SlideShare a Scribd company logo
1 of 19
Download to read offline
Symantec Protection Suite
Enterprise Family
Solution Announcement and Overview



April 13, 2010

                                     1
Agenda

   1     Current Symantec Protection Suites


   2     Challenges for IT Organizations

   3     Buying Behavior of Suite Customers

         Symantec Protection Center &
   4
         Symantec Protection Suites

   5     Summary


                                              2
What We are Announcing:

 Symantec Protection Center                SPS – Enterprise
                                           • Launching three new suites to
• Unifying information security
                                             handle specific needs – Endpoints,
  management across endpoint,
                                             Gateway, Servers
  gateway, and server threat vectors
                                           • Current & future management
• Providing deep visibility,
                                             strategy builds an integrated
  accelerated response capabilities,
                                             solution for customers
  and increased productivity of
  security operations.                     • Provide more flexible deployment
                                             options with Hosted SaaS Services
• Available April 16, 2010




                                       3
Symantec Protection Suites Today

                    • Previous announcement April 2009 -
      Current         Expansion, refocus, and renaming of
1     Suites          previous suite offerings
                    • Current Suites:
     Challenges
2       for IT
                        • Symantec Protection Suite
    Organizations
                          Enterprise Edition
    Research of         • Symantec Protection Suite
3     Buying
     Behaviors            Small Business Edition
                    • Three core protection areas
       New
4    Symantec
                        • Endpoint Security
      Suites

                        • Messaging & Web Security
5     Summary           • Backup & Recovery


                                                            4
Challenges today’s IT administrators face

                    Management                         Infrastructure Threats
1
      Current
      Suites        • Lack of visibility across        • Rapidly evolving information
                      security infrastructure limits     technology demands
                      ability to recognize and
     Challenges
                      respond to threats               • Security risks that are unique
2       for IT                                           to their organizational and
    Organizations
                    • Lack of automation and             infrastructure focus areas
                      disconnects between
    Research of
                      people, processes and            • Realizing the full potential
3     Buying
     Behaviors
                      information slow response          and value of all technologies
                      time and increase risk             since purchases are often
       New                                               made unilaterally by a single
4    Symantec       • Increasing complexity drives       IT group
      Suites
                      up costs and decreases
                      productivity                     • Security purchases aren’t
                                                         single vendor, requires
5     Summary                                            multiple vendors for
                                                         complete protection

                                                                                     5
Key Research Findings
                         • As organization size               • Highly distributed purchase
                           increases, buying
1     Current
      Suites               behaviors and                        & decision-making process
                           responsibilities change
                                                              • Specialized buying centers –
     Challenges
                         • Initiatives,                         three key centers identified
2       for IT
                           recommendations, and
    Organizations          decisions originate from
                           specialized IT functions
    Research of          • Final spend authority




                                                                                            Influence shifts
3     Buying               remains concentrated in
                           CIO/CISO but there is no




                                                                                Org. Size
     Behaviors
                           significant concern with
                           specific solutions
       New
4    Symantec
                                                         CIO/CISO
      Suites




5     Summary                               Endpoint      Gateway         Server
                                          Admin/Buyer   Admin/Buyer     Admin/Buyer

                                                                                                               6
                  Source: Strategic Oxygen INE 7
Symantec Protection Suite Enterprise Family
    Solving challenges of specific IT domains
                    Listening to enterprise customers…
                                                                      Endpoint Admin
1     Current
      Suites
                    • Endpoint Security Managers
     Challenges
                       • What they require in their domain of control
2       for IT
    Organizations        – Understanding where their assets are
                         – Ability to more effectively manage their security
    Research of
3     Buying               infrastructure
     Behaviors
                         – Ability to detect confidential data on endpoints
       New               – Ability to automate and integrate manual IT processes
4    Symantec
      Suites




