Your SlideShare is downloading. ×
0
B Powerpoint Endpt Mgmt Suite
B Powerpoint Endpt Mgmt Suite
B Powerpoint Endpt Mgmt Suite
B Powerpoint Endpt Mgmt Suite
B Powerpoint Endpt Mgmt Suite
B Powerpoint Endpt Mgmt Suite
B Powerpoint Endpt Mgmt Suite
B Powerpoint Endpt Mgmt Suite
B Powerpoint Endpt Mgmt Suite
B Powerpoint Endpt Mgmt Suite
B Powerpoint Endpt Mgmt Suite
B Powerpoint Endpt Mgmt Suite
B Powerpoint Endpt Mgmt Suite
B Powerpoint Endpt Mgmt Suite
B Powerpoint Endpt Mgmt Suite
B Powerpoint Endpt Mgmt Suite
B Powerpoint Endpt Mgmt Suite
B Powerpoint Endpt Mgmt Suite
B Powerpoint Endpt Mgmt Suite
B Powerpoint Endpt Mgmt Suite
B Powerpoint Endpt Mgmt Suite
B Powerpoint Endpt Mgmt Suite
B Powerpoint Endpt Mgmt Suite
B Powerpoint Endpt Mgmt Suite
B Powerpoint Endpt Mgmt Suite
B Powerpoint Endpt Mgmt Suite
B Powerpoint Endpt Mgmt Suite
B Powerpoint Endpt Mgmt Suite
B Powerpoint Endpt Mgmt Suite
B Powerpoint Endpt Mgmt Suite
B Powerpoint Endpt Mgmt Suite
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

B Powerpoint Endpt Mgmt Suite

1,355

Published on

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,355
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
63
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Transcript

