Protecting Critical Systems with
Symantec
Chris Collier
Presales Specialist
E: Chris.Collier@arrowecs.co.uk
Agenda
• Introduction
• What is a Critical System?
• Symantec Critical System Protection
• Common Customer Requirements
• ...
What is a Critical System?
What is a Critical System?
Symantec Critical System Protection
Product Description
Symantec Critical System Protection secures physical and virtual
servers.
Proactively
safeguard server...
OS Support
– Microsoft Windows
– Sun Solaris®
– Red Hat® Linux
– SUSE Linux
– HP-UX®
– IBM AIX®
– VMware ESX Console OS
7
http://www.symantec.com/connect/blogs/symantec-critical-system-protection-hack-proof-black-hat
8
Black Hat Conference 2012...
Customer Requirements
Customer Requirements
Use Case
Use Case: VMware Customer
• Target Segments: Financial Services, technology.
public sector, manufacturing, healthcare
• Bu...
Summary
Summary
– Critical systems need extra security
– There are multiple opportunities for this product to be positioned.
– Phy...
Questions?
Upcoming SlideShare
Loading in...5
×

Protecting Critical Systems with Symantec

703

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
703
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
46
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Control Compliance Suite is a modular solution, comprising of seven key components.These components are fully interoperable and available separately or as part of the broader suite. Key infrastructure capabilities available with all modules include a unique and highly scalable data framework to normalize and analyse large volumes of data, customizable Web-based dashboards and reports, and workflow integration with remediation ticketing systems.Symantec™ Control Compliance Suite Risk Manager conveys the impact of IT risk in business-relevant terms. You can work with business leaders to identify IT risk thresholds, assign ownership, and track risk reduction over time.Symantec™ Control Compliance Suite Policy Manager simplifies policy management with out-of-the-box policy content for multiple mandates, automatically mapped to controls and updated on a quarterly basis.Symantec™ Control Compliance Suite Standards Manager is an industry-leading configuration assessment solution designed to evaluate if systems are secured, configured, and patched according to standards.Symantec™ Control Compliance Suite Vulnerability Manager performs end-to-end vulnerability assessment of Web applications, databases, servers, and network devices, delivering a single view of security threats across your IT infrastructure.Symantec™ Control Compliance Suite Assessment Manager simplifies the evaluation of procedural controls by providing automated Web-based questionnaires. These questionnaires can also be used to evaluate overall employee security awareness.Symantec™ Control Compliance Suite Virtualization Security Manager allows you to confidently take advantage of the benefits of virtualization without worrying about degrading your security or compliance posture.Symantec™ Control Compliance Suite Vendor Risk Manager allows you to actively assess and monitor your vendor risk exposure to safeguard your sensitive data and reduce overall business risk.
  • Symantec Control Compliance Suite
  • Symantec Critical System Protection completely protects vSphere, the leading virtualization platform for building cloud infrastructures. Symantec’s ability to protect vSphere is a competitive advantage against all key competitors. It is a single solution to harden virtual and physical servers that works well for any regulated industry where a company is required to demonstrate compliance. Open the conversation with any VMware customer by asking the question: “What are you doing to protect the Hypervisor?”
  • Protecting Critical Systems with Symantec

    1. 1. Protecting Critical Systems with Symantec Chris Collier Presales Specialist E: Chris.Collier@arrowecs.co.uk
    2. 2. Agenda • Introduction • What is a Critical System? • Symantec Critical System Protection • Common Customer Requirements • Use Case • Summary • Q&A 2
    3. 3. What is a Critical System?
    4. 4. What is a Critical System?
    5. 5. Symantec Critical System Protection
    6. 6. Product Description Symantec Critical System Protection secures physical and virtual servers. Proactively safeguard server environments • Restrict application and OS behavior • Protect against zero day threats • Monitor approved applications Granular, policy- based controls Defends physical and virtual servers. • Monitor and protect physical and virtual data centers • Provide granular, policy-based controls • Use host-based intrusion detection (HIDS), intrusion prevention (HIPS), and least-privilege access control
    7. 7. OS Support – Microsoft Windows – Sun Solaris® – Red Hat® Linux – SUSE Linux – HP-UX® – IBM AIX® – VMware ESX Console OS 7
    8. 8. http://www.symantec.com/connect/blogs/symantec-critical-system-protection-hack-proof-black-hat 8 Black Hat Conference 2012 - A “Capture the flag” event - Unpatched Windows 2003 server - Running several vulnerable applications, - Protected by Symantec solutions. – SEP & CSP - More than 50 skilled hackers - The Symantec protected systems remained hack-proof
    9. 9. Customer Requirements
    10. 10. Customer Requirements
    11. 11. Use Case
    12. 12. Use Case: VMware Customer • Target Segments: Financial Services, technology. public sector, manufacturing, healthcare • Business driver: Moving business onto the cloud to lower capital and operating expenses. • Potential Background: Building cloud infrastructure using vSphere. • Feature: Symantec Critical System Protection completely protects vSphere. It is a single solution that protects the ESX and ESXi Hypervisors and vCenter as well as Windows and non-Windows guest virtual machines. • Outcome: Physical and virtual servers are hardened and secured from attack. • Key Question: “What are you doing to protect the Hypervisor?”
    13. 13. Summary
    14. 14. Summary – Critical systems need extra security – There are multiple opportunities for this product to be positioned. – Physical Security – Virtualisation Security – Legacy & Non-Legacy System Security – Broad Platform Support – Proven Technology from Market Leading Security Vendor
    15. 15. Questions?
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×