5     Summary




                                                                                   7
Symantec Protection Suite Enterprise Family
    Solving challenges of specific IT domains
                    Listening to enterprise customers…
                                                                                Gateway
1     Current
      Suites        • Network / Gateway Security Manager                         Admin
                      – Secure business communications: email and web
     Challenges       – Protect access to the network
2       for IT
    Organizations     – Protect confidential data if it tries to leave the network

    Research of
3     Buying
     Behaviors

                    • Server Security Manager                                    Server
       New
                      –   Protection for mission critical servers                Admin
4    Symantec
      Suites
                      –   Supporting servers in a multi-OS environment
                      –   Support for both physical and virtual environments
5     Summary
                      –   Looking at best-of-breed server protection


                                                                                          8
Symantec Protection Center
    The first step toward central management…                                    New

                    Symantec Protection Center enables customers to manage their
1
      Current       environment with a single sign-on Web console that provides
      Suites
                    administrators full access to configuration management, report
                    generation, and dashboard views of multiple Symantec
     Challenges     protection technologies.
2       for IT
    Organizations

                    • Pinpoint Relevant Security
    Research of
3     Buying          Threats Promptly
     Behaviors

                    • Accelerate Time To Protection
        New
4
     Symantec
     Suites and
      offerings
                    • Increase Productivity of Security
                      Operations

5     Summary

                    Available: April 16, 2010
                                                                                     9
Symantec Protection Center
    Security Management Across Endpoint, Gateway, and Servers


1
        Current
        Suites
                         Access to manage multiple solutions:
     Challenges          • Symantec Endpoint Protection
2       for IT
    Organizations
                         • Symantec Network Access Control
     Research of         • Symantec Brightmail Gateway
3      Buying
      Behaviors
                         • Symantec Web Gateway
4
         New
      Symantec           • Symantec DLP
      Suites and
       offerings
                         • Symantec Critical System Protection
5      Summary           • IT Analytics

    Symantec Protection Suite                                    10
Symantec Protection Suite Enterprise Family
    Three new enterprise suites                                                    New

                    • Suites designed to provide in-depth protection tailored to
1
      Current         specific areas of the IT infrastructure
      Suites
                    • Best suited for enterprises with 1000+ employees
     Challenges     • Announcement: April 13, 2010 at Symantec’s Vision Conference
2       for IT
    Organizations
                    • Available for purchase: June 7, 2010
    Research of
3     Buying
     Behaviors


        New
4
     Symantec
     Suites and
      offerings



5     Summary




                                                                                     11
Symantec Protection Suite
    Enterprise Edition for Endpoints                                                 New

                    Symantec Protection Suite Enterprise Edition for Endpoints
1
      Current       enables you to effectively manage the business risk of IT by
      Suites
                    reducing the risk profile of your most frequently targeted and
                    attacked assets.
     Challenges
2       for IT
    Organizations

                     • Symantec Endpoint Protection
    Research of
3     Buying         • DLP Standard
     Behaviors
                     • Altiris Inventory Solution
        New          • Altiris Patch Management
4
     Symantec
     Suites and
                     • Symantec Network Access Control
      offerings        Self-Enforcement
                     • Non-Windows clients
5     Summary             • Mac, Linux, Mobile
                     • Symantec Workflow

                                                                                       12
Symantec Protection Suite
    Enterprise Edition for Gateway                                             New

                    Symantec Protection Suite Enterprise Edition for Gateway
1
      Current       safeguards confidential data and employee productivity by
      Suites
                    creating a protected messaging, Web and network environment.

