You are on page 1of 31

Symantec

TM
Endpoint Management
Suite Customer Presentation
Manage. Secure. Recover.
2
Agenda
Todays IT Challenges 1
Symantecs Collaborative Architecture
Symantec
TM
Endpoint Management Suite
Connecting Symantec Technologies Today
Q & A
2
3
4
5
3
Natural
Disasters
Infrastructure
Failures
Human
Error
Malicious
Threats
Todays IT Challenges
Information
Traditional Protection isnt Good
Enough Anymore
4
Source: SearchSecurity.TechTarget.com
Evil geniuses who attack us with
zero-day attacks < 5%
System configuration represents 2/3
of all system weaknesses
65%
30% can be resolved through
patch management
30%
5%
A Secure Endpoint is a
Well-managed Endpoint
5
95%
Security problems
can be solved by
endpoint management
John Pescatore, Vice President, Gartner Inc.
Source: http://searchsecurity.techtarget.com/news/interview/0,289202,sid14_gci905234,00.html
Symantecs Collaborative Architecture
7
Open Collaborative Architecture:
Connecting People and Technology
Backup &
Recovery
Service Desk
Endpoint Security
Patch
Management
Workflow Execution
Monitor status
Close incidents
Distribute patches
Obtain change control approval
Update signatures
Kick-off backup process
Test patches
Notify risk management team
Comprehensive Network Discovery
Common Software Delivery Process
Centralized Reporting
Remote Administration

Configuration
Management
Database (CMDB)
Integration
on Altiris
Platform
8
Driving to Convergence
Solution
Native integration
Single view of compliance
Consolidated status reporting
Pre-built workflow processes
CMDB
Situation
Duplication of tasks
Gaps require manual processes
Multiple consoles and agents
Various data repositories
Overlapping policies
Symantec Leads the Way
July 2007 The Forrester Wave:
Client Management Suites, Q3 2007

Symantecs acquisition of Altiris in
Q2 2007 illustrates the impending
requirements of integrated security
and managementand that is
exactly what Symantec delivers.

9 Symantec Confidential
Weak Strategy Strong
Current
offering
Strong
Market presence
BMC Software
IBM
Microsoft
Novell
LANDesk
CA
HP
Full vendor participation
Contenders
Strong
Performers Leaders
Risky
Bets
Symantec
Natalie Lambert
Senior Analyst, Forrester
Symantec Offers the Most Mature
Client Management Suite
10
Introducing
Endpoint Management Suite
Inventory and discovery
Imaging and provisioning
Software delivery and
patch management
Remote administration
MANAGE
#1 in worldwide
software distribution
(IDC 2006)
Leader in client
management suites
(Forrester 2007)
Altiris

Client
Management Suite

6.0
Local and offsite backup
File and folder restore
Complete system recovery


RECOVER
#1 in worldwide data
protection and
recovery (IDC 2006)
Leader enterprise
backup/recovery
software (Gartner 2007)

Backup Exec

System
Recovery 8
Antivirus and
antispyware protection
Firewall
Intrusion prevention
Application and device control
SECURE
#1 in worldwide
secure content and
threat management
(IDC 2006)
Leader in endpoint
protection platforms
(Gartner 2007)

Symantec

Endpoint
Protection 11.0
Manage.
How are you managing your Windows

desktops and laptops?


IT Lifecycle Management
12
Endpoint
Security &
Management
Retirement
Procurement
Staging
Production
Transition &
Migration
Problem
Resolution
Monitor &
Track
Business
Continuity
Patch
Management
Asset
Identification
Contract
Management
Deployment &
Configuration
Application
Packaging & QA
Software Distribution
& Virtualization
Endpoint
Security
Altiris

Client Management Suite

6.0
13
Results
Inventory &
Discovery
Imaging &
Provisioning
Software Distribution
& Patch Management
Altiris
Client Management
Suite 6.0
14
Key Ingredients for Management
Inventory and Discovery
Populates CMDB with comprehensive
data for discoverable assets
Aggregates data across environment
in real time
Assists with software license
management
Helps forecast growth requirements
Inventory &
Discovery
Results
GM Brazil > Reduced annual
software license expenses by 44
percent within 45 days, equaling a
1,000 percent ROI
Reed Smith > Reduced inventory
time from one month to minutes
Key Ingredients for Management
Imaging and Provisioning
Comprehensive deployment capabilities
Image-based or scripted OS install
Ongoing updates/re-provisioning
Tools for hands-free and PC user
personality migrations
Facilitates implementation of
standardized desktop configurations
Reduces risks associated with
desktop changes

