SlideShare a Scribd company logo
1 of 5
Download to read offline
Protecting and Migrating Legacy
Windows® OSes
Your guide to mitigating the risks of Windows XP®
and Windows Server® 2003 after end of support.
End of Support is Not the End of Business
Businesses need to be prepared for the end of support of operating systems (OSes), especially if the
OS is used enterprise-wide or runs business critical applications, such as Microsoft® Windows XP® and
Windows Server® 2003.
As you know, Microsoft ended support for Windows XP on 8 April 2014, and will similarly pull the plug
on Windows Server 2003 on 14 July 2015. Without any security patches, Microsoft has cautioned that
“PCs running Windows XP after April 8, 2014 should not be considered to be protected”1
.
However, many organisations stick with their legacy Windows systems, even after support ends.
Changing an OS across the entire organisation opens up the risk of downtime for mission critical
applications. Migrating to a new OS is also manpower-intensive, and could easily lead to time and
cost overruns.
Not surprisingly, companies see very little incentive to replace an unsupported but still functional
OS—until there is an overwhelmingly urgent need to do so. In addition, their business may be
dependent on old, proprietary applications that cannot run on newer platforms. Yet, it’s crucial for
organisations to understand the risks of running an out-of-support OS against the costs and effort of
migrating to a new one.
Challenges of Legacy Systems
1) Security threats
We learn from history that new vulnerabilities of an out-of-support OS will be discovered and new
malware will be developed to exploit the vulnerabilities. Without OS security patches, businesses
are exposed to significantly increased risk of security breaches of their unpatched systems. We can
expect an increase in range and number of exploits likely to be successful in their attacks due to the
cumulative effect of “doing nothing” across many separate vulnerabilities. This issue is intensified by
the threat from unknown (zero-day) vulnerabilities.
2) Regulatory compliance
Unpatched OS environment can render organisations liable to violation of industry compliance
regulations, perhaps resulting in hefty fines or penalties.
1
Microsoft, Enterprise Customers: Support for Windows XP has ended, Retrieved from
http://www.microsoft.com/en-us/windows/enterprise/end-of-support.aspx
1
2
Protecting and Migrating Legacy Windows® OSes
3) Reputation damage and remediation cost associated with data breach
An unprotected OS means the organisation is more susceptible to data breaches and loss of critical,
confidential data, which could lead to reputational damage. On top of that, businesses will incur
increased labour resources and other costs to remediate the environment once an attack occurs.
What Options Are There?
The first option is to do nothing. However, it will inevitably expose your organisation to attacks and
risks caused by legacy systems.
The second option is to purchase “custom support” from the software vendor to obtain
ongoing security patches for end-of-support OS and to deploy the patches when they are
available. This option does provide protection from the vulnerabilities that are actually patched,
but it has the following downsides:
•	 Leaves zero-day vulnerabilities unaddressed, opening systems to attack during instances of
patch unavailability and other windows of exposure
•	 Offers inadequate protection against security vulnerabilities with a moderate or low severity
rating as patches during the custom support period are usually designed for known critical
vulnerabilities only
•	 Incurs higher cost due to costly “custom support” and frequent testing and deployment of
patches
•	 Fails to be a long term solution as “custom support” programmes are specifically designed to
help customers bridge the support gap as they migrate to new OSes
The third option is to protect/harden your legacy systems. In this option the customer deploys
HIPS/HIDS based security agents at the endpoints to harden the operating system and applications,
mitigate vulnerabilities and stop known and unknown threats.
This option is most suitable in cases when a replacement is not feasible due to cost and control factors,
when patching or migrating is avoided to minimise downtime, or when having applications that are not
compatible with newer OSes.
Benefits of this approach:	
•	 Improves the security posture of your servers by protecting them against known and unknown
(zero-day) malware
•	 Eliminates emergency patching, and minimises downtime and IT expenses related to patching
through proactive protection that does not require continuous updates
•	 Reduces security incidents and remediation costs with continuous protection even if the server
is unable to get the latest patches in a timely fashion
3
Protecting and Migrating Legacy Windows® OSes
Option 3 clearly provides the best choice, with better and more consistent host security, lower overall
costs and more control with regards to legacy system replacement.
The following Symantec solutions can help you secure legacy systems effectively, minimise
business disruption and maintain regulatory compliance:
Security Solution Platform OS
Symantec™ Data Center
Security: Server Advanced 6.0
Server Any
Symantec™ Endpoint
Protection
Laptop / Desktop Windows, Mac, Linux