     Challenges
2       for IT
    Organizations


    Research of
3     Buying                              • Symantec Brightmail Gateway w/ virtual
     Behaviors
                                            appliance
        New
                                          • Symantec Web Gateway
4
     Symantec
     Suites and
                                          • Symantec Network Access Control
      offerings                             Gateway & Guest
                                          • Symantec Mail Security
5     Summary                             • Symantec Premium AntiSpam
                                          • Symantec Workflow

                                                                                     13
Symantec Protection Suite
    Enterprise Edition for Servers                                                 New

                    Symantec Protection Suite Enterprise Edition for Servers delivers
1
      Current       complete and high performance protection where you need it.
      Suites
                    Protect against physical and virtual server downtime with policy-
                    based prevention using multiple protection technologies
     Challenges     combined in a single cost-effective protection suite.
2       for IT
    Organizations


    Research of      • Symantec Critical System Protection
3     Buying
                       (Server Edition)
     Behaviors
                     • Symantec Endpoint Protection
        New          • Symantec AntiVirus for Linux
4
     Symantec
     Suites and      • Symantec Workflow
      offerings



5     Summary

                    * Existing Critical System Protection customers receive
                      direct entitlement to this new suite
                                                                                        14
Symantec Hosted Security
    Two newly-available add-ons to SPS                                                        New

                    Symantec Hosted Services Add-On SKUs for Symantec Protection
1
      Current       Suite is available to Protection Suite customers and provides hosted
      Suites
                    security services for email and Web that help protect users against
                    email threats, spam and Web-borne malware in the cloud – before
     Challenges     they reach the corporate network.
2       for IT
    Organizations

                    • Two options now available to all Symantec partners
    Research of
3     Buying            • Symantec Hosted Services Email Protect and Control Add-On for SPS
     Behaviors
                        • Symantec Hosted Services Email and Web Protect and Control Add-On for SPS
        New
4
     Symantec       • Announcement: March 3, 2010
     Suites and
      offerings
                    • Available for purchase: April 5, 2010

5     Summary




                                                                                                15
Briefing Summary
                    • New Management Initiative
1     Current
      Suites            • Symantec Protection Center
                    • New Protection Suite offerings
     Challenges
2       for IT          • Symantec Protection Suite Enterprise Edition for Endpoints
    Organizations
                        • Symantec Protection Suite Enterprise Edition for Gateway
    Research of
3     Buying            • Symantec Protection Suite Enterprise Edition for Servers
     Behaviors
                    • New Symantec Hosted Services add-on SKUs for SPS

4
       New
     Symantec
                        • SHS Email Protect and Control Add-On for SPS
      Suites
                        • SHS Email and Web Protect and Control Add-On for SPS

5     Summary




                                                                                       16
Symantec Protection Suite
    New offerings create new opportunities
                    • Symantec Protection Center initiative lays the foundation for
1     Current         our management strategy
      Suites
                    • Provides customers solutions designed to fit their business
                      needs
     Challenges
2       for IT
    Organizations   • Demonstrates further commitment to our suites strategy and
                      the value customers will continue to receive through Symantec
    Research of       suites
3     Buying
     Behaviors


       New
4    Symantec
      Suites




5     Summary




                                                                                      17
The new Symantec Protection Suites are a perfect fit
for enterprise customers needing to effectively protect
their infrastructures and information. Protection
Center's consolidated access to security infrastructure
management and reporting, along with the drag and
drop workflow capabilities, will allow our clients to
tightly integrate the solution into their environments
                        Wade Wyant, president at ITS
                        Partners




                                                          18
Thank you!




SYMANTEC PROPRIETARY/CONFIDENTIAL – INTERNAL USE ONLY
Copyright © 2010 Symantec Corporation. All rights reserved.


