Symantec Federal Solutions

Similar documents
INFORMATION PROTECTED

Payment Card Industry Data Security Standard

Symantec Mobile Management 7.1

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management 7.1

Symantec Mobile Management 7.2

Confidence in the Cloud Five Ways to Capitalize with Symantec

Symantec Enterprise Vault and Symantec Enterprise Vault.cloud

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information

2012 Endpoint Security Best Practices Survey

Public, Private, Hybrid:

PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud

Symantec Enterprise Vault for Microsoft Exchange

Symantec Mobile Security

Solution Brief: Enterprise Security

Small and Midsize Business Protection Guide

overview Enterprise Security Solutions

Symantec Enterprise Vault for Microsoft Exchange Server

Is Your Vendor CJIS-Certified?

Symantec Backup Exec 2012

Confidence in a Connected World. MEEC Symantec Product Availability. John Lally MD Education Account Executive John_Lally@symantec.

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

Athena Mobile Device Management from Symantec

Optimizing the Data Center for Today s State & Local Government

Symantec Enterprise Vault for Microsoft Exchange

Symantec NetBackup 7.5 What s New and Version Comparison Matrix

How To Monitor Your Entire It Environment

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Is online backup right for your business? Eight reasons to consider protecting your data with a hybrid backup solution

Symantec Encryption Solutions for , Powered by PGP Technology

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments

Optimizing the Data Center for Today s Federal Government

Demystifying Virtualization for Small Businesses Executive Brief

How To Support Bring Your Own Device (Byod)

Symantec Protection Suite Add-On for Hosted and Web Security

Symantec Endpoint Protection

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

Securing Office 365 with Symantec

overview Enterprise Security Solutions

Solution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments

Injazat s Managed Services Portfolio

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

Symantec Protection Suite Small Business Edition

Archiving, Backup, and Recovery for Complete the Promise of Virtualization

Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Symantec Messaging Gateway 10.6

Symantec Messaging Gateway powered by Brightmail

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Symantec Backup Exec 2012 Licensing Guide

The Impact of HIPAA and HITECH

Symantec IT Management Suite 7.5 powered by Altiris

Symantec Endpoint Protection

Symantec Messaging Gateway 10.5

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Symantec Backup Exec 2010

Proven LANDesk Solutions

Symantec Mobile Management Suite

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Symantec NetBackup 7.5 for VMware

OVERVIEW. Enterprise Security Solutions

Veritas Enterprise Vault for Microsoft Exchange Server

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information

Endpoint Protection Small Business Edition 2013?

MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST

Cyber Security Services: Data Loss Prevention Monitoring Overview

How to Unlock Agility by Backing up to, from, and in the Cloud

Effective, Affordable Data Management with CommVault Simpana 9 and Microsoft Windows Azure

Symantec Endpoint Protection

SYMANTEC ENTERPRISE SOLUTION STRATEGY

Symantec Enterprise Vault.cloud Overview

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Symantec Endpoint Security Management Solutions Presentation and Demo for:

Trend Micro Cloud Security for Citrix CloudPlatform

Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization.

Symantec Client Management Suite 7.5 powered by Altiris

Symantec Enterprise Vault for Lotus Domino

Altiris IT Management Suite 7.1 from Symantec

The User is Evolving. July 12, 2011

Altiris IT Management Suite 7.1 from Symantec

Cloud Storage Backup for Storage as a Service with AT&T

How To Protect Your Cloud From Attack

UNCLASSIFIED. UK Archiving powered by Mimecast Service Description

ALERT LOGIC FOR HIPAA COMPLIANCE

Preemptive security solutions for healthcare

Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise

Devising a Server Protection Strategy with Trend Micro

SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5

Transcription:

Symantec Federal Solutions

Table of Contents 1. Introduction a. Symantec Public Sector b. The Federal Government IT Landscape and Challenges c. Symantec Government IT Solutions 3. Mobile 4. Data Center Management a. Storage Optimization b. Archiving and Deduplication c. Backup and Recovery d. Appliances

2. Security a. Endpoint Security b. Endpoint Management c. Encryption d. Messaging Security e. Authentication f. Data Loss Prevention g. Web Security 5. Virtualization 6. Cloud 7. Product Table 1 Introduction

