GET MORE FROM YOUR SECURITY SOLUTIONS Symantec Consulting 2015 Symantec Corporation. All rights reserved.
Access outstanding talent and expertise with Symantec Consulting Symantec s Security Consultants have an average of 15 years experience in implementing and managing Symantec Solutions in large, complex environments. Symantec Consultants possess industry standard certification in security (CISSP, GCIH, Security+) and IT methodology (ITIL, COBIT), bringing together formal knowledge and best practices to ensure successful engagements and maximize the return on your security investments. Symantec Consulting delivers: Expert consultants with advanced product knowledge and vast industry experience A proven framework and approach based on best practices derived from direct enablement experience and customer feedback Take advantage of services in Threat Protection and Information Protection Advisory Design Implementation Optimization Residency In-depth training and real-world expertise to enhance customer experience and success Broad experience with customers from small businesses to FORTUNE 500 companies 2015 Symantec Corporation. All rights reserved. 2
THREAT PROTECTION Data Center PROTECT YOUR DATA CENTER BY HARDENING YOUR ENVIRONMENT AND ADDRESSING IT RISK AND COMPLIANCE CHALLENGES. Designing and implementing a properly scaled infrastructure to support your business needs is imperative to protecting your critical systems both inside and outside of your data center. Creating and tuning of policies to monitor, log, and block system activity as appropriate for your business needs requires in-depth knowledge of how operating system components, network communications and third-party software interact. Symantec Consultants design, implement, optimize and manage your Symantec Data Center Security: Server and Symantec Data Center Security Server Advanced environments using Symantec best practices. Through the modules of Symantec Control Compliance Suite, Symantec Consultants can help you communicate IT risk in business-relevant terms, prioritize remediation efforts based on a composite view of risk, and automate assessment processes to improve overall security and compliance posture. With carefully considered design, implementation, maintenance and optimization of the tool and content, Symantec Consulting can help your organization to assess compliance against internal and external controls leveraging common industry standards as well as customized requirements. Symantec Consultants implement Symantec Protection Engine, a carrier-class content and URL scanning engine that protects both Network Attached Storage and Cloud. Properly deployed, Symantec Protection Engine provides content scanning and URL filtering capabilities to any application on an IP network, thus protecting your data and storage systems against the ever-growing malware threat landscape. 2015 Symantec Corporation. All rights reserved. 3
THREAT PROTECTION Endpoint Protection SYMANTEC CONSULTANTS FINE TUNE A SUITE OF POWERFUL TOOLS TO CREATE A SOLUTION THAT FITS YOUR ENDPOINT PROTECTION NEEDS. SYMANTEC ENDPOINT PROTECTION Whether installing, upgrading or migrating, Consultants secure your endpoints from malware and other threats, providing protection to enhance gateway and LAN-based security solutions, and enabling centralized endpoint administration. SYMANTEC ADVANCED THREAT PROTECTION Our Consultants will effectively design and implement our Symantec Advanced Threat Protection solutions to gain visibility and manage risks to your organization. Leveraging one or more of the three ATP solutions, our consultants can add e-mail, network, or endpoint ATP to your risk strategy. SYMANTEC IT MANAGEMENT SUITE Building on the value of the suite, including the Symantec Service Desk, Symantec Workplace Virtualization and Symantec Workflow, Symantec Consultants provide services designed to reduce the cost of managing endpoints throughout the IT lifecycle by automating and simplifying business and security processes. SYMANTEC MAIL AND WEB GATEWAY PRODUCTS Our Consultants design, implement and tune the gateway products to provide accurate real-time anti-spam and anti-malware protection, targeted attack protection, advanced content filtering, data loss prevention, email encryption and protection from web-borne malware. Deployments occur as either a virtual appliance or on physical hardware. 2015 Symantec Corporation. All rights reserved. 4
INFORMATION PROTECTION Data Loss Prevention LOCATE, MONITOR AND PROTECT YOUR DATA. The DLP Consulting Team includes a mix of resource types that align with the problems you are trying to solve. DLP Technical Architects provide strategic planning and deployment of large scale implementations as well as upgrade and customization services DLP Program Architects bridge the gap between successful technical implementations and end-to-end business process integration Throughout the process, our consultants will design and implement a mature DLP program which will: Deployed by over half of the Fortune 100 companies Symantec Data Loss Prevention (DLP) discovers where data is stored across your cloud, mobile, and on-premises environments, as well as monitors how it is being used on and off your corporate network. With a proven implementation methodology that integrates people and process with technology, our DLP Consultants install, upgrade, optimize and provide strategic support to deliver sustainable and effective solutions for enterprise risk reduction. Utilize Symantec best practices to understand your organization s unique business challenges and help you achieve your security goals Reduce your overall risk profile Be scalable and operationally efficient and effective Help improve security awareness and remediate broken business processes 2015 Symantec Corporation. All rights reserved. 5
INFORMATION PROTECTION Authentication and Encryption EFFECTIVE IMPLEMENTATION ENSURES THAT THE RIGHT PEOPLE ACCESS THE RIGHT DATA. Expert implementation of our solutions can: Reduce cost and complexity Simplify administration and end-user experience Facilitate tighter integration with business partners Protect data on managed and unmanaged devices Ensure business continuity Maintain compliance with government and corporate regulations Symantec gives IT organizations tools that enable deep visibility and the ability to control how individual users access data, with our authentication and encryption solutions. Whether you are implementing Symantec Managed PKI (MPKI) Service or Symantec Validation and ID Protection (VIP) Service or need assistance with migrating third party tokens or web services integration, our Consultants can provide the expertise your company and security team needs. Because Symantec s Encryption portfolio includes endpoint, file, folder, and email encryption, it can integrate with Data Loss Prevention to automatically encrypt sensitive data being moved onto removable media devices or residing in emails and files. Robust management features include individual and group key management, automated policy controls, and out-ofthe-box compliance-based reporting. Symantec s Consulting will help ensure you get the right solution installed and operational as quickly and efficiently as possible. 2015 Symantec Corporation. All rights reserved. 6
Get more from your Symantec solutions with Symantec Consulting. Advisory Design Implementation Optimization Residency INCREASE PROTECTION MINIMIZE RISK IDENTIFY THREATS TO LEARN MORE, EMAIL: Americas email: ask_consulting@symantec.com APJ email: ask_consulting_asiapacificjapan@symantec.com EMEA email: ask_consulting_emea@symantec.com 2015 Symantec Corporation. All rights reserved. 7