                                                              19

More Related Content

What's hot

Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataIBM Security
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012Nicolai Henriksen
 
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSymantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSree Harsha Boyapati
 
Centralizing security on the mainframe
Centralizing security on the mainframeCentralizing security on the mainframe
Centralizing security on the mainframeArun Gopinath
 
System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2Norman Mayes
 
"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're InfectedTripwire
 
IBM Endpoint Manager for Server Automation (Overview)
IBM Endpoint Manager for Server Automation (Overview)IBM Endpoint Manager for Server Automation (Overview)
IBM Endpoint Manager for Server Automation (Overview)Kimber Spradlin
 
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...Digital Bond
 
Software Vulnerabilities Risk Remediation
Software Vulnerabilities Risk RemediationSoftware Vulnerabilities Risk Remediation
Software Vulnerabilities Risk RemediationBruce Hafner
 
Guardium Presentation
Guardium PresentationGuardium Presentation
Guardium Presentationtsteh
 
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?IBM Security
 
Windows Host Access Management with CA Access Control
Windows Host Access Management with CA Access ControlWindows Host Access Management with CA Access Control
Windows Host Access Management with CA Access Controlwebhostingguy
 
Big Fix Architectural Overview
Big Fix Architectural OverviewBig Fix Architectural Overview
Big Fix Architectural OverviewBrian Dickhaus
 
Riding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_pRiding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_pMicrosoft Singapore
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Samuel Kamuli
 
Guardium
GuardiumGuardium
Guardiumgigamon
 
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBSIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBMerlin Govender
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingDsunte Wilson
 

What's hot (20)

Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012
 
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSymantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
 
Centralizing security on the mainframe
Centralizing security on the mainframeCentralizing security on the mainframe
Centralizing security on the mainframe
 
Ambesh
AmbeshAmbesh
Ambesh
 
System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2
 
"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected
 
IBM Endpoint Manager for Server Automation (Overview)
IBM Endpoint Manager for Server Automation (Overview)IBM Endpoint Manager for Server Automation (Overview)
IBM Endpoint Manager for Server Automation (Overview)
 
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
 
Software Vulnerabilities Risk Remediation
Software Vulnerabilities Risk RemediationSoftware Vulnerabilities Risk Remediation
Software Vulnerabilities Risk Remediation
 
Guardium Presentation
Guardium PresentationGuardium Presentation
Guardium Presentation
 
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
 
Windows Host Access Management with CA Access Control
Windows Host Access Management with CA Access ControlWindows Host Access Management with CA Access Control
Windows Host Access Management with CA Access Control
 
Network Operations Center
Network Operations CenterNetwork Operations Center
Network Operations Center
 
Big Fix Architectural Overview
Big Fix Architectural OverviewBig Fix Architectural Overview
Big Fix Architectural Overview
 
Riding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_pRiding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_p
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
Guardium
GuardiumGuardium
Guardium
 
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBSIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEB
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
 

Similar to SPS Enterprise Family

Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec
 
Symantec - Data Governance in the Cloud
Symantec - Data Governance in the CloudSymantec - Data Governance in the Cloud
Symantec - Data Governance in the CloudAmazon Web Services
 
IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011IBM Sverige
 
Whose View is it Anyway: Addressing Multiple Stakeholder Concerns
Whose View is it Anyway: Addressing Multiple Stakeholder ConcernsWhose View is it Anyway: Addressing Multiple Stakeholder Concerns
Whose View is it Anyway: Addressing Multiple Stakeholder Concernssferoz
 
Security for QuickBooks and QuickBooks Enterprise
Security for QuickBooks and QuickBooks EnterpriseSecurity for QuickBooks and QuickBooks Enterprise
Security for QuickBooks and QuickBooks EnterpriseScott K. Wilder
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloudTrend Micro
 
Symantec Data Insight
Symantec Data InsightSymantec Data Insight
Symantec Data InsightSymantec
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Symantec
 
The Future of Software Security Assurance
The Future of Software Security AssuranceThe Future of Software Security Assurance
The Future of Software Security AssuranceRafal Los
 
SMB Information Protection Portfolio
SMB Information Protection PortfolioSMB Information Protection Portfolio
SMB Information Protection PortfolioSymantec
 
Symantec Appliances Strategy Launch
Symantec Appliances Strategy LaunchSymantec Appliances Strategy Launch
Symantec Appliances Strategy LaunchSymantec
 
