MANAGED SECURITY SERVICES



Similar documents
SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

Endpoint Security More secure. Less complex. Less costs... More control.

Managed Security Services D e l i vering real-time protection to help organizations st r e n g t h e n their security posture in the face of today s

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Payment Card Industry Data Security Standard

Norton Personal Firewall for Macintosh

INSIDE. Demystifying the Managed Security Service Provider Market. Symantec Enterprise Security

Symantec AntiVirus Enterprise Edition

Managed Security Services for Data

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Symantec Messaging Gateway powered by Brightmail

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Small and Midsize Business Protection Guide

Current IBAT Endorsed Services

Data Sheet: IT Compliance Payment Card Industry Data Security Standard

Symantec Messaging Gateway 10.6

Symantec Messaging Gateway 10.5

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Solution Brief: Enterprise Security

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

Security for Small Businesses: What's the Right Solution For You?

How To Protect Your Network From Attack From A Network Security Threat

INFORMATION PROTECTED

IBM Internet Security Systems products and services

IBM Global Technology Services Preemptive security products and services

Symantec Residency and Managed Services

Symantec Security Program Assessment

Symantec Endpoint Protection

Security and Services

Symantec Security Compliance Solution Symantec s automated approach to IT security compliance helps organizations minimize threats, improve security,

Symantec Enterprise Vault for Lotus Domino

Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives. Initiation date: January 2012

Symantec Control Compliance Suite. Overview

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

MANAGED SERVICES PROVIDER. Dynamic Solutions. Superior Results.

INSIDE. Managing Security Incidents in the Enterprise. Security Management

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Threat and Vulnerability Management Plan

How To Buy Nitro Security

INSIDE. Securing Network-Attached Storage Protecting NAS from viruses, intrusions, and blended threats

Cisco Security IntelliShield Alert Manager Service

Managed Services. Business Intelligence Solutions

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Symantec enterprise security. Symantec Internet Security Threat Report April An important note about these statistics.

Symantec Advanced Threat Protection: Network

SAS. Fraud Management. Overview. Real-time scoring of all transactions for fast, accurate fraud detection. Challenges PRODUCT BRIEF

The Symantec Approach to Defeating Advanced Threats

Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control

How To Protect Your It Infrastructure

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Symantec Protection Suite Small Business Edition

Windows Rootkit Overview

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Building a Web Security Ecosystem to Combat Emerging Internet Threats

Total Protection for Compliance: Unified IT Policy Auditing

McAfee Service Provider Program

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.

2012 Endpoint Security Best Practices Survey

INSIDE. Neural Network-based Antispam Heuristics. Symantec Enterprise Security. by Chris Miller. Group Product Manager Enterprise Security

Payment Card Industry Standard - Symantec Services

Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES

What is Security Intelligence?

The SIEM Evaluator s Guide

WHITE PAPER: ENTERPRISE SECURITY MANAGEMENT. Sarbanes-Oxley Compliance Reports Security and Audit Directors Live For

INSIDE. Information Security Challenges in the Electric Power Industry

McAfee Security Architectures for the Public Sector

Symantec Cyber Security Services: DeepSight Intelligence

Q1 Labs Corporate Overview

B database Security - A Case Study

Leveraging security from the cloud

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

PREEMPTIVE SECURITY IS HERE INTERNET SECURITY THAT stops THREATS BEFORE impact Security Product Family Ahead of the threat.

Cyber Security Services: Data Loss Prevention Monitoring Overview

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

Security. Security consulting and Integration: Definition and Deliverables. Introduction

Selecting a Managed Security Services Provider: The 10 most important criteria to consider

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

Frequently Asked Questions. Frequently Asked Questions: Prioritizing Trust: Certificate Authority Security Best Practices

Intelligent. Data Sheet

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Choosing an Effective Managed Security Services Partner. An Allstream / Dell SecureWorks White Paper

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Proactive IT Solutions More Reliable Networks Are Our Business

SAAS VS. ON-PREMISE SECURITY. Why Software-as-a-Service Is a Better Choice for and Web Threat Management

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

Tough Times. Tough Choices.

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

Advantages of Managed Security Services

Achieving SOX Compliance with Masergy Security Professional Services

V1.4. Spambrella Continuity SaaS. August 2

Choosing a Server to Fit your Business

Advanced Threat Protection with Dell SecureWorks Security Services

Protect Your Enterprise With the Leader in Secure Boundary Services

Intelligent Infrastructure for Security

INSIDE. Cyberterrorism and the Home User By Sarah Gordon, Senior Research Fellow

Transcription:

MANAGED SECURITY SERVICES True Managed Security Services give you the freedom and confidence to focus on your business, knowing your information assets are always fully protected and available.

Finding the right partner for the monitoring and management of network security can save an organization thousands of dollars every month while markedly improving the company s overall security posture.

Securing information assets from internal and external threats has become a highly complex IT function, demanding significant investment in expertise, systems infrastructure, and 24/7 oversight. Symantec Managed Security Services give you cost-effective access to the sophisticated resources, domain knowledge, and professional experience that every company needs. We ve made security our core competency, so you don t have to.

What to consider when considering Managed Security Services Some things you just can t do yourself Symantec DeepSight proprietary global monitoring system and five Security Operations Centers provide the earliest possible warning of new threats emerging on the Internet and corporate networks. Threats have gotten faster, more frequent, and more In the first six months of 2004, the overall volume of blended threat submissions to Symantec increased by 58% over the last half of 2003. (Source: Symantec Internet Security Threat Report, September 2004) dangerous Symantec s analysts are the most experienced in the industry and monitor your network 24/7, providing real-time analysis and recommendations to prevent vulnerabilities and attacks from becoming security crises. You want active management, not just administration Symantec continuously collects and analyzes network data, proactively looks for vulnerabilities, and regularly updates security content to keep your information assets secure and available. Better security can be more cost-effective security Symantec s reach allows you to avert a security crises without the cost of adding staff, and our tiered service offerings let you tailor spending to your specific security needs.

You can trust an acknowledged leader Industry analysts have consistently placed Symantec among the leaders when assessing Managed Security Service providers, ranking highly for both the completeness of our vision and our ability to execute. Outsourcing should not mean out of your control Symantec Secure Internet Interface gives you an up-to-theminute view of your security status, as well as tools to adjust responses to identified vulnerabilities or incidents as they occur. One size does not fit all in managed security Symantec s broadly experienced experts understand and apply best security practices and proven processes for different industries, including energy, finance, government, health care, and insurance. Symantec Managed Security Services was named the most trusted security service provider in a survey by The Yankee Group. According to the results of The Yankee Group s Enterprise Security Spending Survey, Symantec Managed Security Services took the number one spot with 31 percent of the survey s respondents naming it their most trusted choice. (Source: Yankee Group Enterprise Security Spending Survey) Not every provider can support third-party products Symantec can. Our services expand beyond Symantec products, and of the more than 3.000 security devices we currently manage for our 600+ clients, more than 80% are non-symantec products.

In network security there is no substitute for experience. And no one has more experience than Symantec W hen you have a network security partner, you want the most advanced technology available and an experienced team of analysts who can quickly and successfully respond to threats. This combination is the key to superior security for your enterprise. And only Symantec has it. Global Intelligence Worldwide attack trends show that there were 900 million infection attempts in 2003, up from 150 million in 1999. (Source: Symantec Vision and Technology Outlook) Symantec has built and refined the most sophisticated advancedwarning system in the security industry. Through our Symantec DeepSight network (over 20,000 sensors) and five security operations centers, we can see new threats emerging anywhere on the Internet or leading corporate networks around the world. The professionals in our operations centers are highly experienced and certified to BS7799 standards, ensuring that we translate our unsurpassed global intelligence into effective network security for our clients.

Broad Domain Expertise Our analysts and engineers are also familiar with a broad range of security issues in an equally broad range of industries, including health care, energy, finance, insurance, government, and more. We understand the unique challenges that can arise, and we know the best practices and certification standards that have been established in different industries and across the world. Whatever your business and whatever you need to support from e-commerce to a wireless/ mobile workforce to comprehensive B2B integration Symantec professionals understand how to optimize network security to keep your enterprise up, running, and growing, no matter what happens. Flexible, Cost-Effective Security Maintaining this high degree of security in-house is an increasingly E-commerce received the most targeted atacks of any industry during this period. Small Business received the second most. (Source: Symantec Internet Security Threat Report, September 2004) difficult and expensive challenge for most corporations. Symantec makes it easier and affordable, with flexible solutions outsource all or a part of your security activities and tiered levels of service tailored to your specific needs. We strengthen your ability to withstand attacks and so minimize the costs associated with information corruption, theft, and downtime. And we free you to focus on your revenue- and profit-generating core competencies, while ensuring that your information assets are secure and available.

Monitoring and management from the world leader in enterprise security S ymantec Managed Security Services offer several unique and compelling advantages for clients who choose to outsource some or all of their network security. We monitor security data from our clients network. This goes beyond just determining whether certain devices are operational or not; for Symantec it means the continuous collection, correlation, and real-time analysis of the detailed security data generated by all of the devices on your network 92% of businesses were attacked in 2003. 75% of the businesses acknowledged the fact. 4% measured the impact of the attack a $12.5 billion dollar impact. (Source: Symantec Vision and Technology Outlook) (whether made by Symantec or a third-party vendor). In our experience, that s the only way to quickly identify and stop an attack on your enterprise. That s why it is an integral part of several Symantec Managed Security Services offerings. Symantec Monitored and Managed Firewall Services Monitoring and management of firewall products from Symantec and leading third-party vendors. Continuous real-time analysis of data, as well as comprehensive management of configuration, rule changes, VPN modifications, and system upgrades.