    • 1. Symantec TM Endpoint Management Suite Customer Presentation Manage. Secure. Recover.
    • 2. Agenda Today’s IT Challenges 1 Symantec’s Collaborative Architecture Symantec TM Endpoint Management Suite Connecting Symantec Technologies Today Q & A 2 3 4 5
    • 3. Today’s IT Challenges Natural Disasters Infrastructure Failures Human Error Malicious Threats Information
    • 4. Traditional Protection isn’t Good Enough Anymore Source: SearchSecurity.TechTarget.com Evil geniuses who attack us with zero-day attacks < 5% 5% System configuration represents 2/3 of all system weaknesses 65% 30% can be resolved through patch management 30%
    • 5. A Secure Endpoint is a Well-managed Endpoint 95% Security problems can be solved by endpoint management John Pescatore, Vice President, Gartner Inc. Source: http://searchsecurity.techtarget.com/news/interview/0,289202,sid14_gci905234,00.html
    • 6. Symantec’s Collaborative Architecture
    • 7. Open Collaborative Architecture: Connecting People and Technology Backup & Recovery Service Desk Endpoint Security Patch Management Workflow Execution Monitor status Close incidents Distribute patches Obtain change control approval Update signatures Kick-off backup process Test patches Notify risk management team Comprehensive Network Discovery Common Software Delivery Process Centralized Reporting Remote Administration Configuration Management Database (CMDB)
    • 8. Driving to Convergence Situation <ul><li>Duplication of tasks </li></ul><ul><li>Gaps require manual processes </li></ul><ul><li>Multiple consoles and agents </li></ul><ul><li>Various data repositories </li></ul><ul><li>Overlapping policies </li></ul>Integration on Altiris Platform Solution <ul><li>Native integration </li></ul><ul><li>Single view of compliance </li></ul><ul><li>Consolidated status reporting </li></ul><ul><li>Pre-built workflow processes </li></ul>CMDB
    • 9. Symantec Leads the Way July 2007 “The Forrester Wave ™ : Client Management Suites, Q3 2007” Symantec’s acquisition of Altiris in Q2 2007 illustrates the impending requirements of integrated security and management—and that is exactly what Symantec delivers. Symantec Confidential Weak Strategy Strong Current offering Strong Market presence Full vendor participation Contenders Strong Performers Leaders Risky Bets Natalie Lambert Senior Analyst, Forrester Symantec Offers the Most Mature Client Management Suite BMC Software IBM Microsoft Novell LANDesk CA HP Symantec
    • 10. Introducing Endpoint Management Suite <ul><li>Inventory and discovery </li></ul><ul><li>Imaging and provisioning </li></ul><ul><li>Software delivery and patch management </li></ul><ul><li>Remote administration </li></ul>MANAGE <ul><li>#1 in worldwide software distribution (IDC 2006) </li></ul><ul><li>Leader in client management suites (Forrester 2007) </li></ul>Altiris ® Client Management Suite ™ 6.0 <ul><li>Local and offsite backup </li></ul><ul><li>File and folder restore </li></ul><ul><li>Complete system recovery </li></ul>RECOVER <ul><li>#1 in worldwide data protection and recovery (IDC 2006) </li></ul><ul><li>Leader enterprise backup/recovery software (Gartner 2007) </li></ul>Backup Exec ™ System Recovery 8 <ul><li>Antivirus and antispyware protection </li></ul><ul><li>Firewall </li></ul><ul><li>Intrusion prevention </li></ul><ul><li>Application and device control </li></ul>SECURE <ul><li>#1 in worldwide secure content and threat management (IDC 2006) </li></ul><ul><li>Leader in endpoint protection platforms (Gartner 2007) </li></ul>Symantec ™ Endpoint Protection 11.0
    • 11. Manage. How are you managing your Windows ® desktops and laptops?
    • 12. IT Lifecycle Management Endpoint Security & Management <ul><li>Retirement </li></ul><ul><li>Procurement </li></ul><ul><li>Staging </li></ul><ul><li>Production </li></ul>Transition & Migration Problem Resolution Monitor & Track Business Continuity Patch Management Asset Identification Contract Management Deployment & Configuration Application Packaging & QA Software Distribution & Virtualization Endpoint Security
    • 13. Altiris ® Client Management Suite ™ 6.0 Altiris Client Management Suite 6.0 Results Inventory & Discovery Imaging & Provisioning Software Distribution & Patch Management
    • 14. Key Ingredients for Management Inventory and Discovery <ul><ul><li>Populates CMDB with comprehensive data for discoverable assets </li></ul></ul><ul><ul><li>Aggregates data across environment in real time </li></ul></ul><ul><ul><li>Assists with software license management </li></ul></ul><ul><ul><li>Helps forecast growth requirements </li></ul></ul>Results <ul><li>GM Brazil > Reduced annual software license expenses by 44 percent within 45 days, equaling a 1,000 percent ROI </li></ul><ul><li>Reed Smith > Reduced inventory time from one month to minutes </li></ul>Inventory & Discovery
    • 15. Key Ingredients for Management Imaging and Provisioning <ul><ul><li>Comprehensive deployment capabilities </li></ul></ul><ul><ul><li>Image-based or scripted OS install </li></ul></ul><ul><ul><li>Ongoing updates/re-provisioning </li></ul></ul><ul><ul><li>Tools for hands-free and PC user personality migrations </li></ul></ul><ul><ul><li>Facilitates implementation of standardized desktop configurations </li></ul></ul><ul><ul><li>Reduces risks associated with desktop changes </li></ul></ul>Results <ul><li>Triple S > Reduced migration time by 85 percent </li></ul><ul><li>U.S. Air Force > Responded to new hardware imaging requests in 88 percent less time </li></ul>Inventory & Discovery Imaging & Provisioning
    • 16. Key Ingredients for Management Software Distribution and Patch Management <ul><ul><li>Implements policy-based software management </li></ul></ul><ul><ul><ul><li>Distribute applications, updates, code, files to target systems </li></ul></ul></ul><ul><ul><li>Proactively manage software updates to minimize security risks </li></ul></ul><ul><ul><ul><li>Automates patch distribution with one-click creation of collections and policies </li></ul></ul></ul><ul><ul><li>Bandwidth-sensitive systems management for the mobile workforce and roaming worker </li></ul></ul>Results <ul><li>Horizon > Improved software delivery success rate from 60 percent to 90+ percent </li></ul><ul><li>Edwards Lifesciences > Able to patch their 2,000 PCs in less than two hours </li></ul>Inventory & Discovery Imaging & Provisioning Software Distribution & Patch Management