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsRationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsBob Rhubart
 
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal FirewallsMicro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal FirewallsColorTokens Inc
 
I Series User Management
I Series User ManagementI Series User Management
I Series User ManagementSJeffrey23
 
IBM i HA and Security: Why They Need to Work Together
IBM i HA and Security: Why They Need to Work TogetherIBM i HA and Security: Why They Need to Work Together
IBM i HA and Security: Why They Need to Work TogetherPrecisely
 
How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...Agora Group
 

Similar to SPS Enterprise Family (20)

Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
 
Symantec - Data Governance in the Cloud
Symantec - Data Governance in the CloudSymantec - Data Governance in the Cloud
Symantec - Data Governance in the Cloud
 
IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011
 
Whose View is it Anyway: Addressing Multiple Stakeholder Concerns
Whose View is it Anyway: Addressing Multiple Stakeholder ConcernsWhose View is it Anyway: Addressing Multiple Stakeholder Concerns
Whose View is it Anyway: Addressing Multiple Stakeholder Concerns
 
Security for QuickBooks and QuickBooks Enterprise
Security for QuickBooks and QuickBooks EnterpriseSecurity for QuickBooks and QuickBooks Enterprise
Security for QuickBooks and QuickBooks Enterprise
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloud
 
Symantec Data Insight
Symantec Data InsightSymantec Data Insight
Symantec Data Insight
 
Who will guard the guards
Who will guard the guardsWho will guard the guards
Who will guard the guards
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
 
The Future of Software Security Assurance
The Future of Software Security AssuranceThe Future of Software Security Assurance
The Future of Software Security Assurance
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
Mdm solutions comparison
Mdm solutions comparisonMdm solutions comparison
Mdm solutions comparison
 
SMB Information Protection Portfolio
SMB Information Protection PortfolioSMB Information Protection Portfolio
SMB Information Protection Portfolio
 
IANS-2008
IANS-2008IANS-2008
IANS-2008
 
Symantec Appliances Strategy Launch
Symantec Appliances Strategy LaunchSymantec Appliances Strategy Launch
Symantec Appliances Strategy Launch
 
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsRationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
 
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal FirewallsMicro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
 
I Series User Management
I Series User ManagementI Series User Management
I Series User Management
 
IBM i HA and Security: Why They Need to Work Together
IBM i HA and Security: Why They Need to Work TogetherIBM i HA and Security: Why They Need to Work Together
IBM i HA and Security: Why They Need to Work Together
 
How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...
 

