Identify and Patch Software Security Vulnerabilities and Prevent Configuration Drift
                                       Considering that over 90% of cyber attacks exploit known security flaws for which remediation is
                                       available¹, effective vulnerability and patch management should be on every company’s to-do list.
                                       However, in today’s economy, enterprises are forced to do more with less and maintain a secure IT
               ¹Gartner Research       environment while keeping operating costs low.



                  Key Benefits
    • Enables you to stay ahead
               of remote threats
            • Streamlines patch
            management across                    Play your cards
    heterogeneous environments
                                                     right - stay ahead
• Provides visibility into real-time
         patch status and overall                of the threats
                  security posture
    • Reduces TCO by saving IT
       operations time and effort
      • Enables Compliance with
       Regulations and Software
            License Agreements




                                       This creates an enormous challenge for enterprises in light of an increasing number of remote
                                       employees who reduce the organization’s visibility into the network and control over the devices
                                       that are brought in and out of the environment. IT organizations must now support heterogeneous
                                       environments with:
                                          - Increasingly diverse operating systems beyond simply Windows, including
                                            Red Hat, Unix and many more
                                          - Countless software applications, including business productivity tools,
                                            web browsers, P2P and more
       norman Patch and                   - More physical and virtual machines within the network
    remediation advanced                  - Numerous endpoint configurations that have drifted out of compliance
                Provides:
                                            with regulatory or corporate policies as well as industry best practices
   • Rapid, accurate and secure
             patch management
• Automated collection, analysis
                                       By streamlining and automating vulnerability management processes, organizations can effectively
       and delivery of patches         address operating systems and applications from multiple vendors.
  • Security for your organization
from worms, trojans, viruses and       When faced with all these challenges, it is important that organizations find the right balance be-
          other malicious threats
                                       tween effectively addressing network security and compliance concerns while keeping a low total
   • Single consolidated solution
for heterogeneous environments
                                       cost of ownership (TCO).
 provides effective management
  at a significantly reduced TCO       Norman Patch and Remediation Advanced streamlines and automates the patch management
                                       process in even the most complex, heterogeneous environments. Through proactive alerting on
                                       issues, you can address them immediately.



                                       Norman Content Wizard - a part of Patch and Remediation Advanced
                                       Norman Content Wizard (NCW) is a powerful tool that automates time-consuming system and
                                       desktop management tasks. It lets you optimize your IT environment and take advantage of cost
                                       and resource saving options via power management capabilities.
                                       Extending vulnerability management capabilities without requiring additional solutions, NCW
                                       works in conjunction with Norman Patch and Remediation to provide user-friendly development,
                                       centralized management and enforcement of capabilities throughout an organization.
How Norman Patch and Remediation Advanced
                                                                                                 works:
                                                                                                 1. Discover - application, operating system and configu-
                                                                                                    ration vulnerabilities on managed endpoints through
                                                                                                    comprehensive agent-based scan.
                                                                                                 2. Profile - for every patch is created including software,
                                                                                                    hardware, drivers and existing and missing patches for
                                                                                                    each machine.
                                                                                                 3. Remediate - vulnerabilities and rapidly deploy patches
                                                                                                    based on defined policies.
                                                                                                 4. Report - on operational, management and compliance
  system requirements
                                                                                                    initiatives.
      Server: Windows Server
     2003 with Microsoft SQL,
        Server 2005 and .NET
            Framework, 2008              Said by a user:

