This document discusses Symantec Endpoint Suite, which provides endpoint protection, encryption, mobile device management, and email protection. It offers two versions - one with just endpoint protection, encryption, and mobile management, and one that also includes email security features. The suite aims to simplify security management and reduce costs by consolidating multiple security solutions into a single platform. It provides layered threat protection through technologies like antivirus, firewall, reputation analysis, and behavior monitoring to block both known and unknown malware.
1. Bezpečnost
není
jen
an.virus
1
Bezpečnost
není
jen
an/virus
Mar/n
Bobek
Product
Manager,
Arrow
ECS
a.s.
2. ENDPOINT
SUITE
–
TWO
VERSIONS
Bezpečnost
není
jen
an.virus
2
SymantecTM Endpoint Suite
SymantecTM Endpoint Suite
with Email
• Symantec Endpoint Protec8on
• Symantec Endpoint Encryp8on
• Symantec Mobile Device Management
• Symantec Mobile Threat Protec8on
• Symantec Endpoint Protec8on
• Symantec Endpoint Encryp8on
• Symantec Mobile Device Management
• Symantec Mobile Threat Protec8on
And email protec8on:
• Symantec Messaging Gateway
• Symantec Gateway Email Encryp8on
• Symantec Mail Security for MicrosoB
Exchange
3. ENDPOINT
SUITE
SIMPLIFIES
SECURITY
Protect
the
users,
devices
and
data
for
less
money
Bezpečnost
není
jen
an.virus
3
• Symantec Messaging
Gateway defends your
email and infrastructure at
the perimeter with real-‐
8me an8spam and
an8malware protec8on.
• Symantec Email Encryp8on
Gateway, powered by PGP,
encrypts messages to
safeguard the confiden8al
data.
• Symantec Mail Security for
MicrosoB Exchange
prevents the spread of
email-‐borne threats.
• Measurable savings from
simplified subscrip8on-‐
based pricing and take the
mystery out of license,
support, and renewal costs.
• Remove complexity and
consolidate patchwork,
mul8-‐vendor, solu8ons.
• Single purchase, single
support for trouble-‐
shoo8ng, reduces up-‐front
and on-‐going costs.
• Symantec Endpoint
Protec8on provides the
security with a single, high-‐
powered agent, for the
fastest, most-‐effec8ve
protec8on available.
• Symantec Endpoint
Encryp8on, powered by
PGP, protects data with
strong full-‐disk and
removable media
encryp8on.
• Symantec Mobile threat
protec8on and device
management provides
trusted security for mobile
devices.
Prevent data loss at
email gateway/server, and
email encryp8on
Single solu8on
to drive down costs and
stretch IT budgets
Complete
malware protec8on for
endpoints and mobile
Informa8on
Protec8on
Lower Cost
Solu8on
Threat
Protec8on
5. UNRIVALED
SECURITY
WITH
UNIQUE
VISIBILITY
Symantec
has
unique
visibility
into
today`s
threat
landscape
Bezpečnost
není
jen
an.virus
5
175M
endpoints
57M aRack sensors in
157 countries
182M web aRacks
blocked last year
3.7T
rows of telemetry
30% of world’s enterprise
email traffic scanned/day
9
threat response centers
7. ENDPOINT
PROTECTION
12.1
Bezpečnost
není
jen
an.virus
7
UNRIVALED
SECURITY
BLAZING
PERFORMANCE
SMARTER
MANAGEMENT
Stops
targeted
a?acks
and
advanced
persistent
threats
with
intelligent
security
and
layered
protec.on
that
goes
beyond
an.virus
Performance
so
fast
your
users
won’t
even
know
its
there
A
single
management
console
across
Windows,
Mac,
Linux,
and
Virtual
plaLorms
with
granular
policy
control
8. UNRIVALED
SECURITY
WITH
LAYERED
PROTECTION
Layered
protec/on
to
stop
targeted
a]acks
and
zero-‐days
Bezpečnost
není
jen
an.virus
8
FIREWALL AND
INTRUSION
PREVENTION
ANTIVIRUS
SONAR
Blocks
malware
before
it
spreads
to
your
machine
and
controls
traffic
Scans
and
eradicates
malware
that
arrives
on
a
system
Determines
safety
of
files
and
websites
using
the
wisdom
of
