SlideShare a Scribd company logo
1 of 6
Download to read offline
Protect Your End-of-Life Windows Server
2003 Operating System
Your guide to mitigating risks in your Windows Server 2003 Systems after
the end of support
Data Sheet: Security Management
End of Support is Not the End of Business
When software vendors announce a product end-of-life (EOL), customers typically have 24 to 30 months to plan and
execute their migration strategies. This period is typically referred to as limited support. After the last day of support (also
known as “end of support life date”), the product becomes obsolete, and the vendor will no longer automatically issue
security patches. Customers have the option to purchase “extended or custom support” from the vendor after this date.
In many instances, the window for the availability of vendor support for the EOL product could be shorter than the time it
would take for the customer to effectively migrate applications and processes to a new platform.
Customers may also be running custom applications that may not be compatible with the new platform. These gaps
potentially expose unsupported systems to zero-day threats and new malware attacks. In order to address these potential
risks, businesses will need to make some hard decisions:
• Run the applications in the unsupported
platform.
• Execute an aggressive migration strategy for the
mission-critical applications.
• Purchase an expensive extended support
contract from the software vendor.
• Implement a security solution to harden and
monitor the unsupported systems.
Businesses running enterprise-wide business applications on Microsoft Windows Server 2003 face this
dilemma today. Microsoft Windows Server 2003 will reach its end-of-product-support-life date on 14 July 2015. After this
date, Microsoft will no longer automatically issue security patches, leaving these systems highly vulnerable to zero-day
attacks and other forms of malicious code.
Businesses may choose to continue running their applications on unsupported Windows servers for a multitude of reasons,
such as:
• Minimize downtime for mission-critical applications and manage their budgets by staggering the migration to the new
supported platform.
• Support a mission-critical, legacy, proprietary application that is not currently supported by the new platform.
Challenges of Legacy Systems
The following security and compliance issues influence how businesses will execute their Windows Server 2003 EOL
migration and risk mitigation strategies:
1
1) Securit1) Security threats from zy threats from zero-daero-day vulnerabilities and sophisy vulnerabilities and sophisticated malwareticated malware
Security researchers continue to find new vulnerabilities in out-of-support operating
systems (OS), which malicious entities are very eager to exploit.
Malicious hackers have been known to target unsupported systems as a method for
gaining entry into a business’s IT infrastructure. As large enterprises beef up their
security protection, hackers are also using the unsupported systems in a large
enterprise’s supply chain ecosystem to gain entry.
2) Re2) Regulatorgulatory compliance and cy compliance and cyber securityber security governancey governance
Regulations like PCI-DSS and HIPAA-HITECH demand businesses take the
necessary precautions to protect information and processes running on
potentially vulnerable systems.
The Securities and Exchange Commission (SEC) has been very vocal in issuing
guidelines and obligations for reporting on data breaches. In its January 2014
Priorities letter, the SEC’s Office of Compliance Inspections and Examinations
(OCIE) included governance and supervision of information technology
systems, operational capability, market access, information security, and
preparedness to respond to sudden malfunctions and system outages.
Cyber security is now considered a primary risk factor and company annual
reports must now reflect this.
Running unprotected systems, therefore, exposes the business to compliance
violations, resulting in hefty fines, sanctions and penalties.
3) Reputation damage and remediation co3) Reputation damage and remediation cosst associated with data breacht associated with data breach
Unprotected systems makes the business more susceptible to data breaches,
loss of critical, confidential data, and business disruption such as an inability
to run mission-critical transactions or deliver customer services—all of which
damage the brand and the customer’s trust. On top of that, businesses will
incur the costs associated with system remediation, investigation, and
customer care following the attack.
Data Sheet: Security Management
Protect Your End-of-Life Windows Server 2003 Operating System
2
4) Co4) Cossts associated with tests associated with testing and vting and validating “cusalidating “customtom” Micro” Microsofsoft patchest patches
Customers also have to consider the investment to test and validate patches to
the business applications running on top of the legacy servers. Even if the
customer purchases patches from Microsoft, most application vendors won’t
support the patches as they cannot test that the patch will not impact their
application. The onus on testing and validating the Microsoft custom patches
rests on the customer. The customer will also have to assume the risks of
application outages resulting from incompatibility with the patch. This leads to
increased operational cost and risks.
What Options Are There?
Customers have four options for addressing their potential security exposure from running unsupported Windows Server
2003 systems after its last day of support:
OpOption 1:tion 1: Do nothing. Some customers may choose to continue running applications on the unsupported platform when
these applications are not considered as mission critical. Recent data breaches have shown that malicious hackers are
taking advantage of vulnerabilities in unsupported systems to gain a backdoor entry for launching their attacks.
Doing nothing is not an option when the applications are mission critical but not compatible with the new platform. In this
instance, customers will need to decide between executing an aggressive platform migration, purchasing a Customer
Support Agreement, or enabling a server security hardening solution.
OpOption 2:tion 2: Migrate applications into the new Windows Server Systems platform. This option is most suitable for taking
advantage of the benefits of a new OS and its associated applications, or for minimizing the operational and management
costs of IT systems by standardizing its hardware and software. Customers will be able to eliminate the risks and
vulnerabilities associated with end-of-life systems.
Even though a migration can eventually lead to significant productivity, security and control benefits, it can still be an
intimidating task. In the past, migrations involved manually collecting inventory and configuration data, throwing together
