• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Symantec Introduces New Security Solutions to Counter Advanced Persistent Threats
 

Symantec Introduces New Security Solutions to Counter Advanced Persistent Threats

on

  • 2,078 views

Symantec Endpoint Protection 12, optimized for virtual environments, offers organizations the vital protection needed to effectively safeguard information from attackers. Symantec Protection Center ...

Symantec Endpoint Protection 12, optimized for virtual environments, offers organizations the vital protection needed to effectively safeguard information from attackers. Symantec Protection Center 2.0 draws upon correlated visibility from multiple security products to provide relevant actionable intelligence that reduces risks to business.

Statistics

Views

Total Views
2,078
Views on SlideShare
2,078
Embed Views
0

Actions

Likes
2
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Symantec Introduces New Security Solutions to Counter Advanced Persistent Threats Symantec Introduces New Security Solutions to Counter Advanced Persistent Threats Presentation Transcript

    • Symantec Introduces New Security Solutionsto Counter Advanced Persistent ThreatsMay 4, 2011 1
    • 5.4.11 AnnouncementNew Symantec Security Solutions Combat Advanced Persistent Threats In Traditional And Virtual Environments Symantec Endpoint Symantec Protection Protection 12.1 Center 2.0• Public Beta Program • Security Intelligence• Protect with Insight • Central Management• Built for virtual • New product release environments later this year 2
    • Key Customer ChallengesChallenging Threat Evolving Prioritization Landscape Infrastructure Challenges More sophisticated Drive to adopt virtual and Information explosion – external attacks cloud-based prioritize what data to infrastructures protectTargeted malware attacks (Stuxnet) Need to embrace and Growing number and secure a wide range of diversity of devices – Malicious insiders mobile devices prioritize IT risks (WikiLeaks) / well- meaning insiders Changing compliance requirements 3
    • Use Intelligence To Drive Targeted Security Response Reactive Security Management Information Centric Security Management ! ! ! ! ! ! ! ! ! ! 4
    • Symantec Protection CenterRelevant Actionable Security Intelligence Identify emerging threats across local Intelligence and global environments Prioritize tasks based on role, context Priority and severity Accelerate time to protection with Action relevant, actionable intelligence 5
    • What’s New in 2.0?• Three levels of integration- Single Sign on, Data collection, Action• Symantec GIN Integration• Basic event correlation• Cross Product Reporting- malware, email, asset• Dashboard Notifications- Role based prioritization• Prebuilt workflow templates- Symantec Endpoint Protection• Third Party Integration 6
    • Symantec Endpoint Protection 12 Beta ProgramENTERPRISE [SEP 12] is effective against the more insidious, targeted attacks. - Christian Sosa, 20th Century FoxSMALL BUSINESS We are seeing improved performance on our machines. - Robert Lantrip, Ourco WeldingPUBLIC BETA NOW AVAILABLE • 450 in private beta • 1300 Symantec employees deployed • +5700 public beta registrants • 10,000 Symantec employees will be • 33% have a competitive product deployed by end of May 2011 • 64% are SMB’s 7
    • Symantec Enterprise Security Framework People Information Devices S E C U R I T Y S U I T E S Data Loss Symantec IT Management VeriSign Identity Control Prevention and Protection Suites Suite & Authentication Compliance Suite Encryption VISIBILITY AND CONTROL Symantec Protection Center Prioritization Reporting Automation SECURITY INTELLIGENCE Better Threat Protection Built for Mobility Better Compliance Global Intelligence Network VeriSign Trust Services CCS Regulatory Intelligence Insight Location Awareness CCS Compliance Practices CHOICE OF DELIVERY MODEL Software Appliance Managed Services .cloud 8
    • AvailabilityBeta Program • SEP 12.1 Currently in Public Beta • SPC 2.0 Currently in Private BetaGeneral Availability • Later this yearCustomer Upgrade • SPC 2.0 is free to all existing Symantec Customers • Upgrade for SEP 11 & Protection Suite customers to SEP 12 and SPC 2.0 9
    • Thank you!Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates inthe U.S. and other countries. Other names may be trademarks of their respective owners.This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 10
    • Disclaimer• Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and are subject to change. Any future release of the product or planned modifications to product capability, functionality, or feature are subject to ongoing evaluation by Symantec, and may or may not be implemented and should not be considered firm commitments by Symantec and should not be relied upon in making purchasing decisions.Presentation Identifier Goes Here 11