Introduction

Symantec Public Sector Symantec is a global leader in providing security, storage, and systems management solutions to help consumers and organizations secure and manage their information-driven world. Symantec s Public Sector organization is focused on delivering the company s IT solutions to civilian, Department of Defense, Intelligence agencies, state and local governments, and education institutions. Our solutions protect against more risks at more points, more completely and efficiently, to enable confidence wherever information is used or stored. Federal agencies rely on Symantec to fulfill their security, mobile, data center, virtualization, and cloud initiatives. Our solutions enable organizations to comply with federal IT regulations and mandates such as FIPS 140-2, OMB 06-16, the Data Center Consolidation Initiative, and multiple other federal requirements. This reference guide provides an overview of how Symantec s solutions can help the federal government deliver on its mission to serve citizens. 2

Cybersecurity & Sophisticated Attacks Information Explosion Consumerization of IT Complex & Changing Infrastructure

Federal government IT landscape and challenges Federal organizations are facing multiple IT challenges in four primary areas: cybersecurity and sophisticated attacks, information explosion, consumerization of IT, and complex and changing infrastructure. These four trends are having a profound effect on the ability of government agencies to protect and manage an explosion of information. Moving applications to the cloud, consolidating data centers, managing mobile devices, and authenticating users are approaches that government agencies are leveraging to become more secure and efficient. To prevent these trends from delaying their mission-critical operations, government agencies must have a clear strategy for identifying and adopting IT solutions that secure, manage, and protect their information. 3

Symantec government IT solutions Symantec brings together leading technology solutions that work seamlessly across multiple platforms, giving customers the freedom to use the devices of their choice and to access, store, and transmit information anytime, anywhere. Symantec s solutions for federal government agencies include: security, mobile, data center, virtualization, and cloud. Its security and management solutions help ensure that information, identities, infrastructure, and processes are protected, managed, and controlled across physical and virtual platforms. Likewise, its data center management solutions enable government agencies to optimize storage, back up, archive, recover critical information, reduce overall storage costs, and more efficiently manage and discover the information. Finally, Symantec s solutions enable agencies to migrate to the cloud and secure their cloud computing environments, manage and secure mobile devices, and manage virtual computing environments with greater visibility and efficiency. 4 Security

Security

Security Nothing is more important to government agencies today than a well-secured and managed IT environment. Security threats are becoming more targeted, more prolific, and more sophisticated. Symantec s information security solutions protect and secure data regardless of the device it is being accessed on, where it resides, and whether it is in motion or at rest. Endpoint security Symantec endpoint security solutions provide comprehensive threat protection for enterprise endpoints including desktops, servers, laptops, and mobile devices. This technology includes Symantec s world-leading antivirus, antispyware, firewall, encryption, device, and application control, intrusion protection, and network access control. Symantec s award-winning technology boosts the performance, accuracy, and detection for identifying threats against physical and virtual systems and mitigating those threats. Symantec takes a proactive security approach to preventing intrusions and targeted attacks before they reach the endpoint. Symantec s endpoint protection provides protection against even the most sophisticated attacks that evade traditional security measures such as root kits, zero-day attacks, and mutating spyware. 5

Endpoint security highlights Identifies and secures confidential data on all laptops, desktops, and mobile devices Protects and prevents your information from accidental data loss and assures protection against unauthorized access Prevents intrusions and stops attacks before they reach endpoints Protects endpoints from known and unknown threats, using advanced threat prevention Provides integrated antivirus, antispyware, firewall, and intrusion prevention as well as device control and application control with one single agent Compliance areas supported FISMA, USGCB/FDCC, OMB 06-16, FIPS 140-2, DCID 6/3, IAVA, Section 508 of the U.S. Rehabilitation Act 6

Endpoint management Over 70 percent of an organization s total cost of owning a client system can go toward the support and maintenance of the endpoint. Symantec s endpoint management solutions automate time-consuming and redundant tasks to minimize efforts and costs associated with deploying, patching, and supporting client systems and software. Organizations can manage more technologies with greater efficiencies on more platforms with Symantec endpoint management solutions. 7

Endpoint management highlights Easily identifies system assets through comprehensive hardware and software inventory Automates migrations, operating system upgrades, patch management, imaging, and deployment updates Improves efficiencies and reduces costs through intelligent software management and delivery Proactively manages software updates and provides global remote assistance capabilities Ensures data protection by recovering lost data, rolling back to a known good state, or completely recovering the client system Tracks and manages asset configurations throughout the IT lifecycle

Compliance areas supported FISMA, USGCB/FDCC, OMB 06-16, FIPS 140-2, DCID 6/3, IAVA, Section 508 of the U.S. Rehabilitation Act 8

Encryption Symantec endpoint encryption software provides advanced data and file encryption for desktops, laptops, and removable storage devices. It offers scalable, enterprise-wide security that prevents unauthorized access by using strong access control and powerful encryption. Symantec endpoint encryption provides a central management console, enabling safe, central deployment and management of encryption to endpoints.