       Agent Coverage: Apple
                                         “We have not been subject to any major virus attacks since deploying this
           Mac OS X, Hewlett             product and using its centralized management capability.
         Packard HP-UX, IBM
      AIX, Novell SUSE Linux,            Critical patches can be quickly applied to all machines across our distributed
           RHEL, Sun Solaris,            network.”
      Windows: 98, NT, 2000,
  XP, Vista, 7, Windows Server
2003, 2003 R2, 2008, 2008 R2
                                  Key Features
                                   comprehensive assessment of it assets:                                    automatic notifications: E-mail alerts can
                                    Provides comprehensive understanding                                       be sent to administrators to notify them of
                                    of security posture for inventory and                                      a variety of issues, including subscription or
                                    management of both physical and cirtual                                    remediation failures and upcoming license
                                    environments via in-depth assessment                                       expiration.
                                    of vulnerabilities, patch status, security
                                    configurations, installed software, and                                   comprehensive remediation actions:
                                    hardware inventory.                                                        Vulnerability audits include security
                                                                                                               configurations, OS and application
                                   open architecture: Supporting open                                         vulnerabilities, null passwords, patch-level
                                    standards and multiple sources of content,                                 related vulnerabilities, known hacking
                                    Norman Patch and Remediation delivers                                      tools, malware, common worms, and P2P
 suPPorted languages                a customizable and diverse platform for                                    software checks.
          Chinese (Simplified)      operational security management.
          Chinese (Traditional)                                                                               centralized endpoint Power
                       Danish
                                   supports heterogeneous environments:                                       management Policy Wizard: Centralizes
                                    Vulnerability audits and remediation with                                  management and enforcement of power
                        Dutch
                                    wide support across major OS platforms                                     policies across complex environments,
                       English      (Windows, Linux, MacOS, Sun Solaris, HP,                                   including standby, hibernation and sleep
                       Finnish      etc.), POSIX and infrastructure devices - all                              timing setting based on user and system
                       French       from one single console.                                                   inactivity.
                      German
                        Italian    multi-Patch deployments: Delivers                                         highly scalable: Complete coverage for
                    Japanese        multiple patches to multiple computers in                                  the largest worldwide networks with high-
                                    one distribution.                                                          availability topologies and distribution point
                       Korean
                                                                                                               architecture. Packages are cached locally,
                   Norwegian
                                   software distribution and removal:                                         minimizing network traffic and optimizing
                   Portuguese       Policy-based installation of new and                                       bandwidth utilization.
                      Spanish       updated software packages which quickly
                      Swedish       identifies installed software on endpoints,                               role- and Policy-based administration:
                                    automatically removes outdated or                                          Ensures that all your systems meet a
                                    unauthorized software and ensures ongoing                                  mandatory baseline policy – a key aspect
                                    monitoring and baseline enforcement.                                       of corporate security and regulatory
                                                                                                               compliance.




                                  Norman ASA is a world leading company within the field of data security, internet protection and
                                  analysis tools. Through its SandBox technology Norman offers a unique and proactive protection
                                  unlike any other competitor. While focusing on its proactive antivirus technology, the company has
                                  formed alliances which enable Norman to offer a complete range of data security services.
                                  Norman was established in 1984 and is headquartered in Norway with continental Europe, UK and
                                  US as its main markets.

                                  www.norman.com	                                  Norman SandBox® US Patent Number 7,356,736