Point of Sale Device Windows
Symantec™ Critical System
Protection Client Edition
Point of Sale Device Non-Windows
ATM / Healthcare / Automotive /
Industrial Control Systems
Any
For more information, please read:
•	 White paper: Using Symantec Critical System Protection for Patch Mitigation and Securing
Legacy Out-of-Support Platforms
•	 Product overview: Data Center Security: Server Advanced 6.0 Overview Guide
•	 Solution brief: Protecting PoS Environments Against Multi-Stage Attacks
•	 Technical brief: Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of-Sale
Devices
The fourth option is to migrate from legacy systems. This option is most suitable for taking
advantage of the benefits of a new OS and its associated applications, or for minimising the
operational and management costs of IT systems by standardising its hardware and software.
Benefits of this approach:
•	 Enhances security posture by eliminating the risks and vulnerabilities associated with end-of-
life systems
•	 Enables better IT investments by freeing up resources from the maintenance of legacy systems
to focus on IT initiatives such as mobility deployments and cloud computing
•	 Improves business competitiveness by leveraging the productivity benefits of new OSes,
applications, mobile devices, cloud deployments and more
4
Protecting and Migrating Legacy Windows® OSes
Even though a migration can eventually lead to significant productivity, security and control benefits,
it can still be an intimidating task. In the past, migrations involved manually collecting inventory
and configuration data, throwing together solutions from disparate tools, writing and testing scripts
to handle endless contingencies and dependencies, plus a thousand other endless routines that
exhausted time, energy, money, motivation and executive patience.
With any migration, the challenge is to execute it in an efficient, cost-effective, and sustainable
manner, while protecting end-user productivity. Symantec can meet that challenge with migration and
deployment solutions that streamline processes to cut the expense, delay, and disruption of migration,
keeping it in control.
Symantec has migrated more than 300 million desktops and notebooks to Windows 2000®, XP,
Windows Vista®, Windows 7® and Windows 8®.
Symantec™ Client Management Suite 7.5 powered by Altiris™ technology not only automates and
simplifies migration efforts, but also helps manage IT resources long after migration is complete.
Client Management Suite 7.5 consists of the following components:
Component Name Description
Deployment Solution Mass deploys disk images of a reference system, migrates user data and
system configurations to new systems and configures each system based
on standardised criteria
Configuration
Management Database
(CMDB)
Acts as a data warehouse to provide greater insight into existing IT
assets, where they are, how they are connected and how any changes
would impact those relationships
Inventory Solution Gathers inventory data about computers, users, operating systems,
network devices and installed software applications in existing
environments
Patch Management
Solution
Assesses, prioritises and deploys updates for common operating systems
and applications to ensure that managed computers are protected on an
on-going basis
Software Management
Solutions
Distributes software and ensures that the correct software gets installed,
remains installed and runs without interference from other software
Allows users to directly download and install approved software or
request other software via a self-service portal
Endpoint Protection
Integration Component
Provides inventory client systems for common endpoint protection
products, migrates and rolls out Endpoint Protection agents,
troubleshoots agent problems and reports on status and outbreaks
5
Protecting and Migrating Legacy Windows® OSes
For more information, please read:
•	 Solution brief: Don’t eXPire – Simplify Your Windows Migration
•	 Product site: Symantec™ Deployment Solution 7.5 powered by Altiris™ technology
•	 Product site: Client Management Suite 7.5
Once the migration has been completed, Symantec security solutions mentioned in the previous
section can be used to protect the new operating systems from known and unknown threats.
Secure or migrate with Symantec today
The challenges of running unsupported legacy systems are not insignificant. But they are not
insurmountable either. Just because OS support has ended does not necessarily mean businesses are
left vulnerable to security threats or at the mercy of costly end-of-life support.
Symantec’s solutions offer simplified, comprehensive and cost-effective protection and migration of
Windows XP and Windows Server 2003, even after their end-of-support dates. Business operations
continue uninterrupted and industry compliance regulations are still met. Companies also gain control
and set the pace of system migration based on their own business needs and schedule.
Strong protection and risk management of legacy systems will help extend their lifespans and
ultimately prepare organisations to upgrade their systems to stay competitive and secure in today’s
fast-paced market.
For more information on securing your legacy systems, visit us.
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or
registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries.