Encryption highlights Full disk, removable storage, and device control endpoint encryption solutions Controls access to ports, devices, and wireless networks Automatic, on-demand, and content-driven encryption of removable storage Monitors and restricts users ability to copy protected classes of information Self-decrypting archives for secure, one-way distribution of encrypted files Compliance areas supported OMB-06-16, NIST FIPS-140-2 validated, Common Criteria 9

Messaging security Symantec secures more than 8 billion email connections daily and protects more than 850 million mailboxes from threats and attacks targeted at inbound and outbound email with integrated antispam, antivirus, advanced content filtering, data loss prevention, and encryption. Customers can choose from a range of delivery options including on-premise (software, appliance, virtual), cloud, managed services, and hybrid implementations.

Messaging security highlights Protects against malware and filters content over inbound and outbound email Blocks more than 99 percent of spam with less than one in one million false positives Accurate, effective, real-time antispam and antivirus protection, advanced content filtering, data loss prevention, and encryption Cost-effective with reputation-based filtering that can block up to and more than 90 percent of threats at connection time Improves Exchange /Domino performance by reducing the volume of messages processed Compliance areas supported PCI, HIPAA, ITAR, OFAC, Data Protection Act 10

Authentication Symantec provides authentication solutions to enable organizations to protect their identities, secure their data, and enable trust in online transactions. Symantec s comprehensive suite of authentication solutions are delivered via secure, scalable cloud-based services and enable e-government by providing security services needed to protect interactions between government employees, industry partners, and citizens. Symantec s authentication solutions have been tested and certified for compliance with U.S. federal government technical and policy requirements. 11

Authentication highlights Uses managed PKI solutions to issue digital certificates for people, Web servers, devices, and applications to enable trusted, authenticated online transactions Identity credentialing solutions for issuing and managing Personal Identity Verification (PIV) and (PIV-I) smart cards for use as employee badges and for physical and logical accesses to IT systems and facilities One-time password solutions for remote access by employees, partners, and citizens to government websites Fraud detection service for real-time detection of anomalous behavior and suspicious transactions Unique, easy-to-deploy, cloud-based service that balances cost, convenience, and risk

Compliance areas supported FIPS 201, FIPS 140-2, HSPD-12, PCI, HIPAA LOGIN 12

Data loss prevention (DLP) In the past few years, DLP technology has become an indispensible part of a security portfolio. Data loss is a serious, yet preventable, IT problem that can happen in any organization of any size through malicious intent or by a well-meaning insider. Symantec, the recognized world leader in DLP, delivers a proven, content-aware solution to discover, monitor, and protect confidential data wherever it is stored or used. Symantec allows customers to reduce their risk of a data breach, demonstrate regulatory compliance, and safeguard privacy and intellectual property.

DLP highlights Recognizes sensitive data based on samples and creates policies to protect unstructured data Monitors and blocks sensitive files accessed by any application, including encrypted protocols Co-locates DLP with your hosted service provider to extend the DLP into the cloud Compliance areas supported HIPAA, Privacy Act, Cyberscope, OMB 6-16, 7-16, 11-8, 6-19 13

Web security The Web and Web applications have become major sources of malware infections in organizations. Attackers are exploiting these threats using rapidly changing malware. Because of the quickly evolving threat landscape, few organizations are able to secure their Internet gateways from Web-borne malware, which leaves them vulnerable to attacks. Symantec uses a proactive approach to combat Web-borne malware by providing Web security solutions to protect infrastructures from malicious activity and to ensure that users stay safe on the Web.

Web security highlights Symantec s Web security is backed by the Symantec Global Intelligence Network of more than 175 million users to identify new threats before they cause disruptions in organizations Protects and secures networks from malicious attacks Protects users from visiting infected websites or legitimate sites infected by malware Demonstrates and enforces compliance for Web policies Protects Web presence and confidential information from external attacks and data loss Compliance areas supported PCI DSS 14 Mobile

Mobile

Mobile Everyday government employees are doing more work using mobile devices, smartphones, laptops, tablets, and more. Mobility is making people more productive and efficient, but it s also creating new challenges for organizations. Symantec s Mobile Device Management (MDM) solutions secure remote access for mobile endpoints and help agencies enforce security and network compliance policies across their organizations. 15

Mobile solutions highlights Comprehensive enterprise security for all leading mobile platforms including iphone, ipad, and Android Policy management of Android, WebOS, and Windows Phone 7 devices Selective wipe capabilities to isolate the corporate data on personal devices Advanced application and content distribution to mobile devices in the field Strong authentication to the network resources and applications with managed PKI infrastructure Integration with Symantec Endpoint Management Suite for unified management of PCs, laptops, smartphones, and tablets 16 Data Center Management