Results
Triple S > Reduced migration time
by 85 percent
U.S. Air Force > Responded to new
hardware imaging requests in 88
percent less time
Inventory &
Discovery
Imaging &
Provisioning
16
Key Ingredients for Management
Inventory &
Discovery
Imaging &
Provisioning
Software Distribution
& Patch Management
Software Distribution and
Patch Management
Implements policy-based
software management
Distribute applications, updates,
code, files to target systems
Proactively manage software updates
to minimize security risks
Automates patch distribution with
one-click creation of collections
and policies
Bandwidth-sensitive systems
management for the mobile workforce
and roaming worker
Results
Horizon > Improved software
delivery success rate from 60
percent to 90+ percent
Edwards Lifesciences > Able
to patch their 2,000 PCs in
less than two hours
Secure.
How are you protecting yourself from external threats?
Corporate Network
is Continually Exposed
Wireless
Networks
Web
Applications
Guests
Consultants
IPsec VPN
Employees
Working at Home
WANs
& Extranets
SSL VPN
Internet Kiosks
& Shared
Computers
19
Symantec Endpoint Protection 11.0
Antivirus &
Antispyware
Firewall
Intrusion
Prevention
Device and
Application Control
Reduced
Cost,
Complexity &
Risk Exposure
Increased
Protection,
Control &
Manageability
Results
Symantec Endpoint
Protection 11.0
20
Key Ingredients for Endpoint Protection
20
Spyware, Rootkits
Viruses, Trojans, Worms
Antivirus
Worlds leading antivirus solution
Most (37) consecutive VB100 Awards

Antispyware
Best rootkit detection and removal
VxMS = superior rootkit protection


Antivirus &
Antispyware
Source: Thompson Cyber
Security Labs, August 2006
21
Key Ingredients for Endpoint Protection
Worms, Spyware
Firewall
Industry-leading endpoint
firewall technology
Gartner Magic Quadrant Leader
four consecutive years
Rules-based firewall can dynamically
adjust port settings to block threats
from spreading

Antivirus &
Antispyware
Firewall
22
Key Ingredients for Endpoint Protection
0-Day, Key Logging
Intrusion Prevention
Combines NIPS (network) and
HIPS (host)
Generic Exploit Blocking (GEB)One
signature to proactively protect against
all variants
Granular application access control
TruScan

Proactive threat scanning


technology; very low (0.0049%) false-
positive rate
Detects 1,000 new threats per month
that are not detected by leading
antivirus engines

Antivirus &
Antispyware
Firewall
Intrusion
Prevention
No False
Alarm
False
Alarms
25M Installations
Fewer than 50 false positives for
every 1M PCs
Slurping, IP Theft
Key Ingredients for Endpoint Protection
Device and Application Control
Prevents data leakage
Restrict Access to devices (USB keys,
backup drives)
WhitelistingAllow only trusted
applications to run

Device and
Application Control
W32.SillyFDC
Targets removable
memory sticks
Spreads by copying itself onto
removable drives such as USB
memory sticks
Automatically runs when the
device is next connected to
a computer
Antivirus &
Antispyware
Firewall
Intrusion
Prevention
Recover.
How quickly can you recover from a loss or disaster?
The Cost of System Failure


Sales transactions
Manufacturing data
Email and other business data
Employee productivity
Company reputation
25
What would you lose if a
system crashed?
26
Symantec Backup Exec System
Recovery 8 Desktop Edition
Local or Offsite
Backup
Complete System
Recovery
File or Folder
Restore
Symantec Backup Exec
System Recovery 8
Reduced
downtime and
data loss
Increased
end-user
productivity
Results
27
Key Ingredients for Endpoint Recovery
Local or Offsite Backup
Create real-time, while-you-work
recovery points of the entire system
and save to any disk storage device
Supports full and incremental backups
to save disk space and increase
backup performance
Select from multiple compression
options: none, standard, medium,
or high
Select from multiple encryption options:
128-bit, 192-bit, or 256-bit AES
Automatically copy recovery points
(backups) to a network share, FTP
server, or external hard drive to
enhance disaster recovery efforts
Intelligently and uniquely identifies
and communicates to USB drives,
successfully running backup jobs even
if the drive letter for the device changes

Local or Offsite
Backup
Key Ingredients for Endpoint Protection
Complete System Recovery
Rapid recovery of entire systems, even
to dissimilar hardware or virtual
environments, breaks the barrier of
incompatible storage controllers and
hardware abstraction layers
Volumes can be resized during a
restore, making hard-drive upgrades or
full hardware migrations quick and easy


File or Folder Restore
Recovers individual files and folders in
seconds from either recovery points or
file/folder backups
Enables end-user recovery of files and
folders via Google Desktop

or Backup
Exec Retrieve using a common Web-
browser interface for fast and simple
recovery, without IT intervention


Local or Offsite
Backup
Complete System
Recovery
File or Folder
Restore
29
Altiris Console Integration
Centralized management
of agents
Centralized distribution
of clients
Create backup policies and
apply to desired systems
Leverage other components
within the management
framework
ThreatCon Integration
Integrates with Symantec
ThreatCon and DeepSight


Threat Management System*
Connecting Symantec
Technologies Today
* Only requires Internet connection. Does not require
Symantec Endpoint Protection Manager
Symantec Endpoint Management
Suite
Symantec continues
to drive innovation
through unique
technology convergence
and integration
Thank You!
Copyright 2008 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and
other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to
the maximum extent allowed by law. The information in this document is subject to change without notice.
31

You might also like