the
community
Monitors
and
blocks
files
that
exhibit
suspicious
behaviors
Aggressive
remedia.on
of
hard-‐to-‐remove
infec.ons
NETWORK
FILE
REPUTATION
BEHAVIOR
REPAIR
POWER
ERASER
INSIGHT
9. UNRIVALED
SECURITY
WITH
INSIGHT
Age,
frequency
and
loca/on
are
used
to
expose
unknown
threats
Bezpečnost
není
jen
an.virus
9
Big Data Analy8cs
Analy8cs
Warehouse
Analysts
ARack Quaran8ne
System
Endpoints
Gateways
3rd Party
Affiliates
Global Sensor
Network
Global Data Collec8on
Honeypots
Bad safety ra8ng
File is blocked
No safety ra8ng yet
Can be blocked
Good safety ra8ng
File is whitelisted
10. BLAZING
PERFORMANCE
WITH
INSIGHT
Up
to
70%
reduc/on
in
scan
overhead
Bezpečnost
není
jen
an.virus
10
Insight allows you to skip known good
files only scanning unknown flies
Tradi8onal scanning has to scan
every file
ü ü ü ü ü
ü ü ü ü ü
ü ü ü ü ü
11. UNRIVALED
SECURITY
WITH
SONAR
Behavioral
monitoring
stops
zero-‐day
and
unknown
threats
Bezpečnost
není
jen
an.virus
11
Human-‐authored
Behavioral Signatures
Behavioral Policy
Lockdown
Who is it related to?
What did it contain?
Where did it come
from?
What has it done?
Ar8ficial Intelligence
Based Classifica8on Engine
12. SMARTER
MANAGEMENT
WITH
POLICY
CONTROL
Customize
polices
based
on
user
or
loca/on
Bezpečnost
není
jen
an.virus
12
HOST INTEGRITY
Detect
unauthorized
change,
conduct
damage
assessment
and
ensures
endpoints
are
protected
and
compliant
EXTERNAL MEDIA
CONTROL
Restrict
and
enable
access
to
the
hardware
(USB,
DVD,
SD,
etc.)
that
can
be
used
to
protect
and
increase
produc.vity
APPLICATION CONTROL
Monitor
and
control
applica.ons
behavior,
including
automated
system
lockdown,
and
advanced
whitelis.ng
and
blacklis.ng
capabili.es
13. ENDPOINT
ENCRYPTION
Protect
data
stored
on
endpoint
devices
Bezpečnost
není
jen
an.virus
13
• Supports USBs, portable hard drives, SD cards, and CD/
DVD/Blu-‐ray media
• Access U8lity Drive – tool to view data on machines
without SEE client installed
Also known as Full-‐Disk or Whole Disk Encryp8on
• Encryp8on happens in the background
• No interac8on required by end user
• Self-‐Recovery and Help Desk recovery capabili8es
• Single Sign-‐On capability
• Smart card support for pre-‐boot authen8ca8on
• FileVault Management
• Management of Opal Self-‐Encryp8ng Drives*
• BitLocker management coming in 2H2015
LAPTOPS
AND
DESKTOPS
REMOVABLE
MEDIA
ENCRYPTION
14. MOBILE
DEVICE
MANAGEMENT
Enable,
secure
and
manage
your
heterogeneous
mobile
environment
Bezpečnost
není
jen
an.virus
14
Ac8vate enterprise access
easily and automa8cally
ENABLE
SECURE
Enforce device policies and
compliance
MANAGE
Visibility and repor8ng with
web-‐based management
15. THREAT
PROTECTION
Bezpečnost
není
jen
an.virus
15
Advanced, proac8ve protec8on
against risky apps
APP
ADVISOR
ANTI-‐MALWARE
Protect against latest threats
with Live-‐Update
Compliance rules based on
device security posture
WEB
PROTECTION
Detect and block phishing
websites
16. APP
ADVISOR
IDENTIFIES
RISKY
APPS
Bezpečnost
není
jen
an.virus
16
• Apps that leak informa8on
• Apps that drain baRery
• Apps that consume too much bandwidth
• Proac8ve protec8on before download from Google Play
• Enable users to make informed decisions about apps
17. PROTECT
AGAINST
MALICIOUS
THREATS
Bezpečnost
není
jen
an.virus
17
ANTI-‐MALWARE
• Fast and effec8ve on-‐device scans
• Protect against latest threats with Live-‐Update
integra8on
• Implement compliance rules based on device
security posture
WEB PROTECTION
• Detect and block phishing websites
• Enable safe mobile browsing
22. EMAIL
SECURITY
IS
MORE
THAN
JUST
STOPPING
SPAM
Bezpečnost
není
jen
an.virus
22
Lower the expense
and
investment in
administra8on and
infrastructure.