Norman Patch and Remediation

  • 1.
    Identify and PatchSoftware Security Vulnerabilities and Prevent Configuration Drift Considering that over 90% of cyber attacks exploit known security flaws for which remediation is available¹, effective vulnerability and patch management should be on every company’s to-do list. However, in today’s economy, enterprises are forced to do more with less and maintain a secure IT ¹Gartner Research environment while keeping operating costs low. Key Benefits • Enables you to stay ahead of remote threats • Streamlines patch management across Play your cards heterogeneous environments right - stay ahead • Provides visibility into real-time patch status and overall of the threats security posture • Reduces TCO by saving IT operations time and effort • Enables Compliance with Regulations and Software License Agreements This creates an enormous challenge for enterprises in light of an increasing number of remote employees who reduce the organization’s visibility into the network and control over the devices that are brought in and out of the environment. IT organizations must now support heterogeneous environments with: - Increasingly diverse operating systems beyond simply Windows, including Red Hat, Unix and many more - Countless software applications, including business productivity tools, web browsers, P2P and more norman Patch and - More physical and virtual machines within the network remediation advanced - Numerous endpoint configurations that have drifted out of compliance Provides: with regulatory or corporate policies as well as industry best practices • Rapid, accurate and secure patch management • Automated collection, analysis By streamlining and automating vulnerability management processes, organizations can effectively and delivery of patches address operating systems and applications from multiple vendors. • Security for your organization from worms, trojans, viruses and When faced with all these challenges, it is important that organizations find the right balance be- other malicious threats tween effectively addressing network security and compliance concerns while keeping a low total • Single consolidated solution for heterogeneous environments cost of ownership (TCO). provides effective management at a significantly reduced TCO Norman Patch and Remediation Advanced streamlines and automates the patch management process in even the most complex, heterogeneous environments. Through proactive alerting on issues, you can address them immediately. Norman Content Wizard - a part of Patch and Remediation Advanced Norman Content Wizard (NCW) is a powerful tool that automates time-consuming system and desktop management tasks. It lets you optimize your IT environment and take advantage of cost and resource saving options via power management capabilities. Extending vulnerability management capabilities without requiring additional solutions, NCW works in conjunction with Norman Patch and Remediation to provide user-friendly development, centralized management and enforcement of capabilities throughout an organization.
  • 2.
    How Norman Patchand Remediation Advanced works: 1. Discover - application, operating system and configu- ration vulnerabilities on managed endpoints through comprehensive agent-based scan. 2. Profile - for every patch is created including software, hardware, drivers and existing and missing patches for each machine. 3. Remediate - vulnerabilities and rapidly deploy patches based on defined policies. 4. Report - on operational, management and compliance system requirements initiatives. Server: Windows Server 2003 with Microsoft SQL, Server 2005 and .NET Framework, 2008 Said by a user: Agent Coverage: Apple “We have not been subject to any major virus attacks since deploying this Mac OS X, Hewlett product and using its centralized management capability. Packard HP-UX, IBM AIX, Novell SUSE Linux, Critical patches can be quickly applied to all machines across our distributed RHEL, Sun Solaris, network.” Windows: 98, NT, 2000, XP, Vista, 7, Windows Server 2003, 2003 R2, 2008, 2008 R2 Key Features comprehensive assessment of it assets: automatic notifications: E-mail alerts can Provides comprehensive understanding be sent to administrators to notify them of of security posture for inventory and a variety of issues, including subscription or management of both physical and cirtual remediation failures and upcoming license environments via in-depth assessment expiration. of vulnerabilities, patch status, security configurations, installed software, and comprehensive remediation actions: hardware inventory. Vulnerability audits include security configurations, OS and application open architecture: Supporting open vulnerabilities, null passwords, patch-level standards and multiple sources of content, related vulnerabilities, known hacking Norman Patch and Remediation delivers tools, malware, common worms, and P2P suPPorted languages a customizable and diverse platform for software checks. Chinese (Simplified) operational security management. Chinese (Traditional) centralized endpoint Power Danish supports heterogeneous environments: management Policy Wizard: Centralizes Vulnerability audits and remediation with management and enforcement of power Dutch wide support across major OS platforms policies across complex environments, English (Windows, Linux, MacOS, Sun Solaris, HP, including standby, hibernation and sleep Finnish etc.), POSIX and infrastructure devices - all timing setting based on user and system French from one single console. inactivity. German Italian multi-Patch deployments: Delivers highly scalable: Complete coverage for Japanese multiple patches to multiple computers in the largest worldwide networks with high- one distribution. availability topologies and distribution point Korean architecture. Packages are cached locally, Norwegian software distribution and removal: minimizing network traffic and optimizing Portuguese Policy-based installation of new and bandwidth utilization. Spanish updated software packages which quickly Swedish identifies installed software on endpoints, role- and Policy-based administration: automatically removes outdated or Ensures that all your systems meet a unauthorized software and ensures ongoing mandatory baseline policy – a key aspect monitoring and baseline enforcement. of corporate security and regulatory compliance. Norman ASA is a world leading company within the field of data security, internet protection and analysis tools. Through its SandBox technology Norman offers a unique and proactive protection unlike any other competitor. While focusing on its proactive antivirus technology, the company has formed alliances which enable Norman to offer a complete range of data security services. Norman was established in 1984 and is headquartered in Norway with continental Europe, UK and US as its main markets. www.norman.com Norman SandBox® US Patent Number 7,356,736