Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting your employees, is key to addressing risk. AVeS Cloud Security powered by SYMANTEC TM A virus could destroy your business in minutes. We can protect it just as fast. Symantec Endpoint Protection Small Business Edition 2013 is a simple, fast, and effective solution that protects against viruses and malware, and sets up in just minutes. You donʼt need to install additional hardware, or any special IT staff or training to get up and running. It is a cloud-managed service, which means youʼre free to devote your energy to whatʼs important while advanced technologies for antivirus, antispyware, and firewall protect your laptops, desktops, and file servers effectively. Youʼll always have the latest protection because updates happen automatically and transparently. All this protection wonʼt drain your financial resources. Thereʼs a simple subscription fee that fits into any budget. Symantec Endpoint Protection Small Business Edition 2013 provides an onpremise management option if you're not quite ready to enjoy the power and convenience of a cloud-managed service. If your business prefers to have an on-site server to manage endpoint protection, you can easily select the on-premise management application. You can always switch from on-premise management to the cloud-managed service without any additional costs when the timingʼs right for you. This future- proofs your investment and gives you tremendous flexibility as your business evolves. It all adds up to a simple, fast, and convenient way to make sure your company is protected from cyber threats today and tomorrow by the company trusted by hundreds of thousands of businesses worldwide. Page 1 of 9
What you're avoiding can cost you your business More than 36 percent* of all targeted attacks are aimed at small companies, compared to 18 percent at the end of 2011. There appears to be a direct correlation between a rise in attacks against small companies and a fall in attacks against larger ones. [*Symantec Intelligence Report, June 2012] The Symantec.cloud difference Leverages the Symantec Global Intelligence Network, one of the largest security research networks in the world, for rapid threat identification and response Brings over eighteen years of experience developing award-winning technologies for antivirus and endpoint protection Service level agreement provides 100% web console availability The 4 things you need to know 1. Symantec Endpoint Protection Small Business Edition 2013 has been designed specifically to meet small businesses' needs. 2. Simple, fast and effective virus and malware protection. Symantec Endpoint Protection Small Business Edition 2013 is as simple as it is fast and effective, and does not disrupt your workflow stopping viruses and malware in their tracks, so you can run your business confidently. Automatic security updates, over the Internet, allow systems to stay current without employees having to do anything. Laptops and desktops benefit from intelligent scanning technologies that help maximize protection while minimizing impact on system performance. Symantec Endpoint Protection Small Business Edition 2013 analyzes downloaded files and applications, and lets your employees know which ones can be trusted or avoided, and eliminates unnecessary distractions. Page 2 of 9
3. Set up in just minutes. Symantec Endpoint Protection Small Business Edition 2013 installs in just minutes with no special IT staff or training required. It can protect laptops, desktops or servers through a standard download, email invitation or silently pushed to your network. Security updates and new features are automatically delivered in the background, and as a standard part of your service, to ensure effortless, up-to-the- minute protection with no wasted time and money rebuilding suddenly infected computers. You get a great overall experience complete with helpful and reliable 24 hours a day, seven days a week customer support and 100 percent uptime service level agreements (SLAs). 4. Cloud-ready when you are. Symantec Endpoint Protection Small Business Edition 2013 allows you to experience the security and convenience of a cloudmanaged service. This means no requirement for hardware, always-on endpoint protection with security updates over the Internet, and a simple subscription fee that flattens operating costs and includes 24x7 support. All in all, itʼs a service that allows you to focus on running your business, while greatly simplifying the protection of your computer systems. Thereʼs an on-premise management option available as well, which allows you to start off with an on-site server and have the option to transition to a server-free, cloud-managed service when your business is ready, without any additional costs. How the service works Set up in just minutes! 1. Complete the online application form 2. You will receive a Console Log via e-mail 3. Log on to the hosted management console 4. A simple wizard offers a choice of cloud-managed service or on-premise management 5. Deploy a software agent to individual endpoints (PC's, Desktop's and Servers) or silently push the solution to the network 6. Upon installation, pre-configured policies are enabled for the software agent to include anti-virus, anti- spyware, firewall, and host intrusion prevention Page 3 of 9
7. After the install, the agent proactively downloads the latest security definitions and updates 8. You can use the management console to set custom policies and push actions to all endpoints in the network 9. You can also use the management console for ongoing maintenance, including deploying new endpoints, viewing status, managing remote clients, etc. 10. For any support contact AVeS Cyber Security on 011 475 2407 or Symantec on 011 797 6639 Key capabilities CAPABILITIES Security BENEFITS Simple, fast, and effective endpoint security Advanced technologies against viruses and other online threats protect your laptops, desktops, and servers against viruses, worms, Trojans, spyware, bots, zero- day threats and root kits Firewall security Defends against hackers with a quiet two-way firewall Generic exploit blocking Guards against malware attacks that exploit vulnerabilities in applications that interact over the internet Web browser security Identifies unsafe and dangerous websites right in search results. Allows employees to work online with confidence USB device control Ability to detect and protect against harmful files from USB storage devices (available in cloud-managed service only) Windows 8 support Protection of computers and tablets running Windows 81 (available in cloud- managed service only) Page 4 of 9