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

SPS Enterprise Family

  • 1. Symantec Protection Suite Enterprise Family Solution Announcement and Overview April 13, 2010 1
  • 2. Agenda 1 Current Symantec Protection Suites 2 Challenges for IT Organizations 3 Buying Behavior of Suite Customers Symantec Protection Center & 4 Symantec Protection Suites 5 Summary 2
  • 3. What We are Announcing: Symantec Protection Center SPS – Enterprise • Launching three new suites to • Unifying information security handle specific needs – Endpoints, management across endpoint, Gateway, Servers gateway, and server threat vectors • Current & future management • Providing deep visibility, strategy builds an integrated accelerated response capabilities, solution for customers and increased productivity of security operations. • Provide more flexible deployment options with Hosted SaaS Services • Available April 16, 2010 3
  • 4. Symantec Protection Suites Today • Previous announcement April 2009 - Current Expansion, refocus, and renaming of 1 Suites previous suite offerings • Current Suites: Challenges 2 for IT • Symantec Protection Suite Organizations Enterprise Edition Research of • Symantec Protection Suite 3 Buying Behaviors Small Business Edition • Three core protection areas New 4 Symantec • Endpoint Security Suites • Messaging & Web Security 5 Summary • Backup & Recovery 4
  • 5. Challenges today’s IT administrators face Management Infrastructure Threats 1 Current Suites • Lack of visibility across • Rapidly evolving information security infrastructure limits technology demands ability to recognize and Challenges respond to threats • Security risks that are unique 2 for IT to their organizational and Organizations • Lack of automation and infrastructure focus areas disconnects between Research of people, processes and • Realizing the full potential 3 Buying Behaviors information slow response and value of all technologies time and increase risk since purchases are often New made unilaterally by a single 4 Symantec • Increasing complexity drives IT group Suites up costs and decreases productivity • Security purchases aren’t single vendor, requires 5 Summary multiple vendors for complete protection 5
  • 6. Key Research Findings • As organization size • Highly distributed purchase increases, buying 1 Current Suites behaviors and & decision-making process responsibilities change • Specialized buying centers – Challenges • Initiatives, three key centers identified 2 for IT recommendations, and Organizations decisions originate from specialized IT functions Research of • Final spend authority Influence shifts 3 Buying remains concentrated in CIO/CISO but there is no Org. Size Behaviors significant concern with specific solutions New 4 Symantec CIO/CISO Suites 5 Summary Endpoint Gateway Server Admin/Buyer Admin/Buyer Admin/Buyer 6 Source: Strategic Oxygen INE 7
  • 7. Symantec Protection Suite Enterprise Family Solving challenges of specific IT domains Listening to enterprise customers… Endpoint Admin 1 Current Suites • Endpoint Security Managers Challenges • What they require in their domain of control 2 for IT Organizations – Understanding where their assets are – Ability to more effectively manage their security Research of 3 Buying infrastructure Behaviors – Ability to detect confidential data on endpoints New – Ability to automate and integrate manual IT processes 4 Symantec Suites 5 Summary 7
  • 8. Symantec Protection Suite Enterprise Family Solving challenges of specific IT domains Listening to enterprise customers… Gateway 1 Current Suites • Network / Gateway Security Manager Admin – Secure business communications: email and web Challenges – Protect access to the network 2 for IT Organizations – Protect confidential data if it tries to leave the network Research of 3 Buying Behaviors • Server Security Manager Server New – Protection for mission critical servers Admin 4 Symantec Suites – Supporting servers in a multi-OS environment – Support for both physical and virtual environments 5 Summary – Looking at best-of-breed server protection 8
  • 9. Symantec Protection Center The first step toward central management… New Symantec Protection Center enables customers to manage their 1 Current environment with a single sign-on Web console that provides Suites administrators full access to configuration management, report generation, and dashboard views of multiple Symantec Challenges protection technologies. 2 for IT Organizations • Pinpoint Relevant Security Research of 3 Buying Threats Promptly Behaviors • Accelerate Time To Protection New 4 Symantec Suites and offerings • Increase Productivity of Security Operations 5 Summary Available: April 16, 2010 9
  • 10. Symantec Protection Center Security Management Across Endpoint, Gateway, and Servers 1 Current Suites Access to manage multiple solutions: Challenges • Symantec Endpoint Protection 2 for IT Organizations • Symantec Network Access Control Research of • Symantec Brightmail Gateway 3 Buying Behaviors • Symantec Web Gateway 4 New Symantec • Symantec DLP Suites and offerings • Symantec Critical System Protection 5 Summary • IT Analytics Symantec Protection Suite 10