More Related Content

What's hot

Thinking of choosing Sophos?
Thinking of choosing Sophos?Thinking of choosing Sophos?
Thinking of choosing Sophos?Symantec
 
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationAvoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationQualys
 
Effective Patch and Software Update Management
Effective Patch and Software Update ManagementEffective Patch and Software Update Management
Effective Patch and Software Update ManagementQuest
 
System Center Endpoint Protection
System Center Endpoint ProtectionSystem Center Endpoint Protection
System Center Endpoint ProtectionScientia Groups
 
Engineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacyEngineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacysoftware-engineering-book
 
Windows 10 Migration Tips, Tricks, and Strategies
Windows 10 Migration Tips, Tricks, and StrategiesWindows 10 Migration Tips, Tricks, and Strategies
Windows 10 Migration Tips, Tricks, and StrategiesIvanti
 
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)ITCamp
 
Experts Live Europe 2017 - Windows 10 Servicing - the do’s and don'ts
Experts Live Europe 2017 -  Windows 10 Servicing - the do’s and don'tsExperts Live Europe 2017 -  Windows 10 Servicing - the do’s and don'ts
Experts Live Europe 2017 - Windows 10 Servicing - the do’s and don'tsAlexander Benoit
 
Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education Herman Arnedo
 
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's GuideSymantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's GuideSymantec
 
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...Alexander Benoit
 
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...Alexander Benoit
 
Overview of System Center 2012 R2 Configuration Manager
Overview of System Center 2012 R2 Configuration ManagerOverview of System Center 2012 R2 Configuration Manager
Overview of System Center 2012 R2 Configuration ManagerDigicomp Academy AG
 
How Microsoft Technologies And Windows Vista Improve Supporting
How Microsoft Technologies And Windows Vista Improve SupportingHow Microsoft Technologies And Windows Vista Improve Supporting
How Microsoft Technologies And Windows Vista Improve SupportingMicrosoft TechNet
 
Windows 7 Optimized Desktop
Windows 7 Optimized DesktopWindows 7 Optimized Desktop
Windows 7 Optimized DesktopIT Masterclasses
 

What's hot (20)

Thinking of choosing Sophos?
Thinking of choosing Sophos?Thinking of choosing Sophos?
Thinking of choosing Sophos?
 
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationAvoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediation
 
Effective Patch and Software Update Management
Effective Patch and Software Update ManagementEffective Patch and Software Update Management
Effective Patch and Software Update Management
 
Ch10 dependable systems
Ch10 dependable systemsCh10 dependable systems
Ch10 dependable systems
 
System Center Endpoint Protection
System Center Endpoint ProtectionSystem Center Endpoint Protection
System Center Endpoint Protection
 
Ch14 resilience engineering
Ch14 resilience engineeringCh14 resilience engineering
Ch14 resilience engineering
 
Engineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacyEngineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacy
 
Windows 10 Migration Tips, Tricks, and Strategies
Windows 10 Migration Tips, Tricks, and StrategiesWindows 10 Migration Tips, Tricks, and Strategies
Windows 10 Migration Tips, Tricks, and Strategies
 
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
 
Installation
InstallationInstallation
Installation
 
Experts Live Europe 2017 - Windows 10 Servicing - the do’s and don'ts
Experts Live Europe 2017 -  Windows 10 Servicing - the do’s and don'tsExperts Live Europe 2017 -  Windows 10 Servicing - the do’s and don'ts
Experts Live Europe 2017 - Windows 10 Servicing - the do’s and don'ts
 
Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education
 
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's GuideSymantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
 
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
 
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
 
Bsm mw10
Bsm mw10Bsm mw10
Bsm mw10
 
Ambesh
AmbeshAmbesh
Ambesh
 
Overview of System Center 2012 R2 Configuration Manager
Overview of System Center 2012 R2 Configuration ManagerOverview of System Center 2012 R2 Configuration Manager
Overview of System Center 2012 R2 Configuration Manager
 
How Microsoft Technologies And Windows Vista Improve Supporting
How Microsoft Technologies And Windows Vista Improve SupportingHow Microsoft Technologies And Windows Vista Improve Supporting
How Microsoft Technologies And Windows Vista Improve Supporting
 
Windows 7 Optimized Desktop
Windows 7 Optimized DesktopWindows 7 Optimized Desktop
Windows 7 Optimized Desktop
 

Similar to TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes

HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?William hendric
 
Tres formas de modernizar la TI del dispositivo y mejorar la productividad
Tres formas de modernizar la TI del dispositivo y mejorar la productividadTres formas de modernizar la TI del dispositivo y mejorar la productividad
Tres formas de modernizar la TI del dispositivo y mejorar la productividadCade Soluciones
 
Symantec Migration infographic
Symantec Migration infographic Symantec Migration infographic
Symantec Migration infographic BHD Creative Ltd
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Sophos Benelux
 
4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 MigrationCitrix
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalQuek Lilian
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixHCLSoftware
 
110006_perils_of_aging_emul_wp
110006_perils_of_aging_emul_wp110006_perils_of_aging_emul_wp
110006_perils_of_aging_emul_wpJessica Hirst
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Quick Heal Technologies Ltd.
 
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTrihedral
 
Securing Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote WorkSecuring Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote WorkPerficient, Inc.
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxArrow ECS UK
 
Microsoft operations management_suite_resources
Microsoft operations management_suite_resourcesMicrosoft operations management_suite_resources
Microsoft operations management_suite_resourcesEhtesham Opel
 
Azure-Casestudy.pptx
Azure-Casestudy.pptxAzure-Casestudy.pptx
Azure-Casestudy.pptxssuser2ae8bb
 
Ppt Template
Ppt TemplatePpt Template
Ppt Templatepapdev
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxsarah david
 
HCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch SalzburgHCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch SalzburgDNUG e.V.
 

Similar to TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes (20)

HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
Tres formas de modernizar la TI del dispositivo y mejorar la productividad
Tres formas de modernizar la TI del dispositivo y mejorar la productividadTres formas de modernizar la TI del dispositivo y mejorar la productividad
Tres formas de modernizar la TI del dispositivo y mejorar la productividad
 
Symantec Migration infographic
Symantec Migration infographic Symantec Migration infographic
Symantec Migration infographic
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFix
 
110006_perils_of_aging_emul_wp
110006_perils_of_aging_emul_wp110006_perils_of_aging_emul_wp
110006_perils_of_aging_emul_wp
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
 
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA software
 
CSEC630 individaul assign
CSEC630 individaul assignCSEC630 individaul assign
CSEC630 individaul assign
 
Securing Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote WorkSecuring Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote Work
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
Many products-no-security (1)
Many products-no-security (1)Many products-no-security (1)
Many products-no-security (1)
 
Microsoft operations management_suite_resources
Microsoft operations management_suite_resourcesMicrosoft operations management_suite_resources
Microsoft operations management_suite_resources
 
Azure-Casestudy.pptx
Azure-Casestudy.pptxAzure-Casestudy.pptx
Azure-Casestudy.pptx
 
Ppt Template
Ppt TemplatePpt Template
Ppt Template
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
HCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch SalzburgHCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch Salzburg
 

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Recently uploaded (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes

  • 1. Protecting and Migrating Legacy Windows® OSes Your guide to mitigating the risks of Windows XP® and Windows Server® 2003 after end of support. End of Support is Not the End of Business Businesses need to be prepared for the end of support of operating systems (OSes), especially if the OS is used enterprise-wide or runs business critical applications, such as Microsoft® Windows XP® and Windows Server® 2003. As you know, Microsoft ended support for Windows XP on 8 April 2014, and will similarly pull the plug on Windows Server 2003 on 14 July 2015. Without any security patches, Microsoft has cautioned that “PCs running Windows XP after April 8, 2014 should not be considered to be protected”1 . However, many organisations stick with their legacy Windows systems, even after support ends. Changing an OS across the entire organisation opens up the risk of downtime for mission critical applications. Migrating to a new OS is also manpower-intensive, and could easily lead to time and cost overruns. Not surprisingly, companies see very little incentive to replace an unsupported but still functional OS—until there is an overwhelmingly urgent need to do so. In addition, their business may be dependent on old, proprietary applications that cannot run on newer platforms. Yet, it’s crucial for organisations to understand the risks of running an out-of-support OS against the costs and effort of migrating to a new one. Challenges of Legacy Systems 1) Security threats We learn from history that new vulnerabilities of an out-of-support OS will be discovered and new malware will be developed to exploit the vulnerabilities. Without OS security patches, businesses are exposed to significantly increased risk of security breaches of their unpatched systems. We can expect an increase in range and number of exploits likely to be successful in their attacks due to the cumulative effect of “doing nothing” across many separate vulnerabilities. This issue is intensified by the threat from unknown (zero-day) vulnerabilities. 2) Regulatory compliance Unpatched OS environment can render organisations liable to violation of industry compliance regulations, perhaps resulting in hefty fines or penalties. 1 Microsoft, Enterprise Customers: Support for Windows XP has ended, Retrieved from http://www.microsoft.com/en-us/windows/enterprise/end-of-support.aspx 1
  • 2. 2 Protecting and Migrating Legacy Windows® OSes 3) Reputation damage and remediation cost associated with data breach An unprotected OS means the organisation is more susceptible to data breaches and loss of critical, confidential data, which could lead to reputational damage. On top of that, businesses will incur increased labour resources and other costs to remediate the environment once an attack occurs. What Options Are There? The first option is to do nothing. However, it will inevitably expose your organisation to attacks and risks caused by legacy systems. The second option is to purchase “custom support” from the software vendor to obtain ongoing security patches for end-of-support OS and to deploy the patches when they are available. This option does provide protection from the vulnerabilities that are actually patched, but it has the following downsides: • Leaves zero-day vulnerabilities unaddressed, opening systems to attack during instances of patch unavailability and other windows of exposure • Offers inadequate protection against security vulnerabilities with a moderate or low severity rating as patches during the custom support period are usually designed for known critical vulnerabilities only • Incurs higher cost due to costly “custom support” and frequent testing and deployment of patches • Fails to be a long term solution as “custom support” programmes are specifically designed to help customers bridge the support gap as they migrate to new OSes The third option is to protect/harden your legacy systems. In this option the customer deploys HIPS/HIDS based security agents at the endpoints to harden the operating system and applications, mitigate vulnerabilities and stop known and unknown threats. This option is most suitable in cases when a replacement is not feasible due to cost and control factors, when patching or migrating is avoided to minimise downtime, or when having applications that are not compatible with newer OSes. Benefits of this approach: • Improves the security posture of your servers by protecting them against known and unknown (zero-day) malware • Eliminates emergency patching, and minimises downtime and IT expenses related to patching through proactive protection that does not require continuous updates • Reduces security incidents and remediation costs with continuous protection even if the server is unable to get the latest patches in a timely fashion