REDUCE
COST
Keep
unwanted email
out of the inbox
without blocking
legi8mate
messages.
PROTECT USERS
Iden8fy and
control the spread
of confiden8al
informa8on and
comply with
regula8ons.
CONTROL DATA
Detect and block
targeted aRacks,
malware, and
phishing from
entering your
environment.
PREVENT THREATS
$
23. PROACTIVE
DEFENSE
IS
REQUIRED
Bezpečnost
není
jen
an.virus
23
• Strongest malware preven8on
• Protec8on against malicious
URLs and aRachments
• Domain valida8on to block
phishing
• Data control and protec8on
• Intelligent email encryp8on
BASIC EMAIL SECURITY STRATEGY
• Integra8on with full
Symantec DLP for inspec8on,
encryp8on, and control
• Integra8on with Symantec
Cynic™ sandbox execu8on
technology for email
aRachments.
• Targeted aRack repor8ng and
security event correla8on.
ADVANCED EMAIL SECURITY STRATEGY
24. MESSAGING
GATEWAY
• 18
years
on
market
• Acquired
by
Symantec
in
2004
• Hardware/virtual
appliance
• Linux
based
opera.ng
system
• Two
subcomponents
• Scanner
(inbound/outbound
messages,
download
updates,
apply
ac.ons
to
messages)
• Control
Center
(message
management,
sta.s.c,
hosted
spam
quaran.ne)
• Targeted
a?ack
protec.on
Bezpečnost
není
jen
an.virus
24
25. CUSTOMIZABLE
PROTECTION
AGAINST
MALWARE,
SPAM
AND
GREY
MAIL
Bezpečnost
není
jen
an.virus
25
Scans for newsleRers,
marke8ng email, and
suspicious URLs
Configure policies by
group with dis8nct
ac8ons for each type of
mail
PERSONALIZED
PROTECTION
Tracks over 400 million
known spam and safe
senders IPs.
Filters out up to 95% of
spam traffic based on
reputa8on.
ADAPTIVE
REPUATATION
MANAGEMENT
Disarm aRachment
cleaning
Over 20 detec8on
technologies
Greater than 99%
an8spam effec8veness
ANTISPAM
&
ANTIMALWARE
26. PROTECT
AGAINST
TARGETED
ATTACKS
OVER
EMAIL
Bezpečnost
není
jen
an.virus
26
Email
and
a?acks
using
malicious
document
a?achments
– Primarily
used
in
spear
phishing
emails
–
Advanced
Persistent
Threat
(APT)
– Contain
malicious
ac.ve
content,
or
exploit
payloads
targe.ng
parser
vulnerabili.es
Exis.ng
solu.ons
only
scan
a?achments
of
certain
file
types
– They
target
only
spam
and
known
malicious
executables/documents
– Current
protec.on
is
inadequate
Disarm
will
reconstruct
the
a]achment
documents,
without
the
malicious
content,
before
delivering
to
the
user.
27. DISARM
REMOVES
ALL
VULNERABLE
CONTENT,
NOT
JUST
KNOWN
THREATS
Bezpečnost
není
jen
an.virus
27
Vulnerable
Content
PDF
Office
2003
Office
2007+
Javascript
!"
Launch
!"
Macros
!" !"
Flash
!" !" !"
3d
!"
A]achments
!" !" !"
Unused
Objects
!" !"
Custom
Fonts
!"
Image
Reconstruct
!"
Ac/ve
X
!" !"
Unknown
!" !" !"
Embedded
Doc
!" !" !"