    • 17. Secure. How are you protecting yourself from external threats?
    • 18. Corporate Network is Continually Exposed Wireless Networks Web Applications Guests Consultants IPsec VPN Employees Working at Home WANs & Extranets SSL VPN Internet Kiosks & Shared Computers
    • 19. Symantec Endpoint Protection 11.0 Antivirus & Antispyware Firewall Intrusion Prevention Device and Application Control Reduced Cost, Complexity & Risk Exposure Increased Protection, Control & Manageability Results Symantec Endpoint Protection 11.0
    • 20. Key Ingredients for Endpoint Protection Spyware, Rootkits Viruses, Trojans, Worms Antivirus <ul><ul><li>World’s leading antivirus solution </li></ul></ul><ul><ul><li>Most (37) consecutive VB100 Awards </li></ul></ul>Antispyware <ul><ul><li>Best rootkit detection and removal </li></ul></ul><ul><ul><li>VxMS = superior rootkit protection </li></ul></ul>Source: Thompson Cyber Security Labs, August 2006 Antivirus & Antispyware
    • 21. Key Ingredients for Endpoint Protection Worms, Spyware Firewall <ul><ul><li>Industry-leading endpoint firewall technology </li></ul></ul><ul><ul><li>Gartner Magic Quadrant “Leader” four consecutive years </li></ul></ul><ul><ul><li>Rules-based firewall can dynamically adjust port settings to block threats from spreading </li></ul></ul>Antivirus & Antispyware Firewall
    • 22. Key Ingredients for Endpoint Protection 0-Day, Key Logging Intrusion Prevention <ul><ul><li>Combines NIPS (network) and HIPS (host) </li></ul></ul><ul><ul><li>Generic Exploit Blocking (GEB)—One signature to proactively protect against all variants </li></ul></ul><ul><ul><li>Granular application access control </li></ul></ul><ul><ul><li>TruScan ™ —Proactive threat scanning technology; very low (0.0049%) false-positive rate </li></ul></ul><ul><ul><li>Detects 1,000 new threats per month that are not detected by leading antivirus engines </li></ul></ul>Antivirus & Antispyware Firewall Intrusion Prevention 25M Installations Fewer than 50 false positives for every 1M PCs
    • 23. Key Ingredients for Endpoint Protection Slurping, IP Theft Device and Application Control <ul><ul><li>Prevents data leakage </li></ul></ul><ul><ul><li>Restrict Access to devices (USB keys, backup drives) </li></ul></ul><ul><ul><li>Whitelisting—Allow only “trusted” applications to run </li></ul></ul><ul><li>W32.SillyFDC </li></ul><ul><li>Targets removable memory sticks </li></ul><ul><li>Spreads by copying itself onto removable drives such as USB memory sticks </li></ul><ul><li>Automatically runs when the device is next connected to a computer </li></ul>Device and Application Control Antivirus & Antispyware Firewall Intrusion Prevention
    • 24. Recover. How quickly can you recover from a loss or disaster?
    • 25. The Cost of System Failure <ul><li>Sales transactions </li></ul><ul><li>Manufacturing data </li></ul><ul><li>Email and other business data </li></ul><ul><li>Employee productivity </li></ul><ul><li>Company reputation </li></ul>What would you lose if a system crashed?
    • 26. Symantec Backup Exec System Recovery 8 Desktop Edition Symantec Backup Exec System Recovery 8 Local or Offsite Backup Complete System Recovery File or Folder Restore Reduced downtime and data loss Increased end-user productivity Results
    • 27. Key Ingredients for Endpoint Recovery Local or Offsite Backup <ul><ul><li>Create real-time, while-you-work recovery points of the entire system and save to any disk storage device </li></ul></ul><ul><ul><li>Supports full and incremental backups to save disk space and increase backup performance </li></ul></ul><ul><ul><li>Select from multiple compression options: none, standard, medium, or high </li></ul></ul><ul><ul><li>Select from multiple encryption options: 128-bit, 192-bit, or 256-bit AES </li></ul></ul><ul><ul><li>Automatically copy recovery points (backups) to a network share, FTP server, or external hard drive to enhance disaster recovery efforts </li></ul></ul><ul><ul><li>Intelligently and uniquely identifies and communicates to USB drives, successfully running backup jobs even if the drive letter for the device changes </li></ul></ul>Local or Offsite Backup
    • 28. Key Ingredients for Endpoint Protection Complete System Recovery <ul><ul><li>Rapid recovery of entire systems, even to dissimilar hardware or virtual environments, breaks the barrier of incompatible storage controllers and hardware abstraction layers </li></ul></ul><ul><ul><li>Volumes can be resized during a restore, making hard-drive upgrades or full hardware migrations quick and easy </li></ul></ul>File or Folder Restore <ul><ul><li>Recovers individual files and folders in seconds from either recovery points or file/folder backups </li></ul></ul><ul><ul><li>Enables end-user recovery of files and folders via Google Desktop ™ or Backup Exec Retrieve using a common Web-browser interface for fast and simple recovery, without IT intervention </li></ul></ul>Local or Offsite Backup Complete System Recovery File or Folder Restore
    • 29. <ul><li>Altiris Console Integration </li></ul><ul><li>Centralized management of agents </li></ul><ul><li>Centralized distribution of clients </li></ul><ul><li>Create backup policies and apply to desired systems </li></ul><ul><li>Leverage other components within the management framework </li></ul><ul><li>ThreatCon Integration </li></ul><ul><li>Integrates with Symantec ThreatCon and DeepSight ™ Threat Management System* </li></ul>Connecting Symantec Technologies Today * Only requires Internet connection. Does not require Symantec Endpoint Protection Manager
    • 30. Symantec Endpoint Management Suite Symantec continues to drive innovation through unique technology convergence and integration
    • 31. Thank You! Copyright © 2008 Symantec Corporation. All rights reserved.  Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries.  Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising.  All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law.  The information in this document is subject to change without notice.

    ×