Data Center Management

Data center management According to industry analysts, data is growing at 30 percent to 60 percent per year, which means managing your storage infrastructure is no easy task. Symantec helps organizations gain control of sprawling infrastructures with solutions for storage optimization, backup and recovery, archiving, and discovery. Storage optimization Today, organizations are storing more information as their employees create increasingly more electronic content. Much of this content must be kept and made readily available to meet compliance mandates and audit requirements. Symantec s storage optimization solutions provide the ability to migrate between storage hardware seamlessly, move information from expensive to inexpensive disk, provide shared structures where appropriate, and increase the overall utilization of storage already in the data center. 17

Storage optimization highlights Dynamic storage tiering with multiple operating systems Minimal downtime to adopt/migrate between storage resources Ability to actively monitor and report against multiple physical storage vendors Thin provisioning allows for better utilization of physical assets Solutions available for physical, virtual, and cloud environments Compliance areas supported Common Criteria 18

Archiving and deduplication Symantec s archiving and deduplication solutions automatically back up data and move it to a static, lower-cost platform while removing redundancies in the information. This transparent process of moving and retaining unstructured data improves performance, scalability, and manageability of applications while reducing risk and costs. Once the data is archived, Symantec offers an end-to-end comprehensive ediscovery solution to quickly locate and produce information in response to litigation matters and internal or external requests.

Archiving and deduplication highlights Enables more efficient use of storage for data protection Collects key information that makes your data more extensible Reduces storage costs by up to 60 percent by archiving and deduplicating across multiple content sources Reduces operating and training costs, increases process efficiency, and implements quickly Quickly and automatically discovers information across email, desktops, file servers, backups, and the cloud Provides ability to take information out of the traditional backup cycle Integrates with Symantec Data Loss Prevention Compliance areas supported DOD 5015.2-STD, FIPS 140-2, 36 CFR 1234.24, NARA Bulletin 2008-05, OMB M-04-16, 06-16, 08-15 19

Backup and recovery Symantec s backup and recovery solutions protect information by automating advanced technologies and standardizing operations across applications, platforms, and virtual environments. That means being able to protect completely, store efficiently, recover anywhere, and manage centrally across heterogeneous operating systems and storage hardware, including tape and disk.

Backup and recovery highlights Integrates with software APIs and various applications within organizations infrastructures, such as Oracle, Microsoft SQL, and Microsoft Exchange. Risk management through continuous monitoring: discover, assess, and remediate Reduces operating and training costs, increases process efficiency, and implements quickly covering physical, virtual, and cloud environments Appliance option combines software and hardware into a pretested known performance profile, providing agencies with operational simplicity, effective utilization of bandwidth and storage, and high performance Scalable appliances that reduce the need for re-engineering environments prior to deployment Global deduplication leverages deduplication across multiple clients and across appliance nodes Compliance areas supported FISMA 140-2, Common Criteria 20

Appliances Symantec has a comprehensive set of physical and virtual appliances capable of securing and managing information to sanitize messaging streams, solve log management problems, and address enterprise security incident response services. Current challenges like data retention, audit requirements, and the lack of IT resources have made it increasingly difficult to manage information effectively. Symantec appliances are capable of collecting and processing data at high volume rates, storing information in a way that is quickly retrievable, and protecting data from attacks and data leaks. Symantec s solutions give customers the ability to deliver the right information to the right people via self-service capabilities. The virtual appliance option offers greater flexibility in deployment and scalability considerations.

Appliances highlights Built-in client and media server deduplication Virtual machine aware deduplication and integrated virtual and physical deduplication Equipped with Symantec V-Ray, this provides for a unique visibility into virtual environments that speeds recovery and reduces storage costs Decrease storage by 10-50 times and up to 99 percent reduction in bandwidth consumption Starting at 4TB and expandable up to 36TB of useable disk, ideal for remote offices, regional offices, and enterprise data centers 21 Virtualization

Virtualization

Virtualization The widespread adoption of virtualization is altering IT management, deployment, licensing, and pricing. Symantec s virtualization solutions deliver advanced security and availability in addition to simplified storage management capabilities needed to virtualize federal agencies business-critical applications. Symantec s advanced technologies provide the visibility and control required to automate service-level processes, accelerate server and desktop virtualization deployments, and reduce the cost and complexity of managing and protecting high-density virtual and physical infrastructures. 22