28. DISARM
PROTECTS
AGAINST
THE
MOST
COMMONLY
EXPLOITED
FILE
TYPES
Bezpečnost
není
jen
an.virus
28
• Remove JavaScripts and “launch” ac8on
• Remove/replace embedded objects/files, e.g. Flash
• Sani8ze XML Forms Architecture (XFA) objects
• Remove macros
• Remove/replace embedded objects, e.g. Flash
• Reconstruct supported embedded objects, e.g. PDF, images, …
• Remove macros
• Remove/replace embedded Flash, EXEs
• Reconstruct supported objects, e.g. PDF, OLE inside OLE, …
2007/
29. CONTROL
OUTBOUND
EMAIL
TO
PREVENT
DATA
LOSS
Bezpečnost
není
jen
an.virus
29
Use on-‐premise Gateway
Email Encryp8on or
cloud-‐based encryp8on
Policy based for
automa8c encryp8on
ADD-ON CONTENT
ENCRYPTION
Protect confiden8al data
across Endpoint,
Network and Storage
Systems
Tight integra8on and
unified management
INTEGRATE WITH
SYMANTEC DLP
Over 100 pre-‐built
dic8onaries, paRerns,
and policy templates
Workflow and
remedia8on tools
Dedicated DLP
quaran8ne
BUILT-‐IN
DATA
LOSS
PREVENTION
30. CHOICE
IN
EMAIL
ENCRYPTION
*ADD
ON
OPTIONS
Bezpečnost
není
jen
an.virus
30
Unencrypted Communica8ons
TLS
users
admin
Email
server
Messaging
Gateway
Policy
Configura8on
Encrypted
Email
Encrypted
response
Unencrypted recipient
Encrypted recipient
Symantec
Content Encryp8on
On-‐premise op8on
Unencrypted communica8ons
users
admin
Email
server
Messaging
Gateway
Unencrypted recipient
Encrypted recipient
Symantec
Gateway
Encryp8on
Encrypted communica8ons
31. SIMPLE
MANAGEMENT
WITH
POWERFUL
CAPABILITIES
Bezpečnost
není
jen
an.virus
31
• Iden8fy email security trends using over 50 pre-‐built reports
• Quickly iden8fy top Spam sender, reputa8on effec8veness, and trending
analysis to determine ROI.
• Customizable reports can be scheduled to run as needed.
On
Demand
Repor.ng
• Con8nuous automa8c Spam and Malware updates ensure protec8on
stays up to date.
• In-‐product soBware download and update process streamlines product
upgrades.
Streamlined
Update
Process
• Single web based console allows management of mul8ple scanners.
• Customizable dashboard quickly highlights problem areas in the email
environment.
• Custom group policies through exis8ng LDAP groups, individual users, or
domains
Unified
Management
and
Administra.on
32. REDUCE
COSTS
WITH
THE
POWER
OF
VIRTUAL
APPLIANCE
Bezpečnost
není
jen
an.virus
32
• Dynamic
Resource
Alloca.on
– Easily
accommodate
infrastructure
growth
requirements
– Quickly
respond
to
changes
in
traffic
volume
• Cost
Savings
– Be?er
hardware
u.liza.on
– Lower
power
consump.on
(“green”
IT)
• Easy
Backup
&
Disaster
Recovery
– Cost-‐effec.ve
high-‐availability
– Easily
restore
in
the
event
of
disaster
recovery
• Zero-‐Down.me
Maintenance
– Decouple
physical
server
maintenance
from
sokware
– Test
new
sokware
versions
before
deploying
• Flexible
Deployment
– VMWare
ESXi
&
vSphere
– Microsok
Hyper-‐V
– Same
sokware
license
for
virtual
or
appliance
Hypervisor
33. Bezpečnost
není
jen
an.virus
33
MAIL
SECURITY
FOR
MICROSOFT
EXCHANGE
• An.virus
/
An.virus
&
an.spam
• Superior
Protec.on
• An.malware
technology
• Ability
to
scan
messages
in
transit
or
on
the
mailbox
• Powered
by
Premium
An.Spam
• Rapid
release
defini.ons
• Advanced
content
filtering
• Flexible
and
Easy
to
Use
Management
• Op.mized
for
Exchange