Symantec Monitored and Managed Intrusion Detection Services Monitoring of network- and host-based IDS and management of network-based IDS solutions from Symantec and leading third-party vendors. Continuous real-time analysis of data, as well as management of configuration, signature updates, and software upgrades. Symantec Monitored and Managed Integrated Security Appliance Services Monitoring and management of integrated gateway solutions comprised of firewall, antivirus, content filtering, intrusion detection, and VPN. Services include configuration, signature management, rule changes, web site blocking, and system upgrades. CIOs and senior IT executives rank Symantec No. 1 in overall vendor value. According to an independent survey conducted by CIO Insight, a Ziff Davis publication, Symantec outperformed 40 leading IT vendors to receive the highest overall rating for value and reliability. (Source: CIO Insight Vendor Value Survey)

Strengthen any or all elements of your security infrastructure O ur Managed Security Services offerings are designed to be as flexible as our clients need them to be. Some organizations want an across-the-board managed solution with monitoring and management of all security activities. Others may outsource only a portion of their security infrastructure or need management and maintenance only of certain security devices. For such managementonly engagements, our analysts and systems engineers design a solution for each client based on best practices for the devices in As these numbers indicate, during the six-month period from January to June 2004, 96% of new vulnerabilities were rated as high or moderate severity. (Source: Symantec Internet Security Threat Report, September 2004) question. We then apply management procedures to guarantee each device conforms at all times to the set standards. We have the staff experience and proven processes to make this kind of rigorous third-party management successful, which clearly differentiates Symantec from other Managed Security Service providers. Symantec Security Policy Compliance Service Audits all elements of security infrastructure to determine if systems are in compliance with corporate policies and/or industry regulations. Reports identify all areas of vulnerability with prioritized recommendations to bring systems into compliance.

Symantec Internet Vulnerability Assessment Service Scans and tests the integrity and effectiveness of all Internet-facing elements mail servers, DNS servers, e-commerce servers, and security devices to identify areas of vulnerability. Regular reports alert clients to system changes and offer prioritized recommendations. Over the past year alone, it is estimated that phishing cost U.S. banks and credit card issuers nearly US$1.2 billion in damages. It is further estimated that over 1.78 million people have fallen victim to online fraud as a result of phishing. (Source: Symantec Internet Security Threat Report, September 2004) Symantec Virus Protection Service Protects against viruses, spam, and unwanted web content at the network gateway. Services include configuration of system to client specifications and continuous updating of virus and patch definitions based on intelligence from Symantec s global surveillance.

The only approach to information management that combines security and administration Symantec s Managed Security Services can instantly transform the security posture of any organization, improving not only the safety and availability of information assets, but also the overall efficiency of the security function. With in-depth intelligence on global threats, detailed analysis and solutions based on best practices, and highly advanced, vendor-neutral security technology all delivered by a worldclass team of professionals Symantec s service offerings are the ideal foundation for clients building an integrated framework of security and administration for their enterprise. M aximizing the value of your information assets means more than keeping them secure; it also means keeping them available, anytime and anywhere in your enterprise. That s why Symantec provides world-class enterprise administration tools to complement our industry-leading security products and services. The growing complexity of corporate networks coupled with the increasing sophistication of blended threats and other attacks has made best-of-breed solutions whether for administration or security insufficient for the kind of split-second, manifold response necessary to keep a network up and running under even optimal conditions. Symantec pioneered integrated security, by combining advanced virus protection, firewall, spam/content filtering, intrusion detection, and vulnerability assessment into unified, interoperable solutions. Now we are taking the next logical step and incorporating our security and administration tools into an interoperable information management solution that can reduce disruptions, increase uptime, enhance responsiveness, and improve productivity and decisionmaking. It is a holistic, balanced approach that strengthens overall control of your network and ensures the integrity of your information. And it is only available from Symantec.

Information Integrity Information is the engine of your business, and you need to ensure that it is always secure and always available throughout your enterprise. That s why Symantec s approach to IT management is designed to simultaneously provide world-class security and world-class administration of your network resources. We call the result information integrity. It is a revolutionary new approach to information management designed to keep your business up, running, and growing, no matter what happens.

Strengthen the security and management of your enterprise assets. Call Symantec

For more information on Symantec Security Devices or for a product demonstration, contact us at: 1 (800) 000-0000 security@symantec.com

About Symantec Symantec is the global leader in information security providing a broad range of software, appliances and services designed to help individuals, small and mid-sized businesses, and large enterprises secure and manage their IT infrastructure. Symantec s Norton brand of products is the worldwide leader in consumer security and problem-solving solutions. Headquartered in Cupertino, California, Symantec has operations in 35 countries. More information is available at www.symantec.com. Symantec has worldwide operations in 35 countries. For specific country offices and contact numbers please visit our Web site. For product information in the U.S., call toll-free 1 800 745 6054. Symantec Corporation World Headquarters 20330 Stevens Creek Boulevard Cupertino, CA 95014 USA 1 408 517 8000 1 800 721 3934 www.symantec.com Symantec, the Symantec logo, DeepSight, ON icommand, ON ipatch, Symantec Client Security, Symantec DeepSight, Symantec Enterprise Security Manager, Symantec Gateway Security, Symantec Gateway Security 5400 Series, Symantec Incident Manager, and Symantec Managed Security Services are registered trademarks and/or trademarks of Symantec Corporation and/or its subsidiaries. All other brands and products are trademarks of their respective holder/s. Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. Not all products are available in all countries. All product information and availability subject to change without notice. 10/04 10313556