solutions from disparate tools, writing and testing scripts to handle endless contingencies and dependencies, plus a
thousand other endless routines that exhausts time, energy, money, motivation and executive patience.
Customers planning their platform migrations also need to take into account the impact an aggressive migration strategy
would have on their operational budgets.
OpOption 3:tion 3: Purchase “Custom Support Agreements (CSA)” from Microsoft.
There are several critical issues to consider for customers evaluating this option:
• Only customers with a Premier Support Contract are eligible to purchase a CSA.
• Based on recent customer discussions, quotes can range from $500 to $750 per server.
• Access to “custom support” for legacy platforms like Windows Server 2003 are not distributed automatically.
• Even if Microsoft rates a vulnerability at the highest critical level, Microsoft will commit to a patch but there are no strict
SLAs for the responsiveness to deliver this patch. Other incidents not deemed as critical by Microsoft may or may not be
fixed, but workarounds and suggestions may be given. This means that zero-day vulnerabilities remain unaddressed,
opening systems to attack during instances of patch unavailability and other windows of exposure.
Data Sheet: Security Management
Protect Your End-of-Life Windows Server 2003 Operating System
3
• CSAs are approved at a high management level within Microsoft on a case by case basis. The costs are not just the
support fees – lengthy legal negotiations and approvals can be required for large
corporations and this has to be taken into account.
• This option is not intended to be a long-term solution as “custom support” programs are specifically designed to help
customers bridge the support gap as they migrate to new operating systems.
• This option also incurs a higher cost due to costly “custom support” and frequent testing and
deployment of patches.
OpOption 4:tion 4: Protect, Monitor, and Harden your legacy systems with Server
Hardening Solutions.
With this approach, the customer deploys HIPS/HIDS based security to
harden the servers, monitor for any activities in the application and OS
kernels, and lock down admin rights and access to applications.
This option will enable customers the ability to execute a server refresh and
migration plan that fits their operational and budget objectives, and still
protect their server infrastructure. Customers can minimize downtime and
protect applications that are not currently compatible with the new OS
platform.
Benefits of this approach:
• Improves the security posture of your servers by protecting them against known and unknown (zero-day) malware.
• Eliminates emergency patching, and minimizes downtime and IT expenses related to patching through proactive
protection that does not require continuous updates.
• Reduces security incidents and remediation costs with continuous protection even if the server is
unable to get the latest patches in a timely fashion.
Option 4 clearly provides the best choice, with better and more consistent host security, lower overall costs and more
control with regards to legacy system replacement.
Symantec Data Center Security
Symantec Data Center Security: Server Advanced will help customers secure their Windows Server 2003 and other legacy
systems effectively, so they can:
• Minimize downtime and business disruption
• Execute a platform migration plan that fits their operational and budget constraints
• Maintain compliance to security standards and fulfill regulatory obligations.
• Automate and orchestrate a microsegmention strategy, thus applying security hardening policies at the application-
level instead of relying on rigid network and security zones. This “application-level” security approach provides an
additional layer of protection for mission-critical applications in the event a Windows Server 2003 system is
compromised.
Symantec Data Center Security: Server Advanced offers the following features to protect the customers’ legacy Windows
Server 2003 systems:
Data Sheet: Security Management
Protect Your End-of-Life Windows Server 2003 Operating System
4
For more information on Symantec Data Center Security: Server Advanced, download our SSymantec Data Center Securitymantec Data Center Security:y:
SerServer Advver Advanced Data Sheetanced Data Sheet.. As with any migration, the challenge is to execute it in an efficient, cost-effective, and
sustainable manner while protecting end-user productivity. Symantec can meet that challenge with migration and
deployment solutions that streamline processes to cut the expense, delay, and disruption of migration, keeping it in
control.
Call to Action:Call to Action: Secure or migrate with Symantec today.
The challenges of running unsupported legacy systems are not insignificant. But they are not insurmountable either. Just
because OS support has ended does not necessarily mean businesses are left vulnerable to security threats or at the mercy
of costly end-of-life support.
Symantec’s solutions offer simplified, comprehensive and cost-effective protection and migration of Windows Server 2003
systems, even after their end-of-support dates. Business operations continue uninterrupted and industry compliance
regulations are still met. Companies also gain control and set
the pace of system migration based on their business needs and schedule.
For more information on securing your legacy systems, visit us.
More Information
Visit our website
http://enterprise.symantec.com
To speak with a Product Specialist in the U.S.
Call toll-free 1 (800) 745 6054
To speak with a Product Specialist outside the U.S.
For specific country offices and contact numbers, please visit our website.
About Symantec
Symantec Corporation (NASDAQ: SYMC) is an information protection expert that helps people, businesses, and
governments seeking the freedom to unlock the opportunities technology brings—anytime, anywhere. Founded in April
1982, Symantec, a Fortune 500 company operating one of the largest global data intelligence networks, has provided
leading security, backup, and availability solutions for where vital information is stored, accessed, and shared. The
company's more than 20,000 employees reside in more than 50 countries. Ninety-nine percent of Fortune 500 companies
are Symantec customers. In fiscal 2014, it recorded revenue of $6.7 billion. To learn more go to www.symantec.com or
connect with Symantec at: go.symantec.com/socialmedia.
Data Sheet: Security Management
Protect Your End-of-Life Windows Server 2003 Operating System
5
Symantec World Headquarters
350 Ellis St.
Mountain View, CA 94043 USA
+1 (650) 527 8000
1 (800) 721 3934
www.symantec.com
Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the
U.S. and other countries. Other names may be trademarks of their respective owners.
21345142 02/15
Data Sheet: Security Management
Protect Your End-of-Life Windows Server 2003 Operating System
6

More Related Content

More from Symantec

Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantSymantec
 
Symantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec
 

More from Symantec (20)

Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators Want
 
Symantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 Webinar
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
 

Recently uploaded

Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
Software Coding for software engineering
Software Coding for software engineeringSoftware Coding for software engineering
Software Coding for software engineeringssuserb3a23b
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 

Recently uploaded (20)

Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
Odoo Development Company in India | Devintelle Consulting Service
Odoo Development Company in India | Devintelle Consulting ServiceOdoo Development Company in India | Devintelle Consulting Service
Odoo Development Company in India | Devintelle Consulting Service
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
Software Coding for software engineering
Software Coding for software engineeringSoftware Coding for software engineering
Software Coding for software engineering
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 

Protect Your End-of-Life Windows Server 2003 Operating System

  • 1. Protect Your End-of-Life Windows Server 2003 Operating System Your guide to mitigating risks in your Windows Server 2003 Systems after the end of support Data Sheet: Security Management End of Support is Not the End of Business When software vendors announce a product end-of-life (EOL), customers typically have 24 to 30 months to plan and execute their migration strategies. This period is typically referred to as limited support. After the last day of support (also known as “end of support life date”), the product becomes obsolete, and the vendor will no longer automatically issue security patches. Customers have the option to purchase “extended or custom support” from the vendor after this date. In many instances, the window for the availability of vendor support for the EOL product could be shorter than the time it would take for the customer to effectively migrate applications and processes to a new platform. Customers may also be running custom applications that may not be compatible with the new platform. These gaps potentially expose unsupported systems to zero-day threats and new malware attacks. In order to address these potential risks, businesses will need to make some hard decisions: • Run the applications in the unsupported platform. • Execute an aggressive migration strategy for the mission-critical applications. • Purchase an expensive extended support contract from the software vendor. • Implement a security solution to harden and monitor the unsupported systems. Businesses running enterprise-wide business applications on Microsoft Windows Server 2003 face this dilemma today. Microsoft Windows Server 2003 will reach its end-of-product-support-life date on 14 July 2015. After this date, Microsoft will no longer automatically issue security patches, leaving these systems highly vulnerable to zero-day attacks and other forms of malicious code. Businesses may choose to continue running their applications on unsupported Windows servers for a multitude of reasons, such as: • Minimize downtime for mission-critical applications and manage their budgets by staggering the migration to the new supported platform. • Support a mission-critical, legacy, proprietary application that is not currently supported by the new platform. Challenges of Legacy Systems The following security and compliance issues influence how businesses will execute their Windows Server 2003 EOL migration and risk mitigation strategies: 1
  • 2. 1) Securit1) Security threats from zy threats from zero-daero-day vulnerabilities and sophisy vulnerabilities and sophisticated malwareticated malware Security researchers continue to find new vulnerabilities in out-of-support operating systems (OS), which malicious entities are very eager to exploit. Malicious hackers have been known to target unsupported systems as a method for gaining entry into a business’s IT infrastructure. As large enterprises beef up their security protection, hackers are also using the unsupported systems in a large enterprise’s supply chain ecosystem to gain entry. 2) Re2) Regulatorgulatory compliance and cy compliance and cyber securityber security governancey governance Regulations like PCI-DSS and HIPAA-HITECH demand businesses take the necessary precautions to protect information and processes running on potentially vulnerable systems. The Securities and Exchange Commission (SEC) has been very vocal in issuing guidelines and obligations for reporting on data breaches. In its January 2014 Priorities letter, the SEC’s Office of Compliance Inspections and Examinations (OCIE) included governance and supervision of information technology systems, operational capability, market access, information security, and preparedness to respond to sudden malfunctions and system outages. Cyber security is now considered a primary risk factor and company annual reports must now reflect this. Running unprotected systems, therefore, exposes the business to compliance violations, resulting in hefty fines, sanctions and penalties. 3) Reputation damage and remediation co3) Reputation damage and remediation cosst associated with data breacht associated with data breach Unprotected systems makes the business more susceptible to data breaches, loss of critical, confidential data, and business disruption such as an inability to run mission-critical transactions or deliver customer services—all of which damage the brand and the customer’s trust. On top of that, businesses will incur the costs associated with system remediation, investigation, and customer care following the attack. Data Sheet: Security Management Protect Your End-of-Life Windows Server 2003 Operating System 2
  • 3. 4) Co4) Cossts associated with tests associated with testing and vting and validating “cusalidating “customtom” Micro” Microsofsoft patchest patches Customers also have to consider the investment to test and validate patches to the business applications running on top of the legacy servers. Even if the customer purchases patches from Microsoft, most application vendors won’t support the patches as they cannot test that the patch will not impact their application. The onus on testing and validating the Microsoft custom patches rests on the customer. The customer will also have to assume the risks of application outages resulting from incompatibility with the patch. This leads to increased operational cost and risks. What Options Are There? Customers have four options for addressing their potential security exposure from running unsupported Windows Server 2003 systems after its last day of support: OpOption 1:tion 1: Do nothing. Some customers may choose to continue running applications on the unsupported platform when these applications are not considered as mission critical. Recent data breaches have shown that malicious hackers are taking advantage of vulnerabilities in unsupported systems to gain a backdoor entry for launching their attacks. Doing nothing is not an option when the applications are mission critical but not compatible with the new platform. In this instance, customers will need to decide between executing an aggressive platform migration, purchasing a Customer Support Agreement, or enabling a server security hardening solution. OpOption 2:tion 2: Migrate applications into the new Windows Server Systems platform. This option is most suitable for taking advantage of the benefits of a new OS and its associated applications, or for minimizing the operational and management costs of IT systems by standardizing its hardware and software. Customers will be able to eliminate the risks and vulnerabilities associated with end-of-life systems. Even though a migration can eventually lead to significant productivity, security and control benefits, it can still be an intimidating task. In the past, migrations involved manually collecting inventory and configuration data, throwing together solutions from disparate tools, writing and testing scripts to handle endless contingencies and dependencies, plus a thousand other endless routines that exhausts time, energy, money, motivation and executive patience. Customers planning their platform migrations also need to take into account the impact an aggressive migration strategy would have on their operational budgets. OpOption 3:tion 3: Purchase “Custom Support Agreements (CSA)” from Microsoft. There are several critical issues to consider for customers evaluating this option: • Only customers with a Premier Support Contract are eligible to purchase a CSA. • Based on recent customer discussions, quotes can range from $500 to $750 per server. • Access to “custom support” for legacy platforms like Windows Server 2003 are not distributed automatically. • Even if Microsoft rates a vulnerability at the highest critical level, Microsoft will commit to a patch but there are no strict SLAs for the responsiveness to deliver this patch. Other incidents not deemed as critical by Microsoft may or may not be fixed, but workarounds and suggestions may be given. This means that zero-day vulnerabilities remain unaddressed, opening systems to attack during instances of patch unavailability and other windows of exposure. Data Sheet: Security Management Protect Your End-of-Life Windows Server 2003 Operating System 3
  • 4. • CSAs are approved at a high management level within Microsoft on a case by case basis. The costs are not just the support fees – lengthy legal negotiations and approvals can be required for large corporations and this has to be taken into account. • This option is not intended to be a long-term solution as “custom support” programs are specifically designed to help customers bridge the support gap as they migrate to new operating systems. • This option also incurs a higher cost due to costly “custom support” and frequent testing and deployment of patches. OpOption 4:tion 4: Protect, Monitor, and Harden your legacy systems with Server Hardening Solutions. With this approach, the customer deploys HIPS/HIDS based security to harden the servers, monitor for any activities in the application and OS kernels, and lock down admin rights and access to applications. This option will enable customers the ability to execute a server refresh and migration plan that fits their operational and budget objectives, and still protect their server infrastructure. Customers can minimize downtime and protect applications that are not currently compatible with the new OS platform. Benefits of this approach: • Improves the security posture of your servers by protecting them against known and unknown (zero-day) malware. • Eliminates emergency patching, and minimizes downtime and IT expenses related to patching through proactive protection that does not require continuous updates. • Reduces security incidents and remediation costs with continuous protection even if the server is unable to get the latest patches in a timely fashion. Option 4 clearly provides the best choice, with better and more consistent host security, lower overall costs and more control with regards to legacy system replacement. Symantec Data Center Security Symantec Data Center Security: Server Advanced will help customers secure their Windows Server 2003 and other legacy systems effectively, so they can: • Minimize downtime and business disruption • Execute a platform migration plan that fits their operational and budget constraints • Maintain compliance to security standards and fulfill regulatory obligations. • Automate and orchestrate a microsegmention strategy, thus applying security hardening policies at the application- level instead of relying on rigid network and security zones. This “application-level” security approach provides an additional layer of protection for mission-critical applications in the event a Windows Server 2003 system is compromised. Symantec Data Center Security: Server Advanced offers the following features to protect the customers’ legacy Windows Server 2003 systems: Data Sheet: Security Management Protect Your End-of-Life Windows Server 2003 Operating System 4
  • 5. For more information on Symantec Data Center Security: Server Advanced, download our SSymantec Data Center Securitymantec Data Center Security:y: SerServer Advver Advanced Data Sheetanced Data Sheet.. As with any migration, the challenge is to execute it in an efficient, cost-effective, and sustainable manner while protecting end-user productivity. Symantec can meet that challenge with migration and deployment solutions that streamline processes to cut the expense, delay, and disruption of migration, keeping it in control. Call to Action:Call to Action: Secure or migrate with Symantec today. The challenges of running unsupported legacy systems are not insignificant. But they are not insurmountable either. Just because OS support has ended does not necessarily mean businesses are left vulnerable to security threats or at the mercy of costly end-of-life support. Symantec’s solutions offer simplified, comprehensive and cost-effective protection and migration of Windows Server 2003 systems, even after their end-of-support dates. Business operations continue uninterrupted and industry compliance regulations are still met. Companies also gain control and set the pace of system migration based on their business needs and schedule. For more information on securing your legacy systems, visit us. More Information Visit our website http://enterprise.symantec.com To speak with a Product Specialist in the U.S. Call toll-free 1 (800) 745 6054 To speak with a Product Specialist outside the U.S. For specific country offices and contact numbers, please visit our website. About Symantec Symantec Corporation (NASDAQ: SYMC) is an information protection expert that helps people, businesses, and governments seeking the freedom to unlock the opportunities technology brings—anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company operating one of the largest global data intelligence networks, has provided leading security, backup, and availability solutions for where vital information is stored, accessed, and shared. The company's more than 20,000 employees reside in more than 50 countries. Ninety-nine percent of Fortune 500 companies are Symantec customers. In fiscal 2014, it recorded revenue of $6.7 billion. To learn more go to www.symantec.com or connect with Symantec at: go.symantec.com/socialmedia. Data Sheet: Security Management Protect Your End-of-Life Windows Server 2003 Operating System 5
  • 6. Symantec World Headquarters 350 Ellis St. Mountain View, CA 94043 USA +1 (650) 527 8000 1 (800) 721 3934 www.symantec.com Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 21345142 02/15 Data Sheet: Security Management Protect Your End-of-Life Windows Server 2003 Operating System 6