protection Small Business Edition Implementation Guide

Symantec Endpoint Protection Small Business Edition Getting Started Guide

Cyber Security Solutions:

ForeScout MDM Enterprise

Getting Started with Symantec Endpoint Protection

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

IBM Security IBM Corporation IBM Corporation

The ForeScout Difference

BEYOND LIMITATIONS CONNECTING POSSIBILITIES

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Symantec Mobile Management 7.1

Zscaler Internet Security Frequently Asked Questions

Debunking the Top 10 CloudHosted Virtual Desktop Myths

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Parallels Solu+ons for Business Keeping IT in Control of Mac in the Enterprise. Carlos Capó Sr. Manager, Global Business Solu6ons

Symantec Mobile Management 7.2

Debunking the Top 11 Cloud Desktop Myths

Did you know your security solution can help with PCI compliance too?

Overview of SOTI.

Beyond passwords: Protect the mobile enterprise with smarter security solutions

#ITtrends #ITTRENDS SYMANTEC VISION

Administrator's Guide

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide

IBM Endpoint Manager for Core Protection

Countering Insider Threats Jeremy Ho

Addressing BYOD Challenges with ForeScout and Motorola Solutions

Webroot Security Intelligence for Mobile Suite. Cloud-based security solutions for mobile management providers

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments

Risk and threats everywhere, all the time

IBM Endpoint Manager for Mobile Devices

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

Unified Security, ATP and more

Symantec Protection Center Enterprise 3.0. Release Notes

Symantec Client Management Suite 7.5 powered by Altiris

Tivoli Endpoint Manager. Increasing the Business Value of IT, One Endpoint at a Time

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection

Web Protection for Your Business, Customers and Data

Symantec Enterprise Vault.cloud Giovanni Alberici

Securing mobile devices in the business environment

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

Improving Business Outcomes: Plug in to Security As A Service Adrian Covich

Norton Small Business. Getting Started Guide

Finding Security in the Cloud

Reducing the cost and complexity of endpoint management

"Secure insight, anytime, anywhere."

SITUATION SOLUTION BENEFITS SUPPORT PRODUCTS

Transcription:

Email/Endpoint Security and More Rondi Jamison Sr. Marke)ng Manager - Enterprise Security Strategy

Agenda 1 Why Symantec? 2 Partnership 3 APS2 Packages 4 What s next Copyright 2014 Symantec Corpora)on 2

Why Symantec? We re Working to Strengthen our Offerings and Programs Right- for- Me Offering More R&D BeEer Meet Partner & Customer Needs New Offerings BeEer and Easier Customer Experience Tailored Offerings Consumers Small Businesses Large Enterprise Governments Geographies Specific Industries & verrcals: Telcos / CSPs System Int. Public Sector 3

Why Symantec? We See More, We Analyze More, We Know More 7 Billion File, URL & IP Classifica)ons 1 Billion Devices Protected 3.7 trillion rows of security telemetry; 100 billion more/month 14 security ops centers globally 500+ expert analysts 240 Million ContribuRng Users & Sensors Blocked 182 million threats last year 4

Proven Service Provider GTM success Model A 5- step framework for mutual success! Gather Business Intelligence: market, partner, customers Track & Report Quarterly Reviews Go To Market Framework Share Best PracRces and Enablement Execute Together Build Joint MarkeRng Plan 6

APS, Parallels and Symantec Enabling Your Business Symantec Email Security.Cloud An)- Malware An) Spam Data Control and Protec)on APS 2 Cer)fied Symantec Endpoint ProtecRon Desktops Laptops File Servers APS 2 Complete Parallels Delivery Plaiorm 1 2 3 Integrate Services Bundle Services Provision & Manage

Symantec Email Security.cloud Intelligent Layered Security MULTI- LAYERED SPAM and MALWARE FILTERING - Mul)ple analysis engines are con)nually updated to scan emails and accurately detect and eliminate known spam and malware SKEPTIC ADVANCED MESSAGE ANALYSIS - Detects anomalies Unknown Malware - Intelligence gathered through detailed code analysis - AVack intelligence processed and shared in real- )me to protect all Symantec customers REAL TIME LINK FOLLOWING - Intelligent real- )me link following - Analyzes content in real- )me - Stops emails with bad links from being delivered - No detectable delivery latency POLICY BASED DATA LOSS PROTECTION - Define and enforce granular policies for controlling email- related data loss - Leverage proven and included libraries and templates - Flexible policies provide customizable control over what types of content and avachments users can send and receive Easy to Deploy ConsumpRon Billing Easy to Scale AutomaRc Updates 100% virus protec)on 99% spam capture 100% availability Market Leading SLAs 24x7 Partner Support APS2 Cer)fied 8

Symantec Endpoint ProtecRon Small Business EdiRon Cloud- based protec)on for your growing business ALWAYS- ON VIRUS & MALWARE PROTECTION THAT S FAST AND EFFECTIVE Protects your business from dangerous applica)ons and lets employees know which ones can be trusted; avoiding unnecessary distrac)ons for your employees BUSINESS- GRADE SECURITY DELIVERED IN MINUTES Deploys effortlessly even to remote users; no hardware to install or upgrade User- friendly interface lets you easily secure your business from online threats CLOUD- BASED PROTECTION FOR YOUR GROWING BUSINESS Online protec)on is distributed over a simple web connec)on, so adding users and devices is as easy as a few clicks Manage your protec)on from a single, secure web portal, so everything from adding and removing users to adjus)ng access is easily performed from anywhere 9

Symantec and APS 2 Symantec and APS 2.0 BeEer support for bundling - Configurable bundle combina)ons of An)virus with An)spam and Data Management - Bundle with hosted email or offer as standalone - Allows new and exis)ng APS services to be associated and integrated together Richer UI - Leverages APS 2.0 to deliver Custom UI flows, Custom Views for improved customer experience - Extensible resource model Easier upgrades when new features, products added to core service Easy Upgrades - Upgrade exis)ng installa)ons with addi)onal services and in- app Buy Now buvon. - Extensible resource model Easier upgrades when new features, products added to core service Reduced integraron cost - Both standalone and hosted mail servers supported in the same package

Disclaimer Any informa)on regarding pre- release Symantec offerings, future updates or other planned modifica)ons is subject to ongoing evalua)on by Symantec and therefore subject to change. This informa)on is provided without warranty of any kind, express or implied. Customers who purchase Symantec offerings should make their purchase decision based upon features that are currently available. 11

First Up Symantec Mobility Suite Scalable, Secure, Integrated Device, App Management and Threat protec)on Device Apps Data Copyright 2014 Symantec Corpora)on 12

Complete Lifecycle Management ios, Android and Windows Phone Enable enterprise apps and data easily and automa)cally Protect enterprise data & infrastructure from malicious avack and theg Control inventory and configura)on with massive scalability 13

Next Up - Norton Small Business Online The protec)on and simplicity of Norton, built for your business PROTECT YOUR BUSINESS AGAINST VIRUSES AND MALWARE Five layers of patented protec)on work collabora)vely, to deliver a game- changing approach to protec)ng customers and securing their devices SECURE YOUR COMPUTERS AND MOBILE DEVICES WITH A SINGLE SOLUTION Deliver protec)on to all your employees devices with a single email Web- based management portal allows you to see at risk devices so you can easily take ac)on and avert emergencies FLEXIBLE PROTECTION THAT CAN GROW WITH YOUR BUSINESS One subscrip)on covers all your devices allowing for greater efficiency and affordability so that you can focus on driving bever cash flow and reinvestment in your business When you add a computer, smartphone or tablet to the subscrip)on, you are only charged for the )me remaining on the subscrip)on 14

Norton Small Business Online Offering STANDARD SERVICE PROVIDER OFFERING: ü 5 device minimum with the ability to add incremental devices up to 25 ü Simple Deployment ü Simple Management OPTIONAL ADD- ON FEATURES Virus & Spyware Removal Service (VSS) 1 GO- TO- MARKET OPTIONS: Online Download 1 Virus & Spyware Remove Service is recommended for value- added solu)ons (VAS) only. 15

Norton Small Business Online Benefits Exclusive Benefits PC Mac ios Android MulR- device ProtecRon Protec)on for PCs, Macs, and devices (smartphones and tablets). Simple Deployment Set up in minutes with a guided online flow. Simple onboarding email invita)on sent to employees. Security Stops viruses, malware and other threats before they can do damage to your business. Email, chat and download files without worry. Warns you if downloaded sogware contains a threat before you open it on your device. Checks apps to let you know if there is a threat and removes them. Allows blocking of calls and text messages from unauthorized numbers. Warns you of fraudulent websites to protect your informa)on. Automa)cally scan SD (Secure Digital) memory cards for threats when they re plugged into a device. Ease of Management View all devices from one central web portal. Filter easily by device- type or at risk items. Manage tasks onsite or remotely (Install, fix at risk items). Locate lost or stolen mobile devices so that your business informa)on is protected. Prevents strangers from using your device if it s lost or stolen. Remotely erase sensi)ve informa)on on your device if it s lost or stolen. Licensing & Renewal Add addi)onal devices to your exis)ng subscrip)on and only pay for the remaining )me. Delivers the ability to end protec)on on all devices at the same )me (co- terminus). 16

And Introducing: Beachhead Unified Endpoint Security & Management Vision Any Device Threat ProtecRon Data ProtecRon IdenRty and Access Users Self enroll devices Self Service Encryp)on Recovery Key Self provision apps Access to corporate resources IT Admin Protect against malware Ensure User Compliance Protect end user data Perform vulnerability assessments Enable or re- enable auto updarng Copyright 2015 Symantec Corpora)on 17

Industry Leading Security Layered Security for Desktop Plaiorms Network INTRUSION AND FIREWALL AnRvirus FILE- BASED PROTECTION ReputaRon INSIGHT Behavior SONAR Blocks malware before it spreads to your machine. Controls which programs can use your network. Detects and eradicates malware, before it reaches your hard disk, and in real )me Determines safety of files & web sites using the wisdom of the community Monitors and blocks programs that exhibit suspicious behaviors Copyright 2015 Symantec Corpora)on 18

Industry Leading Security Comprehensive ProtecRon for Android ApplicaRon Assessment Detects and allows users to remove: Apps that leak data and content Apps that drain the bavery Apps that consume too much bandwidth Malware ProtecRon Fast and effec)ve on- device scans Protects against latest threats with LiveUpdate integra)on Implement compliance rules based on device security posture Web Security Detects and blocks phishing websites Enables safe mobile browsing Copyright 2015 Symantec Corpora)on 19

Q & A Copyright 2014 Symantec Corpora)on 20

Thank you! Copyright 2014 Symantec CorporaRon. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corpora)on or its affiliates in the U.S. and other countries. Other names may be trademarks of their respec)ve owners. This document is provided for informa)onal purposes only and is not intended as adver)sing. All warran)es rela)ng to the informa)on in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The informa)on in this document is subject to change without no)ce.