  • 11. Symantec Protection Suite Enterprise Family Three new enterprise suites New • Suites designed to provide in-depth protection tailored to 1 Current specific areas of the IT infrastructure Suites • Best suited for enterprises with 1000+ employees Challenges • Announcement: April 13, 2010 at Symantec’s Vision Conference 2 for IT Organizations • Available for purchase: June 7, 2010 Research of 3 Buying Behaviors New 4 Symantec Suites and offerings 5 Summary 11
  • 12. Symantec Protection Suite Enterprise Edition for Endpoints New Symantec Protection Suite Enterprise Edition for Endpoints 1 Current enables you to effectively manage the business risk of IT by Suites reducing the risk profile of your most frequently targeted and attacked assets. Challenges 2 for IT Organizations • Symantec Endpoint Protection Research of 3 Buying • DLP Standard Behaviors • Altiris Inventory Solution New • Altiris Patch Management 4 Symantec Suites and • Symantec Network Access Control offerings Self-Enforcement • Non-Windows clients 5 Summary • Mac, Linux, Mobile • Symantec Workflow 12
  • 13. Symantec Protection Suite Enterprise Edition for Gateway New Symantec Protection Suite Enterprise Edition for Gateway 1 Current safeguards confidential data and employee productivity by Suites creating a protected messaging, Web and network environment. Challenges 2 for IT Organizations Research of 3 Buying • Symantec Brightmail Gateway w/ virtual Behaviors appliance New • Symantec Web Gateway 4 Symantec Suites and • Symantec Network Access Control offerings Gateway & Guest • Symantec Mail Security 5 Summary • Symantec Premium AntiSpam • Symantec Workflow 13
  • 14. Symantec Protection Suite Enterprise Edition for Servers New Symantec Protection Suite Enterprise Edition for Servers delivers 1 Current complete and high performance protection where you need it. Suites Protect against physical and virtual server downtime with policy- based prevention using multiple protection technologies Challenges combined in a single cost-effective protection suite. 2 for IT Organizations Research of • Symantec Critical System Protection 3 Buying (Server Edition) Behaviors • Symantec Endpoint Protection New • Symantec AntiVirus for Linux 4 Symantec Suites and • Symantec Workflow offerings 5 Summary * Existing Critical System Protection customers receive direct entitlement to this new suite 14
  • 15. Symantec Hosted Security Two newly-available add-ons to SPS New Symantec Hosted Services Add-On SKUs for Symantec Protection 1 Current Suite is available to Protection Suite customers and provides hosted Suites security services for email and Web that help protect users against email threats, spam and Web-borne malware in the cloud – before Challenges they reach the corporate network. 2 for IT Organizations • Two options now available to all Symantec partners Research of 3 Buying • Symantec Hosted Services Email Protect and Control Add-On for SPS Behaviors • Symantec Hosted Services Email and Web Protect and Control Add-On for SPS New 4 Symantec • Announcement: March 3, 2010 Suites and offerings • Available for purchase: April 5, 2010 5 Summary 15
  • 16. Briefing Summary • New Management Initiative 1 Current Suites • Symantec Protection Center • New Protection Suite offerings Challenges 2 for IT • Symantec Protection Suite Enterprise Edition for Endpoints Organizations • Symantec Protection Suite Enterprise Edition for Gateway Research of 3 Buying • Symantec Protection Suite Enterprise Edition for Servers Behaviors • New Symantec Hosted Services add-on SKUs for SPS 4 New Symantec • SHS Email Protect and Control Add-On for SPS Suites • SHS Email and Web Protect and Control Add-On for SPS 5 Summary 16
  • 17. Symantec Protection Suite New offerings create new opportunities • Symantec Protection Center initiative lays the foundation for 1 Current our management strategy Suites • Provides customers solutions designed to fit their business needs Challenges 2 for IT Organizations • Demonstrates further commitment to our suites strategy and the value customers will continue to receive through Symantec Research of suites 3 Buying Behaviors New 4 Symantec Suites 5 Summary 17
  • 18. The new Symantec Protection Suites are a perfect fit for enterprise customers needing to effectively protect their infrastructures and information. Protection Center's consolidated access to security infrastructure management and reporting, along with the drag and drop workflow capabilities, will allow our clients to tightly integrate the solution into their environments Wade Wyant, president at ITS Partners 18
  • 19. Thank you! SYMANTEC PROPRIETARY/CONFIDENTIAL – INTERNAL USE ONLY Copyright © 2010 Symantec Corporation. All rights reserved. 19