  • 3. 3 Protecting and Migrating Legacy Windows® OSes Option 3 clearly provides the best choice, with better and more consistent host security, lower overall costs and more control with regards to legacy system replacement. The following Symantec solutions can help you secure legacy systems effectively, minimise business disruption and maintain regulatory compliance: Security Solution Platform OS Symantec™ Data Center Security: Server Advanced 6.0 Server Any Symantec™ Endpoint Protection Laptop / Desktop Windows, Mac, Linux Point of Sale Device Windows Symantec™ Critical System Protection Client Edition Point of Sale Device Non-Windows ATM / Healthcare / Automotive / Industrial Control Systems Any For more information, please read: • White paper: Using Symantec Critical System Protection for Patch Mitigation and Securing Legacy Out-of-Support Platforms • Product overview: Data Center Security: Server Advanced 6.0 Overview Guide • Solution brief: Protecting PoS Environments Against Multi-Stage Attacks • Technical brief: Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of-Sale Devices The fourth option is to migrate from legacy systems. This option is most suitable for taking advantage of the benefits of a new OS and its associated applications, or for minimising the operational and management costs of IT systems by standardising its hardware and software. Benefits of this approach: • Enhances security posture by eliminating the risks and vulnerabilities associated with end-of- life systems • Enables better IT investments by freeing up resources from the maintenance of legacy systems to focus on IT initiatives such as mobility deployments and cloud computing • Improves business competitiveness by leveraging the productivity benefits of new OSes, applications, mobile devices, cloud deployments and more
  • 4. 4 Protecting and Migrating Legacy Windows® OSes Even though a migration can eventually lead to significant productivity, security and control benefits, it can still be an intimidating task. In the past, migrations involved manually collecting inventory and configuration data, throwing together solutions from disparate tools, writing and testing scripts to handle endless contingencies and dependencies, plus a thousand other endless routines that exhausted time, energy, money, motivation and executive patience. With any migration, the challenge is to execute it in an efficient, cost-effective, and sustainable manner, while protecting end-user productivity. Symantec can meet that challenge with migration and deployment solutions that streamline processes to cut the expense, delay, and disruption of migration, keeping it in control. Symantec has migrated more than 300 million desktops and notebooks to Windows 2000®, XP, Windows Vista®, Windows 7® and Windows 8®. Symantec™ Client Management Suite 7.5 powered by Altiris™ technology not only automates and simplifies migration efforts, but also helps manage IT resources long after migration is complete. Client Management Suite 7.5 consists of the following components: Component Name Description Deployment Solution Mass deploys disk images of a reference system, migrates user data and system configurations to new systems and configures each system based on standardised criteria Configuration Management Database (CMDB) Acts as a data warehouse to provide greater insight into existing IT assets, where they are, how they are connected and how any changes would impact those relationships Inventory Solution Gathers inventory data about computers, users, operating systems, network devices and installed software applications in existing environments Patch Management Solution Assesses, prioritises and deploys updates for common operating systems and applications to ensure that managed computers are protected on an on-going basis Software Management Solutions Distributes software and ensures that the correct software gets installed, remains installed and runs without interference from other software Allows users to directly download and install approved software or request other software via a self-service portal Endpoint Protection Integration Component Provides inventory client systems for common endpoint protection products, migrates and rolls out Endpoint Protection agents, troubleshoots agent problems and reports on status and outbreaks
  • 5. 5 Protecting and Migrating Legacy Windows® OSes For more information, please read: • Solution brief: Don’t eXPire – Simplify Your Windows Migration • Product site: Symantec™ Deployment Solution 7.5 powered by Altiris™ technology • Product site: Client Management Suite 7.5 Once the migration has been completed, Symantec security solutions mentioned in the previous section can be used to protect the new operating systems from known and unknown threats. Secure or migrate with Symantec today The challenges of running unsupported legacy systems are not insignificant. But they are not insurmountable either. Just because OS support has ended does not necessarily mean businesses are left vulnerable to security threats or at the mercy of costly end-of-life support. Symantec’s solutions offer simplified, comprehensive and cost-effective protection and migration of Windows XP and Windows Server 2003, even after their end-of-support dates. Business operations continue uninterrupted and industry compliance regulations are still met. Companies also gain control and set the pace of system migration based on their own business needs and schedule. Strong protection and risk management of legacy systems will help extend their lifespans and ultimately prepare organisations to upgrade their systems to stay competitive and secure in today’s fast-paced market. For more information on securing your legacy systems, visit us. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries.