SlideShare a Scribd company logo
1 of 34
Download to read offline
Bezpečnost	
  není	
  jen	
  an.virus	
   1	
  
Bezpečnost	
  není	
  jen	
  an/virus	
  
Mar/n	
  Bobek	
  
Product	
  Manager,	
  Arrow	
  ECS	
  a.s.	
  
ENDPOINT	
  SUITE	
  –	
  TWO	
  VERSIONS	
  
Bezpečnost	
  není	
  jen	
  an.virus	
   2	
  
SymantecTM  Endpoint  Suite
SymantecTM  Endpoint  Suite    
with  Email
•  Symantec  Endpoint  Protec8on
•  Symantec  Endpoint  Encryp8on  
•  Symantec  Mobile  Device  Management
•  Symantec  Mobile  Threat  Protec8on

•  Symantec  Endpoint  Protec8on
•  Symantec  Endpoint  Encryp8on  
•  Symantec  Mobile  Device  Management
•  Symantec  Mobile  Threat  Protec8on
  
And  email  protec8on:  
•  Symantec  Messaging  Gateway
•  Symantec  Gateway  Email  Encryp8on
•  Symantec  Mail  Security  for  MicrosoB  
Exchange
ENDPOINT	
  SUITE	
  SIMPLIFIES	
  SECURITY	
  
Protect	
  the	
  users,	
  devices	
  and	
  data	
  for	
  less	
  money	
  
Bezpečnost	
  není	
  jen	
  an.virus	
   3	
  
•  Symantec  Messaging  
Gateway  defends  your  
email  and  infrastructure  at  
the  perimeter  with  real-­‐
8me  an8spam  and  
an8malware  protec8on.  
•  Symantec  Email  Encryp8on  
Gateway,  powered  by  PGP,  
encrypts  messages  to  
safeguard  the  confiden8al  
data.
•  Symantec  Mail  Security  for  
MicrosoB  Exchange  
prevents  the  spread  of  
email-­‐borne  threats.
•  Measurable  savings  from  
simplified  subscrip8on-­‐
based  pricing  and  take  the  
mystery  out  of  license,  
support,  and  renewal  costs.  
•  Remove  complexity  and  
consolidate  patchwork,  
mul8-­‐vendor,  solu8ons.  
•  Single  purchase,  single  
support  for  trouble-­‐
shoo8ng,  reduces  up-­‐front  
and  on-­‐going  costs.
•  Symantec  Endpoint  
Protec8on  provides  the  
security  with  a  single,  high-­‐
powered  agent,  for  the  
fastest,  most-­‐effec8ve  
protec8on  available.  
•  Symantec  Endpoint  
Encryp8on,  powered  by  
PGP,  protects  data  with  
strong  full-­‐disk  and  
removable  media  
encryp8on.  
•  Symantec  Mobile  threat  
protec8on  and  device  
management  provides  
trusted  security  for  mobile  
devices.
Prevent  data  loss  at
email  gateway/server,  and  
email  encryp8on
Single  solu8on  
  to  drive  down  costs  and  
stretch  IT  budgets
Complete    
malware  protec8on  for  
endpoints  and  mobile
Informa8on    
Protec8on
Lower  Cost  
  Solu8on
Threat    
Protec8on
ENDPOINT	
  SUITE`S	
  PRODUCTS	
  AND	
  BENEFITS	
  
Bezpečnost	
  není	
  jen	
  an.virus	
   4	
  
UNRIVALED	
  SECURITY	
  WITH	
  UNIQUE	
  VISIBILITY	
  
Symantec	
  has	
  unique	
  visibility	
  into	
  today`s	
  threat	
  landscape	
  
Bezpečnost	
  není	
  jen	
  an.virus	
   5	
  
175M    
endpoints
57M  aRack  sensors  in  
157  countries
182M  web  aRacks  
blocked  last  year
3.7T  
rows  of  telemetry
30%  of  world’s  enterprise  
email  traffic  scanned/day
9  
threat  response  centers
Bezpečnost	
  není	
  jen	
  an.virus	
   6	
  
ENDPOINT	
  PROTECTION	
  12.1	
  
Bezpečnost	
  není	
  jen	
  an.virus	
   7	
  
UNRIVALED  
SECURITY
BLAZING  
PERFORMANCE
SMARTER  
MANAGEMENT
Stops	
  targeted	
  a?acks	
  and	
  
advanced	
  persistent	
  
threats	
  with	
  intelligent	
  
security	
  and	
  layered	
  
protec.on	
  that	
  goes	
  
beyond	
  an.virus	
  	
  
Performance	
  so	
  fast	
  your	
  
users	
  won’t	
  even	
  know	
  its	
  
there	
  
A	
  single	
  management	
  
console	
  across	
  Windows,	
  
Mac,	
  Linux,	
  and	
  Virtual	
  
plaLorms	
  with	
  granular	
  
policy	
  control	
  	
  
UNRIVALED	
  SECURITY	
  WITH	
  LAYERED	
  PROTECTION	
  
Layered	
  protec/on	
  to	
  stop	
  targeted	
  a]acks	
  and	
  zero-­‐days	
  
Bezpečnost	
  není	
  jen	
  an.virus	
   8	
  
FIREWALL  AND  
INTRUSION  
PREVENTION
ANTIVIRUS	
  	
  
	
  

SONAR


Blocks	
  malware	
  
before	
  it	
  spreads	
  
to	
  your	
  machine	
  
and	
  controls	
  
traffic	
  
Scans	
  and	
  
eradicates	
  
malware	
  that	
  
arrives	
  on	
  a	
  
system	
  
Determines	
  safety	
  
of	
  files	
  and	
  
websites	
  using	
  the	
  
wisdom	
  of	
  the	
  
community	
  
Monitors	
  and	
  
blocks	
  files	
  	
  
that	
  exhibit	
  
suspicious	
  
behaviors	
  
Aggressive	
  
remedia.on	
  of	
  
hard-­‐to-­‐remove	
  
infec.ons	
  
NETWORK

FILE

REPUTATION

BEHAVIOR

REPAIR

 
POWER  
ERASER


INSIGHT
UNRIVALED	
  SECURITY	
  WITH	
  INSIGHT	
  
Age,	
  frequency	
  and	
  loca/on	
  are	
  used	
  to	
  expose	
  unknown	
  threats	
  
Bezpečnost	
  není	
  jen	
  an.virus	
   9	
  
Big  Data  Analy8cs
Analy8cs
Warehouse
Analysts
ARack  Quaran8ne  
System
Endpoints
Gateways
3rd  Party  
Affiliates
Global  Sensor
Network

Global  Data  Collec8on
Honeypots
Bad  safety  ra8ng
File  is  blocked
No  safety  ra8ng  yet
Can  be  blocked
Good  safety  ra8ng
File  is  whitelisted
BLAZING	
  PERFORMANCE	
  WITH	
  INSIGHT	
  
Up	
  to	
  70%	
  reduc/on	
  in	
  scan	
  overhead	
  
Bezpečnost	
  není	
  jen	
  an.virus	
   10	
  
Insight  allows  you  to  skip  known  good  
files  only  scanning  unknown  flies
Tradi8onal  scanning  has  to  scan  
every  file
ü ü ü ü ü
ü ü ü ü ü
ü ü ü ü ü
UNRIVALED	
  SECURITY	
  WITH	
  SONAR	
  
Behavioral	
  monitoring	
  stops	
  zero-­‐day	
  and	
  unknown	
  threats	
  
Bezpečnost	
  není	
  jen	
  an.virus	
   11	
  
Human-­‐authored  
Behavioral  Signatures

Behavioral  Policy  
Lockdown

Who  is  it  related  to?  
What  did  it  contain?  
Where  did  it  come  
from?  
What  has  it  done?  
Ar8ficial  Intelligence  
Based  Classifica8on  Engine
SMARTER	
  MANAGEMENT	
  WITH	
  POLICY	
  CONTROL	
  
Customize	
  polices	
  based	
  on	
  user	
  or	
  loca/on	
  
Bezpečnost	
  není	
  jen	
  an.virus	
   12	
  
HOST  INTEGRITY
Detect	
  unauthorized	
  
change,	
  conduct	
  damage	
  
assessment	
  and	
  ensures	
  
endpoints	
  are	
  protected	
  
and	
  compliant	
  	
  
EXTERNAL  MEDIA  
CONTROL
Restrict	
  and	
  enable	
  
access	
  to	
  the	
  hardware	
  
(USB,	
  DVD,	
  SD,	
  etc.)	
  that	
  
can	
  be	
  used	
  to	
  protect	
  
and	
  increase	
  produc.vity	
  
APPLICATION  CONTROL
Monitor	
  and	
  control	
  
applica.ons	
  behavior,	
  
including	
  automated	
  
system	
  lockdown,	
  and	
  
advanced	
  whitelis.ng	
  
and	
  blacklis.ng	
  
capabili.es	
  	
  
ENDPOINT	
  ENCRYPTION	
  
Protect	
  data	
  stored	
  on	
  endpoint	
  devices	
  
Bezpečnost	
  není	
  jen	
  an.virus	
   13	
  
•  Supports  USBs,  portable  hard  drives,  SD  cards,  and  CD/
DVD/Blu-­‐ray  media
•  Access  U8lity  Drive  –  tool  to  view  data  on  machines  
without  SEE  client  installed
Also  known  as  Full-­‐Disk  or  Whole  Disk  Encryp8on

•  Encryp8on  happens  in  the  background  
•  No  interac8on  required  by  end  user
•  Self-­‐Recovery  and  Help  Desk  recovery  capabili8es
•  Single  Sign-­‐On  capability
•  Smart  card  support  for  pre-­‐boot  authen8ca8on
•  FileVault  Management
•  Management  of  Opal  Self-­‐Encryp8ng  Drives*
•  BitLocker  management  coming  in  2H2015
LAPTOPS	
  AND	
  DESKTOPS	
  
REMOVABLE	
  MEDIA	
  ENCRYPTION	
  
MOBILE	
  DEVICE	
  MANAGEMENT	
  
Enable,	
  secure	
  and	
  manage	
  your	
  heterogeneous	
  mobile	
  environment	
  
Bezpečnost	
  není	
  jen	
  an.virus	
   14	
  
Ac8vate  enterprise  access  
easily  and  automa8cally

ENABLE	
   SECURE	
  
Enforce  device  policies  and  
compliance

MANAGE	
  
Visibility  and  repor8ng  with  
web-­‐based  management
THREAT	
  PROTECTION	
  
Bezpečnost	
  není	
  jen	
  an.virus	
   15	
  

Advanced,  proac8ve  protec8on  
against  risky  apps


APP	
  ADVISOR	
   ANTI-­‐MALWARE	
  
Protect  against  latest  threats  
with  Live-­‐Update

Compliance  rules  based  on  
device  security  posture

WEB	
  PROTECTION	
  

Detect  and  block  phishing  
websites
APP	
  ADVISOR	
  IDENTIFIES	
  RISKY	
  APPS	
  
Bezpečnost	
  není	
  jen	
  an.virus	
   16	
  
•  Apps  that  leak  informa8on
•  Apps  that  drain  baRery
•  Apps  that  consume  too  much  bandwidth
•  Proac8ve  protec8on  before  download  from  Google  Play
•  Enable  users  to  make  informed  decisions  about  apps
PROTECT	
  AGAINST	
  MALICIOUS	
  THREATS	
  
Bezpečnost	
  není	
  jen	
  an.virus	
   17	
  

ANTI-­‐MALWARE
•  Fast  and  effec8ve  on-­‐device  scans
•  Protect  against  latest  threats  with  Live-­‐Update  
integra8on
•  Implement  compliance  rules  based  on  device  
security  posture
WEB  PROTECTION
•  Detect  and  block  phishing  websites
•  Enable  safe  mobile  browsing
SPEAR-­‐PHISHING	
  EMAIL	
  CAMPAIGNS	
  
Bezpečnost	
  není	
  jen	
  an.virus	
   18	
  
SPEAR-­‐PHISHING	
  EMAIL	
  CAMPAIGNS	
  
Bezpečnost	
  není	
  jen	
  an.virus	
   19	
  
SPEAR-­‐PHISHING	
  ATTACKS	
  BY	
  SIZE	
  OF	
  TARGETED	
  
ORGANIZATION	
  
Bezpečnost	
  není	
  jen	
  an.virus	
   20	
  
ANALYSIS	
  OF	
  SPEAR-­‐PHISHING	
  EMAILS	
  USED	
  IN	
  
TARGETED	
  ATTACKS	
  
Bezpečnost	
  není	
  jen	
  an.virus	
   21	
  
EMAIL	
  SECURITY	
  IS	
  MORE	
  THAN	
  JUST	
  STOPPING	
  SPAM	
  
Bezpečnost	
  není	
  jen	
  an.virus	
   22	
  
Lower  the  expense  
and  
investment  in  
administra8on  and  
infrastructure.
REDUCE	
  COST	
  
Keep  
unwanted  email  
out  of  the  inbox  
without  blocking  
legi8mate    
messages.
PROTECT  USERS
Iden8fy  and  
control  the  spread  
of  confiden8al  
informa8on  and  
comply  with  
regula8ons.
CONTROL  DATA
Detect  and  block  
targeted  aRacks,  
malware,  and  
phishing  from  
entering  your  
environment.
PREVENT  THREATS
$
PROACTIVE	
  DEFENSE	
  IS	
  REQUIRED	
  
Bezpečnost	
  není	
  jen	
  an.virus	
   23	
  
•  Strongest  malware  preven8on
•  Protec8on  against  malicious  
URLs  and  aRachments
•  Domain  valida8on  to  block  
phishing
•  Data  control  and  protec8on
•  Intelligent  email  encryp8on
BASIC  EMAIL  SECURITY  STRATEGY
•  Integra8on  with  full  
Symantec  DLP  for  inspec8on,  
encryp8on,  and  control
•  Integra8on  with  Symantec  
Cynic™  sandbox  execu8on  
technology  for  email  
aRachments.
•  Targeted  aRack  repor8ng  and  
security  event  correla8on.  

ADVANCED  EMAIL  SECURITY  STRATEGY
MESSAGING	
  GATEWAY	
  
• 18	
  years	
  on	
  market	
  
• Acquired	
  by	
  Symantec	
  in	
  2004	
  
• Hardware/virtual	
  appliance	
  
• Linux	
  based	
  opera.ng	
  system	
  
• Two	
  subcomponents	
  
•  Scanner	
  (inbound/outbound	
  messages,	
  download	
  updates,	
  apply	
  ac.ons	
  
to	
  messages)	
  
•  Control	
  Center	
  (message	
  management,	
  sta.s.c,	
  hosted	
  spam	
  quaran.ne)	
  
• Targeted	
  a?ack	
  protec.on	
  
Bezpečnost	
  není	
  jen	
  an.virus	
   24	
  
CUSTOMIZABLE	
  PROTECTION	
  AGAINST	
  MALWARE,	
  
SPAM	
  AND	
  GREY	
  MAIL	
  
Bezpečnost	
  není	
  jen	
  an.virus	
   25	
  
Scans  for  newsleRers,  
marke8ng  email,  and  
suspicious  URLs

Configure  policies  by  
group  with  dis8nct  
ac8ons  for  each  type  of  
mail
PERSONALIZED	
  
PROTECTION	
  
Tracks  over  400  million  
known  spam  and  safe  
senders  IPs.

Filters  out  up  to  95%  of  
spam  traffic  based  on  
reputa8on.
ADAPTIVE	
  REPUATATION	
  
MANAGEMENT	
  
Disarm  aRachment  
cleaning

Over  20  detec8on  
technologies

Greater  than  99%  
an8spam  effec8veness
ANTISPAM	
  &	
  
ANTIMALWARE	
  
PROTECT	
  AGAINST	
  TARGETED	
  ATTACKS	
  OVER	
  EMAIL	
  
Bezpečnost	
  není	
  jen	
  an.virus	
   26	
  
Email	
  and	
  a?acks	
  using	
  malicious	
  document	
  a?achments	
  
–  Primarily	
  used	
  in	
  spear	
  phishing	
  emails	
  –	
  Advanced	
  Persistent	
  Threat	
  	
  (APT)	
  
–  Contain	
  malicious	
  ac.ve	
  content,	
  or	
  exploit	
  payloads	
  targe.ng	
  parser	
  
vulnerabili.es	
  
Exis.ng	
  solu.ons	
  only	
  scan	
  a?achments	
  of	
  certain	
  file	
  types	
  
–  They	
  target	
  only	
  spam	
  and	
  known	
  malicious	
  executables/documents	
  
–  Current	
  protec.on	
  is	
  inadequate	
  
Disarm	
  will	
  reconstruct	
  the	
  a]achment	
  documents,	
  without	
  the	
  
malicious	
  content,	
  before	
  delivering	
  to	
  the	
  user.	
  
DISARM	
  REMOVES	
  ALL	
  VULNERABLE	
  CONTENT,	
  NOT	
  
JUST	
  KNOWN	
  THREATS	
  
Bezpečnost	
  není	
  jen	
  an.virus	
   27	
  
Vulnerable	
  Content	
   PDF	
   Office	
  2003	
   Office	
  2007+	
  
Javascript	
   !"
Launch	
   !"
Macros	
   !" !"
Flash	
   !" !" !"
3d	
   !"
A]achments	
   !" !" !"
Unused	
  Objects	
   !" !"
Custom	
  Fonts	
   !"
Image	
  Reconstruct	
   !"
Ac/ve	
  X	
   !" !"
Unknown	
   !" !" !"
Embedded	
  Doc	
   !" !" !"
DISARM	
  PROTECTS	
  AGAINST	
  THE	
  MOST	
  COMMONLY	
  
EXPLOITED	
  FILE	
  TYPES	
  
Bezpečnost	
  není	
  jen	
  an.virus	
   28	
  
	
  
•  Remove  JavaScripts  and  “launch”  ac8on
•  Remove/replace  embedded  objects/files,  e.g.  Flash
•  Sani8ze  XML  Forms  Architecture  (XFA)  objects
•  Remove  macros
•  Remove/replace  embedded  objects,  e.g.  Flash
•  Reconstruct  supported  embedded  objects,  e.g.  PDF,  images,  …
•  Remove  macros
•  Remove/replace  embedded  Flash,  EXEs
•  Reconstruct  supported  objects,  e.g.  PDF,  OLE  inside  OLE,  …
2007/
CONTROL	
  OUTBOUND	
  EMAIL	
  TO	
  PREVENT	
  DATA	
  LOSS	
  
Bezpečnost	
  není	
  jen	
  an.virus	
   29	
  
Use  on-­‐premise  Gateway  
Email  Encryp8on  or  
cloud-­‐based  encryp8on

Policy  based  for  
automa8c  encryp8on
ADD-ON CONTENT
ENCRYPTION
Protect  confiden8al  data  
across  Endpoint,  
Network  and  Storage  
Systems

Tight  integra8on  and  
unified  management
INTEGRATE WITH
SYMANTEC DLP
Over  100  pre-­‐built  
dic8onaries,  paRerns,  
and  policy  templates

Workflow  and  
remedia8on  tools  

Dedicated  DLP  
quaran8ne
BUILT-­‐IN	
  DATA	
  LOSS	
  
PREVENTION	
  
CHOICE	
  IN	
  EMAIL	
  ENCRYPTION	
  *ADD	
  ON	
  OPTIONS	
  
Bezpečnost	
  není	
  jen	
  an.virus	
   30	
  
Unencrypted  Communica8ons
                    TLS
users
admin
Email    
server
Messaging    
Gateway
Policy  
Configura8on
Encrypted  
Email
Encrypted  
response
Unencrypted  recipient
Encrypted  recipient
Symantec    
Content  Encryp8on
On-­‐premise  op8on
Unencrypted  communica8ons
users
admin
Email    
server
Messaging    
Gateway
 Unencrypted  recipient
Encrypted  recipient
Symantec  
Gateway    
Encryp8on
                    Encrypted  communica8ons
SIMPLE	
  MANAGEMENT	
  WITH	
  POWERFUL	
  CAPABILITIES	
  
Bezpečnost	
  není	
  jen	
  an.virus	
   31	
  
•  Iden8fy  email  security  trends  using  over  50  pre-­‐built  reports
•  Quickly  iden8fy  top  Spam  sender,  reputa8on  effec8veness,  and  trending  
analysis  to  determine  ROI.
•  Customizable  reports  can  be  scheduled  to  run  as  needed.
On	
  Demand	
  
Repor.ng	
  
•  Con8nuous  automa8c  Spam  and  Malware  updates  ensure  protec8on  
stays  up  to  date.
•  In-­‐product  soBware  download  and  update  process  streamlines  product  
upgrades.
Streamlined	
  
Update	
  
Process	
  
•  Single  web  based  console  allows  management  of  mul8ple  scanners.
•  Customizable  dashboard  quickly  highlights  problem  areas  in  the  email  
environment.
•  Custom  group  policies  through  exis8ng  LDAP  groups,  individual  users,  or  
domains
Unified	
  
Management	
  
and	
  
Administra.on	
  
REDUCE	
  COSTS	
  WITH	
  THE	
  POWER	
  OF	
  VIRTUAL	
  
APPLIANCE	
  
Bezpečnost	
  není	
  jen	
  an.virus	
   32	
  
•  Dynamic	
  Resource	
  Alloca.on	
  
–  Easily	
  accommodate	
  infrastructure	
  growth	
  requirements	
  
–  Quickly	
  respond	
  to	
  changes	
  in	
  traffic	
  volume	
  
•  Cost	
  Savings	
  
–  Be?er	
  hardware	
  u.liza.on	
  
–  Lower	
  power	
  consump.on	
  (“green”	
  IT)	
  
•  Easy	
  Backup	
  &	
  Disaster	
  Recovery	
  
–  Cost-­‐effec.ve	
  high-­‐availability	
  
–  Easily	
  restore	
  in	
  the	
  event	
  of	
  disaster	
  recovery	
  
•  Zero-­‐Down.me	
  Maintenance	
  
–  Decouple	
  physical	
  server	
  maintenance	
  from	
  sokware	
  
–  Test	
  new	
  sokware	
  versions	
  before	
  deploying	
  
•  Flexible	
  Deployment	
  
–  VMWare	
  ESXi	
  &	
  vSphere	
  
–  Microsok	
  Hyper-­‐V	
  
–  Same	
  sokware	
  license	
  for	
  virtual	
  or	
  appliance	
  
Hypervisor
Bezpečnost	
  není	
  jen	
  an.virus	
   33	
  
MAIL	
  SECURITY	
  FOR	
  MICROSOFT	
  EXCHANGE	
  
• An.virus	
  /	
  An.virus	
  &	
  an.spam	
  
• Superior	
  Protec.on	
  
•  An.malware	
  technology	
  
•  Ability	
  to	
  scan	
  messages	
  in	
  transit	
  or	
  on	
  the	
  mailbox	
  
•  Powered	
  by	
  Premium	
  An.Spam	
  
•  Rapid	
  release	
  defini.ons	
  
•  Advanced	
  content	
  filtering	
  
• Flexible	
  and	
  Easy	
  to	
  Use	
  Management	
  
• Op.mized	
  for	
  Exchange	
  
Thank	
  you!	
  
Copyright	
  ©	
  2011	
  Symantec	
  Corpora/on.	
  All	
  rights	
  reserved.	
  Symantec	
  and	
  the	
  Symantec	
  Logo	
  are	
  trademarks	
  or	
  registered	
  trademarks	
  of	
  Symantec	
  Corpora.on	
  or	
  its	
  affiliates	
  in	
  
the	
  U.S.	
  and	
  other	
  countries.	
  	
  Other	
  names	
  may	
  be	
  trademarks	
  of	
  their	
  respec.ve	
  owners.	
  
	
  
This	
  document	
  is	
  provided	
  for	
  informa.onal	
  purposes	
  only	
  and	
  is	
  not	
  intended	
  as	
  adver.sing.	
  	
  All	
  warran.es	
  rela.ng	
  to	
  the	
  informa.on	
  in	
  this	
  document,	
  either	
  express	
  or	
  implied,	
  
are	
  disclaimed	
  to	
  the	
  maximum	
  extent	
  allowed	
  by	
  law.	
  	
  The	
  informa.on	
  in	
  this	
  document	
  is	
  subject	
  to	
  change	
  without	
  no.ce.	
  
34	
  
Děkuji!	
  
Mar.n	
  Bobek	
  
mar.n.bobek@arrow.com	
  
+420	
  607	
  275	
  843	
  
Bezpečnost	
  není	
  jen	
  an.virus	
  

More Related Content

What's hot

Cisco amp for endpoints
Cisco amp for endpointsCisco amp for endpoints
Cisco amp for endpointsCisco Canada
 
Cisco amp everywhere
Cisco amp everywhereCisco amp everywhere
Cisco amp everywhereCisco Canada
 
Addressing the cyber kill chain
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chainSymantec Brasil
 
Cisco amp for networks
Cisco amp for networksCisco amp for networks
Cisco amp for networksCisco Canada
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint SecurityBurak DAYIOGLU
 
Six Steps to SIEM Success
Six Steps to SIEM SuccessSix Steps to SIEM Success
Six Steps to SIEM SuccessAlienVault
 
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...James Anderson
 
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Planning your 2015 Threat Detection Strategy with a Broken Crystal BallPlanning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Planning your 2015 Threat Detection Strategy with a Broken Crystal BallAlienVault
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT securitySophos Benelux
 
Cyber Kill Chain vs. Cyber Criminals
Cyber Kill Chain vs. Cyber CriminalsCyber Kill Chain vs. Cyber Criminals
Cyber Kill Chain vs. Cyber CriminalsDavid Sweigert
 
The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14Aventis Systems, Inc.
 
The World Against the Bad, Cisco AMP Solution to the Rescue
The World Against the Bad, Cisco AMP Solution to the RescueThe World Against the Bad, Cisco AMP Solution to the Rescue
The World Against the Bad, Cisco AMP Solution to the RescueCisco Canada
 
Advanced Threat Defense Intel Security
Advanced Threat Defense  Intel SecurityAdvanced Threat Defense  Intel Security
Advanced Threat Defense Intel Securityxband
 
Endpoint Security Evasion
Endpoint Security EvasionEndpoint Security Evasion
Endpoint Security EvasionInvincea, Inc.
 
Next Dimension and Veeam | Solutions for PIPEDA Compliance
Next Dimension and Veeam | Solutions for PIPEDA ComplianceNext Dimension and Veeam | Solutions for PIPEDA Compliance
Next Dimension and Veeam | Solutions for PIPEDA ComplianceNext Dimension Inc.
 
Alienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworksAlienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworksAlienVault
 
What's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecurityWhat's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecuritySophos Benelux
 

What's hot (20)

Cisco amp for endpoints
Cisco amp for endpointsCisco amp for endpoints
Cisco amp for endpoints
 
FireEye Engineering
FireEye Engineering FireEye Engineering
FireEye Engineering
 
Cisco amp everywhere
Cisco amp everywhereCisco amp everywhere
Cisco amp everywhere
 
Advanced Threat Protection
Advanced Threat ProtectionAdvanced Threat Protection
Advanced Threat Protection
 
Addressing the cyber kill chain
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chain
 
Cisco NGFW AMP
Cisco NGFW AMPCisco NGFW AMP
Cisco NGFW AMP
 
Cisco amp for networks
Cisco amp for networksCisco amp for networks
Cisco amp for networks
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
Six Steps to SIEM Success
Six Steps to SIEM SuccessSix Steps to SIEM Success
Six Steps to SIEM Success
 
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
 
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Planning your 2015 Threat Detection Strategy with a Broken Crystal BallPlanning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
 
Cyber Kill Chain vs. Cyber Criminals
Cyber Kill Chain vs. Cyber CriminalsCyber Kill Chain vs. Cyber Criminals
Cyber Kill Chain vs. Cyber Criminals
 
The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14
 
The World Against the Bad, Cisco AMP Solution to the Rescue
The World Against the Bad, Cisco AMP Solution to the RescueThe World Against the Bad, Cisco AMP Solution to the Rescue
The World Against the Bad, Cisco AMP Solution to the Rescue
 
Advanced Threat Defense Intel Security
Advanced Threat Defense  Intel SecurityAdvanced Threat Defense  Intel Security
Advanced Threat Defense Intel Security
 
Endpoint Security Evasion
Endpoint Security EvasionEndpoint Security Evasion
Endpoint Security Evasion
 
Next Dimension and Veeam | Solutions for PIPEDA Compliance
Next Dimension and Veeam | Solutions for PIPEDA ComplianceNext Dimension and Veeam | Solutions for PIPEDA Compliance
Next Dimension and Veeam | Solutions for PIPEDA Compliance
 
Alienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworksAlienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworks
 
What's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecurityWhat's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized Security
 

Viewers also liked

Bezpecnost prace prezentace
Bezpecnost prace prezentaceBezpecnost prace prezentace
Bezpecnost prace prezentacePresenter2014
 
Bozp školenie zamestnancov nove
Bozp   školenie zamestnancov noveBozp   školenie zamestnancov nove
Bozp školenie zamestnancov noveJuraj Ďurišin
 
Bezpečnosť a ochrana zdravia pri práci
Bezpečnosť a ochrana zdravia pri práci Bezpečnosť a ochrana zdravia pri práci
Bezpečnosť a ochrana zdravia pri práci Alena Vorlíčková
 
BOZP - Pracovná zdravotná služba 2015 Slovak
BOZP - Pracovná zdravotná služba 2015 SlovakBOZP - Pracovná zdravotná služba 2015 Slovak
BOZP - Pracovná zdravotná služba 2015 SlovakDasa Strakova
 
Utsav Mahendra : 3 G Smartphone -Idea
Utsav Mahendra : 3 G  Smartphone -IdeaUtsav Mahendra : 3 G  Smartphone -Idea
Utsav Mahendra : 3 G Smartphone -IdeaUtsav Mahendra
 
Help Me Help You with Social Media: Learn how to drive before turning over th...
Help Me Help You with Social Media: Learn how to drive before turning over th...Help Me Help You with Social Media: Learn how to drive before turning over th...
Help Me Help You with Social Media: Learn how to drive before turning over th...Rachel Reuben
 
Ayudas municipales EMPRÉN 2012
Ayudas municipales EMPRÉN 2012Ayudas municipales EMPRÉN 2012
Ayudas municipales EMPRÉN 2012Idea Alzira
 
Día Europeo del Enoturismo
Día Europeo del EnoturismoDía Europeo del Enoturismo
Día Europeo del Enoturismolavozdelsur.es
 
#Aprender3c - Creando respuestas: Papel del bibliotecólogo en Wikipedia
#Aprender3c - Creando respuestas: Papel del bibliotecólogo en Wikipedia#Aprender3c - Creando respuestas: Papel del bibliotecólogo en Wikipedia
#Aprender3c - Creando respuestas: Papel del bibliotecólogo en WikipediaAprender 3C
 
Poemes: verema,vinya i vi
Poemes: verema,vinya i viPoemes: verema,vinya i vi
Poemes: verema,vinya i viNeus Cortiella
 
Electrocardiograma
ElectrocardiogramaElectrocardiograma
Electrocardiogramaelgrupo13
 

Viewers also liked (14)

Adopci n pot_preliminar(1)
Adopci n pot_preliminar(1)Adopci n pot_preliminar(1)
Adopci n pot_preliminar(1)
 
Bezpecnost prace prezentace
Bezpecnost prace prezentaceBezpecnost prace prezentace
Bezpecnost prace prezentace
 
Bozp
BozpBozp
Bozp
 
Bozp školenie zamestnancov nove
Bozp   školenie zamestnancov noveBozp   školenie zamestnancov nove
Bozp školenie zamestnancov nove
 
Bezpečnosť a ochrana zdravia pri práci
Bezpečnosť a ochrana zdravia pri práci Bezpečnosť a ochrana zdravia pri práci
Bezpečnosť a ochrana zdravia pri práci
 
BOZP - Pracovná zdravotná služba 2015 Slovak
BOZP - Pracovná zdravotná služba 2015 SlovakBOZP - Pracovná zdravotná služba 2015 Slovak
BOZP - Pracovná zdravotná služba 2015 Slovak
 
Utsav Mahendra : 3 G Smartphone -Idea
Utsav Mahendra : 3 G  Smartphone -IdeaUtsav Mahendra : 3 G  Smartphone -Idea
Utsav Mahendra : 3 G Smartphone -Idea
 
Help Me Help You with Social Media: Learn how to drive before turning over th...
Help Me Help You with Social Media: Learn how to drive before turning over th...Help Me Help You with Social Media: Learn how to drive before turning over th...
Help Me Help You with Social Media: Learn how to drive before turning over th...
 
Ayudas municipales EMPRÉN 2012
Ayudas municipales EMPRÉN 2012Ayudas municipales EMPRÉN 2012
Ayudas municipales EMPRÉN 2012
 
Día Europeo del Enoturismo
Día Europeo del EnoturismoDía Europeo del Enoturismo
Día Europeo del Enoturismo
 
#Aprender3c - Creando respuestas: Papel del bibliotecólogo en Wikipedia
#Aprender3c - Creando respuestas: Papel del bibliotecólogo en Wikipedia#Aprender3c - Creando respuestas: Papel del bibliotecólogo en Wikipedia
#Aprender3c - Creando respuestas: Papel del bibliotecólogo en Wikipedia
 
Poemes: verema,vinya i vi
Poemes: verema,vinya i viPoemes: verema,vinya i vi
Poemes: verema,vinya i vi
 
Electrocardiograma
ElectrocardiogramaElectrocardiograma
Electrocardiograma
 
module in grade 8 health
module in grade 8 healthmodule in grade 8 health
module in grade 8 health
 

Similar to Symantec Endpoint Suite Simplifies IT Security

OSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint SecurityOSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint SecurityIvanti
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionDsunte Wilson
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfMdZabedHossain2
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 Cyd Isaak Francisco
 
Steve Porter : cloud Computing Security
Steve Porter : cloud Computing SecuritySteve Porter : cloud Computing Security
Steve Porter : cloud Computing SecurityGurbir Singh
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
 
B sep ds-21194634.en-us
B sep ds-21194634.en-usB sep ds-21194634.en-us
B sep ds-21194634.en-usPelos TCHIKAYA
 
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionBlue Coat
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?MenloSecurity
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Iftikhar Ali Iqbal
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleDavid Fuchs
 
Eset India General Presentation
Eset India General PresentationEset India General Presentation
Eset India General PresentationKsenia Kondratieva
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010Joseph Mark Heinzen
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky
 

Similar to Symantec Endpoint Suite Simplifies IT Security (20)

Symantec Endpoint Suite
Symantec Endpoint SuiteSymantec Endpoint Suite
Symantec Endpoint Suite
 
MID_SIEM_Boubker_EN
MID_SIEM_Boubker_ENMID_SIEM_Boubker_EN
MID_SIEM_Boubker_EN
 
OSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint SecurityOSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint Security
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
 
Steve Porter : cloud Computing Security
Steve Porter : cloud Computing SecuritySteve Porter : cloud Computing Security
Steve Porter : cloud Computing Security
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
B sep ds-21194634.en-us
B sep ds-21194634.en-usB sep ds-21194634.en-us
B sep ds-21194634.en-us
 
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat Protection
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
Eset India General Presentation
Eset India General PresentationEset India General Presentation
Eset India General Presentation
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015
 

More from MarketingArrowECS_CZ

INFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdfINFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdfMarketingArrowECS_CZ
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!MarketingArrowECS_CZ
 
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?MarketingArrowECS_CZ
 
Oracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management PlatformaOracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management PlatformaMarketingArrowECS_CZ
 
Nové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database ApplianceNové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database ApplianceMarketingArrowECS_CZ
 
Novinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databázeNovinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databázeMarketingArrowECS_CZ
 
Základy licencování Oracle software
Základy licencování Oracle softwareZáklady licencování Oracle software
Základy licencování Oracle softwareMarketingArrowECS_CZ
 
Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?MarketingArrowECS_CZ
 
Využijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplnoVyužijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplnoMarketingArrowECS_CZ
 
Oracle Data Protection - 2. část
Oracle Data Protection - 2. částOracle Data Protection - 2. část
Oracle Data Protection - 2. částMarketingArrowECS_CZ
 
Oracle Data Protection - 1. část
Oracle Data Protection - 1. částOracle Data Protection - 1. část
Oracle Data Protection - 1. částMarketingArrowECS_CZ
 
Benefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): StorageBenefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): StorageMarketingArrowECS_CZ
 
Benefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): ComputeBenefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): ComputeMarketingArrowECS_CZ
 
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. částExadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. částMarketingArrowECS_CZ
 
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. částExadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. částMarketingArrowECS_CZ
 
Úvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastrukturyÚvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastrukturyMarketingArrowECS_CZ
 

More from MarketingArrowECS_CZ (20)

INFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdfINFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdf
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
 
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
 
Chráníte správně svoje data?
Chráníte správně svoje data?Chráníte správně svoje data?
Chráníte správně svoje data?
 
Oracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management PlatformaOracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management Platforma
 
Nové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database ApplianceNové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database Appliance
 
Infinidat InfiniGuard
Infinidat InfiniGuardInfinidat InfiniGuard
Infinidat InfiniGuard
 
Infinidat InfiniBox
Infinidat InfiniBoxInfinidat InfiniBox
Infinidat InfiniBox
 
Novinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databázeNovinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databáze
 
Základy licencování Oracle software
Základy licencování Oracle softwareZáklady licencování Oracle software
Základy licencování Oracle software
 
Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?
 
Využijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplnoVyužijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplno
 
Oracle Data Protection - 2. část
Oracle Data Protection - 2. částOracle Data Protection - 2. část
Oracle Data Protection - 2. část
 
Oracle Data Protection - 1. část
Oracle Data Protection - 1. částOracle Data Protection - 1. část
Oracle Data Protection - 1. část
 
Benefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): StorageBenefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): Storage
 
Benefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): ComputeBenefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): Compute
 
InfiniBox z pohledu zákazníka
InfiniBox z pohledu zákazníkaInfiniBox z pohledu zákazníka
InfiniBox z pohledu zákazníka
 
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. částExadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
 
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. částExadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
 
Úvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastrukturyÚvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastruktury
 

Recently uploaded

Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Recently uploaded (20)

Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

Symantec Endpoint Suite Simplifies IT Security

  • 1. Bezpečnost  není  jen  an.virus   1   Bezpečnost  není  jen  an/virus   Mar/n  Bobek   Product  Manager,  Arrow  ECS  a.s.  
  • 2. ENDPOINT  SUITE  –  TWO  VERSIONS   Bezpečnost  není  jen  an.virus   2   SymantecTM  Endpoint  Suite SymantecTM  Endpoint  Suite     with  Email •  Symantec  Endpoint  Protec8on •  Symantec  Endpoint  Encryp8on   •  Symantec  Mobile  Device  Management •  Symantec  Mobile  Threat  Protec8on •  Symantec  Endpoint  Protec8on •  Symantec  Endpoint  Encryp8on   •  Symantec  Mobile  Device  Management •  Symantec  Mobile  Threat  Protec8on   And  email  protec8on:   •  Symantec  Messaging  Gateway •  Symantec  Gateway  Email  Encryp8on •  Symantec  Mail  Security  for  MicrosoB   Exchange
  • 3. ENDPOINT  SUITE  SIMPLIFIES  SECURITY   Protect  the  users,  devices  and  data  for  less  money   Bezpečnost  není  jen  an.virus   3   •  Symantec  Messaging   Gateway  defends  your   email  and  infrastructure  at   the  perimeter  with  real-­‐ 8me  an8spam  and   an8malware  protec8on.   •  Symantec  Email  Encryp8on   Gateway,  powered  by  PGP,   encrypts  messages  to   safeguard  the  confiden8al   data. •  Symantec  Mail  Security  for   MicrosoB  Exchange   prevents  the  spread  of   email-­‐borne  threats. •  Measurable  savings  from   simplified  subscrip8on-­‐ based  pricing  and  take  the   mystery  out  of  license,   support,  and  renewal  costs.   •  Remove  complexity  and   consolidate  patchwork,   mul8-­‐vendor,  solu8ons.   •  Single  purchase,  single   support  for  trouble-­‐ shoo8ng,  reduces  up-­‐front   and  on-­‐going  costs. •  Symantec  Endpoint   Protec8on  provides  the   security  with  a  single,  high-­‐ powered  agent,  for  the   fastest,  most-­‐effec8ve   protec8on  available.   •  Symantec  Endpoint   Encryp8on,  powered  by   PGP,  protects  data  with   strong  full-­‐disk  and   removable  media   encryp8on.   •  Symantec  Mobile  threat   protec8on  and  device   management  provides   trusted  security  for  mobile   devices. Prevent  data  loss  at email  gateway/server,  and   email  encryp8on Single  solu8on    to  drive  down  costs  and   stretch  IT  budgets Complete     malware  protec8on  for   endpoints  and  mobile Informa8on     Protec8on Lower  Cost    Solu8on Threat     Protec8on
  • 4. ENDPOINT  SUITE`S  PRODUCTS  AND  BENEFITS   Bezpečnost  není  jen  an.virus   4  
  • 5. UNRIVALED  SECURITY  WITH  UNIQUE  VISIBILITY   Symantec  has  unique  visibility  into  today`s  threat  landscape   Bezpečnost  není  jen  an.virus   5   175M     endpoints 57M  aRack  sensors  in   157  countries 182M  web  aRacks   blocked  last  year 3.7T   rows  of  telemetry 30%  of  world’s  enterprise   email  traffic  scanned/day 9   threat  response  centers
  • 6. Bezpečnost  není  jen  an.virus   6  
  • 7. ENDPOINT  PROTECTION  12.1   Bezpečnost  není  jen  an.virus   7   UNRIVALED   SECURITY BLAZING   PERFORMANCE SMARTER   MANAGEMENT Stops  targeted  a?acks  and   advanced  persistent   threats  with  intelligent   security  and  layered   protec.on  that  goes   beyond  an.virus     Performance  so  fast  your   users  won’t  even  know  its   there   A  single  management   console  across  Windows,   Mac,  Linux,  and  Virtual   plaLorms  with  granular   policy  control    
  • 8. UNRIVALED  SECURITY  WITH  LAYERED  PROTECTION   Layered  protec/on  to  stop  targeted  a]acks  and  zero-­‐days   Bezpečnost  není  jen  an.virus   8   FIREWALL  AND   INTRUSION   PREVENTION ANTIVIRUS       SONAR Blocks  malware   before  it  spreads   to  your  machine   and  controls   traffic   Scans  and   eradicates   malware  that   arrives  on  a   system   Determines  safety   of  files  and   websites  using  the   wisdom  of  the   community   Monitors  and   blocks  files     that  exhibit   suspicious   behaviors   Aggressive   remedia.on  of   hard-­‐to-­‐remove   infec.ons   NETWORK FILE REPUTATION BEHAVIOR REPAIR POWER   ERASER INSIGHT
  • 9. UNRIVALED  SECURITY  WITH  INSIGHT   Age,  frequency  and  loca/on  are  used  to  expose  unknown  threats   Bezpečnost  není  jen  an.virus   9   Big  Data  Analy8cs Analy8cs Warehouse Analysts ARack  Quaran8ne   System Endpoints Gateways 3rd  Party   Affiliates Global  Sensor Network Global  Data  Collec8on Honeypots Bad  safety  ra8ng File  is  blocked No  safety  ra8ng  yet Can  be  blocked Good  safety  ra8ng File  is  whitelisted
  • 10. BLAZING  PERFORMANCE  WITH  INSIGHT   Up  to  70%  reduc/on  in  scan  overhead   Bezpečnost  není  jen  an.virus   10   Insight  allows  you  to  skip  known  good   files  only  scanning  unknown  flies Tradi8onal  scanning  has  to  scan   every  file ü ü ü ü ü ü ü ü ü ü ü ü ü ü ü
  • 11. UNRIVALED  SECURITY  WITH  SONAR   Behavioral  monitoring  stops  zero-­‐day  and  unknown  threats   Bezpečnost  není  jen  an.virus   11   Human-­‐authored   Behavioral  Signatures Behavioral  Policy   Lockdown Who  is  it  related  to?   What  did  it  contain?   Where  did  it  come   from?   What  has  it  done?   Ar8ficial  Intelligence   Based  Classifica8on  Engine
  • 12. SMARTER  MANAGEMENT  WITH  POLICY  CONTROL   Customize  polices  based  on  user  or  loca/on   Bezpečnost  není  jen  an.virus   12   HOST  INTEGRITY Detect  unauthorized   change,  conduct  damage   assessment  and  ensures   endpoints  are  protected   and  compliant     EXTERNAL  MEDIA   CONTROL Restrict  and  enable   access  to  the  hardware   (USB,  DVD,  SD,  etc.)  that   can  be  used  to  protect   and  increase  produc.vity   APPLICATION  CONTROL Monitor  and  control   applica.ons  behavior,   including  automated   system  lockdown,  and   advanced  whitelis.ng   and  blacklis.ng   capabili.es    
  • 13. ENDPOINT  ENCRYPTION   Protect  data  stored  on  endpoint  devices   Bezpečnost  není  jen  an.virus   13   •  Supports  USBs,  portable  hard  drives,  SD  cards,  and  CD/ DVD/Blu-­‐ray  media •  Access  U8lity  Drive  –  tool  to  view  data  on  machines   without  SEE  client  installed Also  known  as  Full-­‐Disk  or  Whole  Disk  Encryp8on •  Encryp8on  happens  in  the  background   •  No  interac8on  required  by  end  user •  Self-­‐Recovery  and  Help  Desk  recovery  capabili8es •  Single  Sign-­‐On  capability •  Smart  card  support  for  pre-­‐boot  authen8ca8on •  FileVault  Management •  Management  of  Opal  Self-­‐Encryp8ng  Drives* •  BitLocker  management  coming  in  2H2015 LAPTOPS  AND  DESKTOPS   REMOVABLE  MEDIA  ENCRYPTION  
  • 14. MOBILE  DEVICE  MANAGEMENT   Enable,  secure  and  manage  your  heterogeneous  mobile  environment   Bezpečnost  není  jen  an.virus   14   Ac8vate  enterprise  access   easily  and  automa8cally ENABLE   SECURE   Enforce  device  policies  and   compliance MANAGE   Visibility  and  repor8ng  with   web-­‐based  management
  • 15. THREAT  PROTECTION   Bezpečnost  není  jen  an.virus   15   Advanced,  proac8ve  protec8on   against  risky  apps APP  ADVISOR   ANTI-­‐MALWARE   Protect  against  latest  threats   with  Live-­‐Update Compliance  rules  based  on   device  security  posture WEB  PROTECTION   Detect  and  block  phishing   websites
  • 16. APP  ADVISOR  IDENTIFIES  RISKY  APPS   Bezpečnost  není  jen  an.virus   16   •  Apps  that  leak  informa8on •  Apps  that  drain  baRery •  Apps  that  consume  too  much  bandwidth •  Proac8ve  protec8on  before  download  from  Google  Play •  Enable  users  to  make  informed  decisions  about  apps
  • 17. PROTECT  AGAINST  MALICIOUS  THREATS   Bezpečnost  není  jen  an.virus   17   ANTI-­‐MALWARE •  Fast  and  effec8ve  on-­‐device  scans •  Protect  against  latest  threats  with  Live-­‐Update   integra8on •  Implement  compliance  rules  based  on  device   security  posture WEB  PROTECTION •  Detect  and  block  phishing  websites •  Enable  safe  mobile  browsing
  • 18. SPEAR-­‐PHISHING  EMAIL  CAMPAIGNS   Bezpečnost  není  jen  an.virus   18  
  • 19. SPEAR-­‐PHISHING  EMAIL  CAMPAIGNS   Bezpečnost  není  jen  an.virus   19  
  • 20. SPEAR-­‐PHISHING  ATTACKS  BY  SIZE  OF  TARGETED   ORGANIZATION   Bezpečnost  není  jen  an.virus   20  
  • 21. ANALYSIS  OF  SPEAR-­‐PHISHING  EMAILS  USED  IN   TARGETED  ATTACKS   Bezpečnost  není  jen  an.virus   21  
  • 22. EMAIL  SECURITY  IS  MORE  THAN  JUST  STOPPING  SPAM   Bezpečnost  není  jen  an.virus   22   Lower  the  expense   and   investment  in   administra8on  and   infrastructure. REDUCE  COST   Keep   unwanted  email   out  of  the  inbox   without  blocking   legi8mate     messages. PROTECT  USERS Iden8fy  and   control  the  spread   of  confiden8al   informa8on  and   comply  with   regula8ons. CONTROL  DATA Detect  and  block   targeted  aRacks,   malware,  and   phishing  from   entering  your   environment. PREVENT  THREATS $
  • 23. PROACTIVE  DEFENSE  IS  REQUIRED   Bezpečnost  není  jen  an.virus   23   •  Strongest  malware  preven8on •  Protec8on  against  malicious   URLs  and  aRachments •  Domain  valida8on  to  block   phishing •  Data  control  and  protec8on •  Intelligent  email  encryp8on BASIC  EMAIL  SECURITY  STRATEGY •  Integra8on  with  full   Symantec  DLP  for  inspec8on,   encryp8on,  and  control •  Integra8on  with  Symantec   Cynic™  sandbox  execu8on   technology  for  email   aRachments. •  Targeted  aRack  repor8ng  and   security  event  correla8on.   ADVANCED  EMAIL  SECURITY  STRATEGY
  • 24. MESSAGING  GATEWAY   • 18  years  on  market   • Acquired  by  Symantec  in  2004   • Hardware/virtual  appliance   • Linux  based  opera.ng  system   • Two  subcomponents   •  Scanner  (inbound/outbound  messages,  download  updates,  apply  ac.ons   to  messages)   •  Control  Center  (message  management,  sta.s.c,  hosted  spam  quaran.ne)   • Targeted  a?ack  protec.on   Bezpečnost  není  jen  an.virus   24  
  • 25. CUSTOMIZABLE  PROTECTION  AGAINST  MALWARE,   SPAM  AND  GREY  MAIL   Bezpečnost  není  jen  an.virus   25   Scans  for  newsleRers,   marke8ng  email,  and   suspicious  URLs Configure  policies  by   group  with  dis8nct   ac8ons  for  each  type  of   mail PERSONALIZED   PROTECTION   Tracks  over  400  million   known  spam  and  safe   senders  IPs. Filters  out  up  to  95%  of   spam  traffic  based  on   reputa8on. ADAPTIVE  REPUATATION   MANAGEMENT   Disarm  aRachment   cleaning Over  20  detec8on   technologies Greater  than  99%   an8spam  effec8veness ANTISPAM  &   ANTIMALWARE  
  • 26. PROTECT  AGAINST  TARGETED  ATTACKS  OVER  EMAIL   Bezpečnost  není  jen  an.virus   26   Email  and  a?acks  using  malicious  document  a?achments   –  Primarily  used  in  spear  phishing  emails  –  Advanced  Persistent  Threat    (APT)   –  Contain  malicious  ac.ve  content,  or  exploit  payloads  targe.ng  parser   vulnerabili.es   Exis.ng  solu.ons  only  scan  a?achments  of  certain  file  types   –  They  target  only  spam  and  known  malicious  executables/documents   –  Current  protec.on  is  inadequate   Disarm  will  reconstruct  the  a]achment  documents,  without  the   malicious  content,  before  delivering  to  the  user.  
  • 27. DISARM  REMOVES  ALL  VULNERABLE  CONTENT,  NOT   JUST  KNOWN  THREATS   Bezpečnost  není  jen  an.virus   27   Vulnerable  Content   PDF   Office  2003   Office  2007+   Javascript   !" Launch   !" Macros   !" !" Flash   !" !" !" 3d   !" A]achments   !" !" !" Unused  Objects   !" !" Custom  Fonts   !" Image  Reconstruct   !" Ac/ve  X   !" !" Unknown   !" !" !" Embedded  Doc   !" !" !"
  • 28. DISARM  PROTECTS  AGAINST  THE  MOST  COMMONLY   EXPLOITED  FILE  TYPES   Bezpečnost  není  jen  an.virus   28     •  Remove  JavaScripts  and  “launch”  ac8on •  Remove/replace  embedded  objects/files,  e.g.  Flash •  Sani8ze  XML  Forms  Architecture  (XFA)  objects •  Remove  macros •  Remove/replace  embedded  objects,  e.g.  Flash •  Reconstruct  supported  embedded  objects,  e.g.  PDF,  images,  … •  Remove  macros •  Remove/replace  embedded  Flash,  EXEs •  Reconstruct  supported  objects,  e.g.  PDF,  OLE  inside  OLE,  … 2007/
  • 29. CONTROL  OUTBOUND  EMAIL  TO  PREVENT  DATA  LOSS   Bezpečnost  není  jen  an.virus   29   Use  on-­‐premise  Gateway   Email  Encryp8on  or   cloud-­‐based  encryp8on Policy  based  for   automa8c  encryp8on ADD-ON CONTENT ENCRYPTION Protect  confiden8al  data   across  Endpoint,   Network  and  Storage   Systems Tight  integra8on  and   unified  management INTEGRATE WITH SYMANTEC DLP Over  100  pre-­‐built   dic8onaries,  paRerns,   and  policy  templates Workflow  and   remedia8on  tools   Dedicated  DLP   quaran8ne BUILT-­‐IN  DATA  LOSS   PREVENTION  
  • 30. CHOICE  IN  EMAIL  ENCRYPTION  *ADD  ON  OPTIONS   Bezpečnost  není  jen  an.virus   30   Unencrypted  Communica8ons                    TLS users admin Email     server Messaging     Gateway Policy   Configura8on Encrypted   Email Encrypted   response Unencrypted  recipient Encrypted  recipient Symantec     Content  Encryp8on On-­‐premise  op8on Unencrypted  communica8ons users admin Email     server Messaging     Gateway Unencrypted  recipient Encrypted  recipient Symantec   Gateway     Encryp8on                    Encrypted  communica8ons
  • 31. SIMPLE  MANAGEMENT  WITH  POWERFUL  CAPABILITIES   Bezpečnost  není  jen  an.virus   31   •  Iden8fy  email  security  trends  using  over  50  pre-­‐built  reports •  Quickly  iden8fy  top  Spam  sender,  reputa8on  effec8veness,  and  trending   analysis  to  determine  ROI. •  Customizable  reports  can  be  scheduled  to  run  as  needed. On  Demand   Repor.ng   •  Con8nuous  automa8c  Spam  and  Malware  updates  ensure  protec8on   stays  up  to  date. •  In-­‐product  soBware  download  and  update  process  streamlines  product   upgrades. Streamlined   Update   Process   •  Single  web  based  console  allows  management  of  mul8ple  scanners. •  Customizable  dashboard  quickly  highlights  problem  areas  in  the  email   environment. •  Custom  group  policies  through  exis8ng  LDAP  groups,  individual  users,  or   domains Unified   Management   and   Administra.on  
  • 32. REDUCE  COSTS  WITH  THE  POWER  OF  VIRTUAL   APPLIANCE   Bezpečnost  není  jen  an.virus   32   •  Dynamic  Resource  Alloca.on   –  Easily  accommodate  infrastructure  growth  requirements   –  Quickly  respond  to  changes  in  traffic  volume   •  Cost  Savings   –  Be?er  hardware  u.liza.on   –  Lower  power  consump.on  (“green”  IT)   •  Easy  Backup  &  Disaster  Recovery   –  Cost-­‐effec.ve  high-­‐availability   –  Easily  restore  in  the  event  of  disaster  recovery   •  Zero-­‐Down.me  Maintenance   –  Decouple  physical  server  maintenance  from  sokware   –  Test  new  sokware  versions  before  deploying   •  Flexible  Deployment   –  VMWare  ESXi  &  vSphere   –  Microsok  Hyper-­‐V   –  Same  sokware  license  for  virtual  or  appliance   Hypervisor
  • 33. Bezpečnost  není  jen  an.virus   33   MAIL  SECURITY  FOR  MICROSOFT  EXCHANGE   • An.virus  /  An.virus  &  an.spam   • Superior  Protec.on   •  An.malware  technology   •  Ability  to  scan  messages  in  transit  or  on  the  mailbox   •  Powered  by  Premium  An.Spam   •  Rapid  release  defini.ons   •  Advanced  content  filtering   • Flexible  and  Easy  to  Use  Management   • Op.mized  for  Exchange  
  • 34. Thank  you!   Copyright  ©  2011  Symantec  Corpora/on.  All  rights  reserved.  Symantec  and  the  Symantec  Logo  are  trademarks  or  registered  trademarks  of  Symantec  Corpora.on  or  its  affiliates  in   the  U.S.  and  other  countries.    Other  names  may  be  trademarks  of  their  respec.ve  owners.     This  document  is  provided  for  informa.onal  purposes  only  and  is  not  intended  as  adver.sing.    All  warran.es  rela.ng  to  the  informa.on  in  this  document,  either  express  or  implied,   are  disclaimed  to  the  maximum  extent  allowed  by  law.    The  informa.on  in  this  document  is  subject  to  change  without  no.ce.   34   Děkuji!   Mar.n  Bobek   mar.n.bobek@arrow.com   +420  607  275  843   Bezpečnost  není  jen  an.virus