Local update service Reduce network bandwidth usage by assigning a local computer as the local update host to connect to the internet to get the latest security software and content updates and then share with other computers on the local area network (available in cloud-managed service only) Always-on protection Automated updates occur transparently over an internet connection to help keep employee systems current and consistent with policies whether they are in the office or on the road even when theyʼre not logged into VPN Management Management flexibility Power and convenience of a cloud-managed service or select an onpremise management option with an on-site management server Easy setup and web-based management Set up in just minutes without any additional hardware. Administrators can access an easy-to-use web-based management console and manage the security settings for multiple devices. They can receive real-time alerts via SMS or email and can easily perform functions such as changing settings, establishing groups and alerts, and creating and viewing reports.n 2013 RMM-enabled The on-premise management application is enabled to be integrated with leading RMM tools (integrated vendors include Kaseya, Level PlatformsTM, and LabTechTM. For integration with other RMMs, check with your specific RMM vendor) Reporting Security audit and customizable Service records data about administrative activities such as login times, policies created, and computers added. Administrators can Page 5 of 9
reporting build graphical reports that are exportable to PDF or HTML Pricing Subscription fee A simple subscription fee, that covers either management option, reduces operating expenses and comes with all service upgrades, maintenance, and 24x7 support Question and Answers Symantec.cloud Management Console 1. We want to try out Symantec.cloud services. How can we do that? 2. What hardware and software do I need to use Symantec.cloud? 3. We want to add Backup Exec.cloud to our Endpoint Protection computers. Can we do that? 4. Some links in the Symantec.cloud Agent interface do not work on Windows 7 installs, but work perfectly on our Windows XP computers. Why is that? 5. How do I change my password? 6. How can I view the help? 7. Are there tutorials or other kinds of information available? 8. What is the best way to manage my Symantec.cloud computers, services, and users? 9. We deployed most of our computers using an Active Directory redistributable package. A few computers reported a successful install, but the Symantec.cloud agent is not installed. Can you explain what happened? 10. We deploy new computers to our network using images to clone them. Should we add the Symantec.cloud Agent to our image for cloning new computers? 11. Are proxy settings handled on the computer or in the Management Console? 12. We have a satellite office that does not use the same proxy as the proxy that is configured in the Management Console. Can we override the Management Page 6 of 9
Console settings? 13. Why would the connection fail after I entered my Symantec.cloud credentials during installation? 14. Our Linux Squid proxy disrupts communications between Protection Agents and Endpoint Protection. What URLs should we white list? 15. When I use the last X days to set the beginning and ending dates of a report, the report does not start at 12:00 A.M. Am I doing something wrong? Symantec Endpoint Protection Small Business Edition 2013 1. Do I need to remove the antivirus software already on my computer to install Endpoint Protection? 2. We have a few Mac computers, we are using Endpoint Protection from the cloud. Can we put the Endpoint Protection Agent on them? 3. All of our users have USB storage devices that they plug into their computers. We are concerned that the users could infect our computers or take important information out of our network. Can USB Device Control help? 4. If we block USB storage devices, how can our desktop administrators use their USB storage devices? 5. We added a dozen new users and don't have enough licenses. How do we add more licenses? 6. Is there a limit to the number of computer endpoints that I can add to an Endpoint Protection account? 7. Will my users' computers be protected when they're not connected to the Internet? 8. How big are the signature updates and how often are they pushed to the endpoints? 9. When new features for Endpoint Protection are released, is the client automatically updated or upgraded? 10. The Application Compatibility Check window appeared during the installation of the Endpoint Protection Agent. What do I do now? 11. Can Endpoint Protection be installed on our company servers? 12. Can I turn off antivirus protection for my servers through the management Page 7 of 9
console? 13. Can I initiate a scan of my servers through the management console? 14. What's the best way to see the condition of my endpoints? 15. I cannot delete the quarantine files from the management console on our Windows 2008 servers. How can I delete the files in the quarantine? 16. The Endpoint Protection agent on the server and the management console History page report: "File System Auto-Protect is not functioning correctly" and the Fix button does not work. What should I do? 17. The extra email Contact Methods that I set up for my new management console users do not get alerts. What can I do? 18. Is there a quick start guide to familiarize me with Endpoint Protection? 19. Our policy disables SONAR; desktops using it are never recognized as secure. Clicking Fix turns on SONAR in violation of our policy. Can we fix that to show our computers as secure? 20. We installed Protection Agents on our computers, but the little green check marks don't show up in Google searches on some XP computers. What did we do wrong? 21. We want to put Endpoint Protection on our terminal server but do not fully understand how the service works when set up that way. Can you explain? 22. We do not want our users disabling the antivirus and firewall on their computer. Can we do that with Endpoint Protection policies? 23. I use email invitations to deploy Endpoint Protection, but some users told me that they never get their invitation. What should I do? 24. Email invitations to download Endpoint Protection work well, but for the initial deployment, is there an easier way to install Agents on all of our desktops? 25. We did a silent install of the agent to our workstations using the redistributable package. The install failed but there were no errors displayed. What's wrong? 26. Is there a way to prevent Endpoint Protection from scanning our databases and home grown applications? 27. We added file and folder exclusions to the Accounting department's policy, but when we reopen the policy the exclusions are gone! 28. We use the default Endpoint Security policy. How do we turn on File and Printer Sharing? Page 8 of 9
29. What is program control and what does it do? 30. Is there any easy way to force an update of antivirus definitions across all of our computer groups? 31. We were testing the Endpoint Protection firewall service and accidentally blocked our DNS server with a custom firewall rule. How do we fix it? 32. Some endpoint computer users reported a message that the DHCP lease for their computer expired. Those computers can no longer communicate. The problem seems to be spreading. Any suggestions? 33. Is there any way to test a policy with custom firewall rules before deployment to the entire organization? Page 9 of 9