180 likes | 195 Views
Learn how Symantec provides complete endpoint protection against a broad range of threats, from viruses to spyware, for all client devices.
E N D
Threat Landscape Information at Risk Protection Technologies Defence in Depth Today's Discussion Topics 1 2 3 4
Protection From External Malicious Threats • Protection Starts At The Corporate Endpoint • Broad Range Of Client Devices : Laptop, Desktop, Cell Phone • Broad Range Of Threats : Virus, Worms, SpyWare … CrimeWare Crimeware SpyWare Worm Virus SymbianDevice LaptopPC DesktopPC WindowsSmartphone
From Hackers & Spies… To Thieves Silent Noisy & Visible OLD NEW Highly Targeted Indiscriminate Few, Named Variants Overwhelming Variants As Threat Landscape Changes, Technology Must as Well Moving from Disrupting Operations To Damaging Trust and Reputations
Office&PSTs KeyStrokes Thieves Want To Steal Information DeviceBlocking SymbianDevice LaptopPC DesktopPC WindowsSmartphone Anti-Fraud
Crimeware SpyWare Worm Virus Logout | Help Symantec Client Security- Complete Endpoint Protection • Unified Agent Protects Against Broadest Range Of Threats • Anti-Virus, Anti-Spyware, Anti-Fraud, IPS / IDS, Device Blocking, Firewall • Unified Administration Provides Single Point Of Control • Manage Policy, Events & Reporting SymbianDevice DesktopPC LaptopPC WindowsSmartphone
Crimeware SpyWare Worm Virus Symantec Client Security- Complete Endpoint Protection • Unified Agent • Single Agent Footprint For Each Device • Unified Administration • Single Point Of Control For Policy, Events & Reporting SymbianDevice LaptopPC DesktopPC WindowsSmartphone
Crimeware SpyWare Worm Virus Symantec Client Security- Complete Endpoint Protection • Supports The Broadest Range Of Enterprise Devices • Eliminates The Broadest Range Of External Malicious Threats SymbianDevice LaptopPC DesktopPC WindowsSmartphone
Protection Viruses UnknownAttacks Trojans Spyware Worms Endpoint Security Policy Status Compliance Anti-Virus On Anti-VirusSignatureUpdated PersonalFirewallOn ServicePackUpdated Patch Updated The Need for Endpoint Compliance
Step 1 Endpoint Attaches To Network Configuration Is Determined Discover ✗ Monitor Endpoint ToEnsure Ongoing Compliance Step 4 Monitor Enforce ü ü Step 2 Compliance Of ConfigurationAgainst Policy Is Checked Remediate PatchQuarantineVirtual Desktop Step 3 Take Action Based OnOutcome Of Policy Check Symantec Endpoint Compliance Process
Symantec Network Access Control • Choose quarantine, remediation or federated access • Enforce policy before access is granted • Execute updates, programs, services, etc. • Limit connection to VLAN, etc • Broadest enforcement options of any vendor • Remote connectivity (IPSec, SSL VPN) • LAN-based, DHCP, Appliance • Standards-based, CNAC, MSNAP Ensures endpoints are protected and compliant prior to accessing network resources
Web-basedApplications ThinClient/ServerApplications TraditionalClient/ServerApplications FileShare PartnerExtranet PublicKiosk TravelingExecutives Symantec On-Demand Protection • Ideal for use with: • Outlook Web Access (OWA) • Web-enabled applications • Most complete On-Demand security solution • Virtual Desktop • Malicious Code Prevention • Cache Cleaner • Mini personal firewall • Host Integrity • Adaptive Policies Layered security technology solution for unmanaged endpoints
OWA Kiosk Partner Temp Network Access Control + On-Demand Protection • Complete security compliance regardless of network access method • Managed Devices: laptops, mobile phones • Unmanaged Devices: Guest, contractor, partners, kiosks SymbianDevice LaptopPC DesktopPC WindowsSmartphone
1010101 1010101 1010101 Servers Are Endpoints Too • Data Center Servers Are Exposed To A Broad Range Of Threats • Malicious Code… Malicious Users LoosePrivileges SystemDevices BufferOverflow BackDoor FileServer EmailServer ApplicationServer Database Server
1010101 1010101 1010101 Symantec Critical System Protection 5.1 • Eliminates The Broadest Range Of Malicious Server Threats • Runs On The Broadest Range Of Operating Systems LoosePrivileges SystemDevices BufferOverflow BackDoor FileServer EmailServer ApplicationServer Database Server
Security Foundation Client Security + Critical System Protection • Think Of It As The “Security Foundation” • Managed From A Single, Integrated Operational Console Symantec Client Security Symantec Critical System Protection Cell Phone Laptop Desktop File Server Application Server Messaging Server Database Server