Virtualization solutions highlights Provides anytime, anywhere access to workspaces Controls storage growth, eliminates backup and recovery bottlenecks, and ensures application-level disaster recovery Ensures application availability, coordinates new deployments and upgrades, and provides advanced monitoring for multi-tier applications Enables comprehensive data protection, security, storage management, and availability for virtual environments 23 Cloud

Cloud

Cloud The federal government s Cloud First policy requires federal agencies to shift from building custom systems to adopting leading-edge technologies and shared solutions to reduce costs and increase flexibility and speed. Symantec s cloud solutions support private, public, and hybrid cloud models and map to government requirements for operating, governing, managing, and securing information in the cloud. Our technologies help agencies manage and secure their environments as they move to cloud-based deployments. Symantec also works with key cloud service providers and telecommunication partners to provide government agencies with a complete suite of managed infrastructure services for mission-critical objectives and service to citizen applications, including cloud computing, collocation, network services, managed hosting, and security services. 24

Product Table Cloud solutions highlights Governing in the cloud: legal and ediscovery, compliance and audit, information lifecycle management Operating in the cloud: data center operations, disaster recovery, application security, identity, and access management Managing in the cloud: archiving, ediscovery, storage, and backup Securing in the cloud: real-time antispam, antivirus, content filtering, email encryption, data loss prevention, and compliance 25

Product Table Product Table S E C U R I T Y a. Endpoint Security b. Endpoint Management Antivirus, Critical System Protection, Endpoint Encryption, Endpoint Protection, Multi-tier Protection, Network Access Control, Protection Center, Protection Suite, Scan Engine, Whole Disk Encryption, PGP Portable, Security Information Manager, Risk Automation Suite IT Management Suite, Security Information Manager, Mobile Management, Endpoint Virtualization Suite c. Encryption d. Messaging Security Endpoint Encryption Messaging Gateway, Web Gateway, IM Manager, Mail Security, Multi-tier Protection, Protection Center, Protection for SharePoint Servers, Premium AntiSpam, Protection Suite, Security Information Manager e. Authentication f. Data Loss Prevention Validation and ID Protection Service (VIP), Managed PKI Service, VeriSign Identity Protection, Fraud Detection Service Critical System Protection, Data- Loss Prevention, Endpoint Encryption, Enterprise Vault, Protection Suite, Security Information Manager g. Web Security Data Loss Prevention Network, Protection Suite, Web Gateway, Security Information Manager MOBILE Validation and ID Protection Service (VIP), Mobile Management, Endpoint Protection, Network Access Control, Endpoint Encryption Device Control

DATA CENTER MANAGEMENT a. Storage Optimization Data Insight for Storage, FileStore, Storage Foundation, VirtualStore b. Archiving and Deduplication Enterprise Vault, Clearwell ediscovery Platform, Net Backup, Storage Foundation, Backup Exec c. Backup and Recovery NetBackup, Backup Exec, Enterprise Vault, System Recovery d. Appliances NetBackup, FileStore, Web Gateway, Security Information Manager VIRTUALIZATION ApplicationHA, Backup Exec, System Recovery, Cluster Server, Dynamic Multi-Pathing, NetBackup, Storage Foundation CLOUD NetBackup, Validation and ID Protection Service (VIP), Backup Exec.cloud, Enterprise Vault.cloud, Web Security.cloud, Email Security.cloud, Endpoint Protection.cloud, Managed PKI Service 26

About Symantec Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Headquartered in Mountain View, Calif., Symantec has operations in 40 countries. More information is available at www.symantec.com.

Symantec World Headquarters Mountain View, USA 350 Ellis Street Mountain View, CA 94043 USA Phone: +1 (650) 527-8000 www.symantec.com US Public Sector Headquarters 2350 Corporate Park Drive Suite 600 Herndon, VA 20171 USA Phone: +1 (800) 745-6054 www.symantec.com/publicsector_us Copyright 2011 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, Altiris, PGP, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. VeriSign is a registered trademark of VeriSign, Inc. VeriSign, VeriSign Trust and other related marks are the trademarks or registered trademarks of VeriSign, Inc. or its affiliates or subsidiaries in the U.S. and other countries and licensed to Symantec Corporation. Microsoft, Windows, and Exchange are trademarks of Microsoft Corporation in the United States, other countries, or both. Domino is a registered trademark of IBM Corporation. iphone and ipad are trademarks of Apple Inc., registered in the U.S. and other countries. Android is a trademark or registered trademark of Google, Inc. Oracle is a registered trademark of Oracle Corporation in the United States and/or other countries. Other names may be trademarks of their respective owners. 9/11 21213120 27

www.symantec.com/publicsector_us