Professional Documents
Culture Documents
TM
Endpoint Management
Suite Customer Presentation
Manage. Secure. Recover.
2
Agenda
Todays IT Challenges 1
Symantecs Collaborative Architecture
Symantec
TM
Endpoint Management Suite
Connecting Symantec Technologies Today
Q & A
2
3
4
5
3
Natural
Disasters
Infrastructure
Failures
Human
Error
Malicious
Threats
Todays IT Challenges
Information
Traditional Protection isnt Good
Enough Anymore
4
Source: SearchSecurity.TechTarget.com
Evil geniuses who attack us with
zero-day attacks < 5%
System configuration represents 2/3
of all system weaknesses
65%
30% can be resolved through
patch management
30%
5%
A Secure Endpoint is a
Well-managed Endpoint
5
95%
Security problems
can be solved by
endpoint management
John Pescatore, Vice President, Gartner Inc.
Source: http://searchsecurity.techtarget.com/news/interview/0,289202,sid14_gci905234,00.html
Symantecs Collaborative Architecture
7
Open Collaborative Architecture:
Connecting People and Technology
Backup &
Recovery
Service Desk
Endpoint Security
Patch
Management
Workflow Execution
Monitor status
Close incidents
Distribute patches
Obtain change control approval
Update signatures
Kick-off backup process
Test patches
Notify risk management team
Comprehensive Network Discovery
Common Software Delivery Process
Centralized Reporting
Remote Administration
Configuration
Management
Database (CMDB)
Integration
on Altiris
Platform
8
Driving to Convergence
Solution
Native integration
Single view of compliance
Consolidated status reporting
Pre-built workflow processes
CMDB
Situation
Duplication of tasks
Gaps require manual processes
Multiple consoles and agents
Various data repositories
Overlapping policies
Symantec Leads the Way
July 2007 The Forrester Wave:
Client Management Suites, Q3 2007
Symantecs acquisition of Altiris in
Q2 2007 illustrates the impending
requirements of integrated security
and managementand that is
exactly what Symantec delivers.
9 Symantec Confidential
Weak Strategy Strong
Current
offering
Strong
Market presence
BMC Software
IBM
Microsoft
Novell
LANDesk
CA
HP
Full vendor participation
Contenders
Strong
Performers Leaders
Risky
Bets
Symantec
Natalie Lambert
Senior Analyst, Forrester
Symantec Offers the Most Mature
Client Management Suite
10
Introducing
Endpoint Management Suite
Inventory and discovery
Imaging and provisioning
Software delivery and
patch management
Remote administration
MANAGE
#1 in worldwide
software distribution
(IDC 2006)
Leader in client
management suites
(Forrester 2007)
Altiris
Client
Management Suite
6.0
Local and offsite backup
File and folder restore
Complete system recovery
RECOVER
#1 in worldwide data
protection and
recovery (IDC 2006)
Leader enterprise
backup/recovery
software (Gartner 2007)
Backup Exec
System
Recovery 8
Antivirus and
antispyware protection
Firewall
Intrusion prevention
Application and device control
SECURE
#1 in worldwide
secure content and
threat management
(IDC 2006)
Leader in endpoint
protection platforms
(Gartner 2007)
Symantec
Endpoint
Protection 11.0
Manage.
How are you managing your Windows
6.0
13
Results
Inventory &
Discovery
Imaging &
Provisioning
Software Distribution
& Patch Management
Altiris
Client Management
Suite 6.0
14
Key Ingredients for Management
Inventory and Discovery
Populates CMDB with comprehensive
data for discoverable assets
Aggregates data across environment
in real time
Assists with software license
management
Helps forecast growth requirements
Inventory &
Discovery
Results
GM Brazil > Reduced annual
software license expenses by 44
percent within 45 days, equaling a
1,000 percent ROI
Reed Smith > Reduced inventory
time from one month to minutes
Key Ingredients for Management
Imaging and Provisioning
Comprehensive deployment capabilities
Image-based or scripted OS install
Ongoing updates/re-provisioning
Tools for hands-free and PC user
personality migrations
Facilitates implementation of
standardized desktop configurations
Reduces risks associated with
desktop changes
Results
Triple S > Reduced migration time
by 85 percent
U.S. Air Force > Responded to new
hardware imaging requests in 88
percent less time
Inventory &
Discovery
Imaging &
Provisioning
16
Key Ingredients for Management
Inventory &
Discovery
Imaging &
Provisioning
Software Distribution
& Patch Management
Software Distribution and
Patch Management
Implements policy-based
software management
Distribute applications, updates,
code, files to target systems
Proactively manage software updates
to minimize security risks
Automates patch distribution with
one-click creation of collections
and policies
Bandwidth-sensitive systems
management for the mobile workforce
and roaming worker
Results
Horizon > Improved software
delivery success rate from 60
percent to 90+ percent
Edwards Lifesciences > Able
to patch their 2,000 PCs in
less than two hours
Secure.
How are you protecting yourself from external threats?
Corporate Network
is Continually Exposed
Wireless
Networks
Web
Applications
Guests
Consultants
IPsec VPN
Employees
Working at Home
WANs
& Extranets
SSL VPN
Internet Kiosks
& Shared
Computers
19
Symantec Endpoint Protection 11.0
Antivirus &
Antispyware
Firewall
Intrusion
Prevention
Device and
Application Control
Reduced
Cost,
Complexity &
Risk Exposure
Increased
Protection,
Control &
Manageability
Results
Symantec Endpoint
Protection 11.0
20
Key Ingredients for Endpoint Protection
20
Spyware, Rootkits
Viruses, Trojans, Worms
Antivirus
Worlds leading antivirus solution
Most (37) consecutive VB100 Awards
Antispyware
Best rootkit detection and removal
VxMS = superior rootkit protection
Antivirus &
Antispyware
Source: Thompson Cyber
Security Labs, August 2006
21
Key Ingredients for Endpoint Protection
Worms, Spyware
Firewall
Industry-leading endpoint
firewall technology
Gartner Magic Quadrant Leader
four consecutive years
Rules-based firewall can dynamically
adjust port settings to block threats
from spreading
Antivirus &
Antispyware
Firewall
22
Key Ingredients for Endpoint Protection
0-Day, Key Logging
Intrusion Prevention
Combines NIPS (network) and
HIPS (host)
Generic Exploit Blocking (GEB)One
signature to proactively protect against
all variants
Granular application access control
TruScan
or Backup
Exec Retrieve using a common Web-
browser interface for fast and simple
recovery, without IT intervention
Local or Offsite
Backup
Complete System
Recovery
File or Folder
Restore
29
Altiris Console Integration
Centralized management
of agents
Centralized distribution
of clients
Create backup policies and
apply to desired systems
Leverage other components
within the management
framework
ThreatCon Integration
Integrates with Symantec
ThreatCon and DeepSight
Threat Management System*
Connecting Symantec
Technologies Today
* Only requires Internet connection. Does not require
Symantec Endpoint Protection Manager
Symantec Endpoint Management
Suite
Symantec continues
to drive innovation
through unique
technology convergence
and integration
Thank You!
Copyright 2008 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and
other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to
the maximum extent allowed by law. The information in this document is subject to change without notice.
31