1 / 18

Symantec Security Managing Threats To Your Business

Symantec Security Managing Threats To Your Business. Threat Landscape Information at Risk Protection Technologies Defence in Depth. Today's Discussion Topics. 1. 2. 3. 4. Protection From External Malicious Threats. Protection Starts At The Corporate Endpoint

buddym
Download Presentation

Symantec Security Managing Threats To Your Business

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Symantec SecurityManaging ThreatsTo Your Business

  2. Threat Landscape Information at Risk Protection Technologies Defence in Depth Today's Discussion Topics 1 2 3 4

  3. Protection From External Malicious Threats • Protection Starts At The Corporate Endpoint • Broad Range Of Client Devices : Laptop, Desktop, Cell Phone • Broad Range Of Threats : Virus, Worms, SpyWare … CrimeWare Crimeware SpyWare Worm Virus SymbianDevice LaptopPC DesktopPC WindowsSmartphone

  4. From Hackers & Spies… To Thieves Silent Noisy & Visible OLD NEW Highly Targeted Indiscriminate Few, Named Variants Overwhelming Variants As Threat Landscape Changes, Technology Must as Well Moving from Disrupting Operations To Damaging Trust and Reputations

  5. Office&PSTs KeyStrokes Thieves Want To Steal Information DeviceBlocking SymbianDevice LaptopPC DesktopPC WindowsSmartphone Anti-Fraud

  6. Crimeware SpyWare Worm Virus Logout | Help Symantec Client Security- Complete Endpoint Protection • Unified Agent Protects Against Broadest Range Of Threats • Anti-Virus, Anti-Spyware, Anti-Fraud, IPS / IDS, Device Blocking, Firewall • Unified Administration Provides Single Point Of Control • Manage Policy, Events & Reporting SymbianDevice DesktopPC LaptopPC WindowsSmartphone

  7. Crimeware SpyWare Worm Virus Symantec Client Security- Complete Endpoint Protection • Unified Agent • Single Agent Footprint For Each Device • Unified Administration • Single Point Of Control For Policy, Events & Reporting SymbianDevice LaptopPC DesktopPC WindowsSmartphone

  8. Crimeware SpyWare Worm Virus Symantec Client Security- Complete Endpoint Protection • Supports The Broadest Range Of Enterprise Devices • Eliminates The Broadest Range Of External Malicious Threats SymbianDevice LaptopPC DesktopPC WindowsSmartphone

  9. Protection Viruses UnknownAttacks Trojans Spyware Worms Endpoint Security Policy Status Compliance Anti-Virus On Anti-VirusSignatureUpdated PersonalFirewallOn ServicePackUpdated Patch Updated The Need for Endpoint Compliance

  10. Step 1 Endpoint Attaches To Network Configuration Is Determined Discover ✗ Monitor Endpoint ToEnsure Ongoing Compliance Step 4 Monitor Enforce ü ü Step 2 Compliance Of ConfigurationAgainst Policy Is Checked Remediate PatchQuarantineVirtual Desktop Step 3 Take Action Based OnOutcome Of Policy Check Symantec Endpoint Compliance Process

  11. Symantec Network Access Control • Choose quarantine, remediation or federated access • Enforce policy before access is granted • Execute updates, programs, services, etc. • Limit connection to VLAN, etc • Broadest enforcement options of any vendor • Remote connectivity (IPSec, SSL VPN) • LAN-based, DHCP, Appliance • Standards-based, CNAC, MSNAP Ensures endpoints are protected and compliant prior to accessing network resources

  12. Web-basedApplications ThinClient/ServerApplications TraditionalClient/ServerApplications FileShare PartnerExtranet PublicKiosk TravelingExecutives Symantec On-Demand Protection • Ideal for use with: • Outlook Web Access (OWA) • Web-enabled applications • Most complete On-Demand security solution • Virtual Desktop • Malicious Code Prevention • Cache Cleaner • Mini personal firewall • Host Integrity • Adaptive Policies Layered security technology solution for unmanaged endpoints

  13. OWA Kiosk Partner Temp Network Access Control + On-Demand Protection • Complete security compliance regardless of network access method • Managed Devices: laptops, mobile phones • Unmanaged Devices: Guest, contractor, partners, kiosks SymbianDevice LaptopPC DesktopPC WindowsSmartphone

  14. 1010101 1010101 1010101 Servers Are Endpoints Too • Data Center Servers Are Exposed To A Broad Range Of Threats • Malicious Code… Malicious Users LoosePrivileges SystemDevices BufferOverflow BackDoor FileServer EmailServer ApplicationServer Database Server

  15. 1010101 1010101 1010101 Symantec Critical System Protection 5.1 • Eliminates The Broadest Range Of Malicious Server Threats • Runs On The Broadest Range Of Operating Systems LoosePrivileges SystemDevices BufferOverflow BackDoor FileServer EmailServer ApplicationServer Database Server

  16. Security Foundation Client Security + Critical System Protection • Think Of It As The “Security Foundation” • Managed From A Single, Integrated Operational Console Symantec Client Security Symantec Critical System Protection Cell Phone Laptop Desktop File Server Application Server Messaging Server Database Server

  17. Thank you

More Related