SlideShare une entreprise Scribd logo
1  sur  30
SYMANTEC ENDPOINT
PROTECTION ADMINISTRATION
1
MODULE 1: INTRODUCTION
2
INTRODUCTION TO SYMANTEC ENDPOINT
PROTECTION
Symantec Endpoint Protection is a client-server solution that protects
laptops, desktops, Windows and Mac computers, and servers in your
network against malware.
Symantec Endpoint Protection combines virus protection with advanced
threat protection to proactively secure your computers against known
and unknown threats.

3
TYPES OF PROTECTION
Virus and Spyware Protection
Network Threat Protection
Proactive Threat Protection

4
VIRUS AND SPYWARE PROTECTION
Virus and Spyware Protection protects computers from viruses and
security risks, and in many cases can repair their side effects.
The protection includes real-time scanning of files and email as well as
scheduled scans and on-demand scans.

5
VIRUS AND SPYWARE PROTECTION

6
NETWORK THREAT PROTECTION
Network Threat Protection provides a firewall and an intrusion
prevention system to prevent intrusion attacks and malicious content
from reaching the computer that runs the client software.

7
NETWORK THREAT PROTECTION
Internet

Company
Networks

8
PROACTIVE THREAT PROTECTION
Proactive Threat Protection uses SONAR to protect against zero-day
attack vulnerabilities in your network.
Zero-day attack vulnerabilities are the new vulnerabilities that are not
yet publicly known.

9
THREAT LANDSCAPE IS EVOLVING
Percentage of Top 50 Malicious Code

10
THREAT LANDSCAPE IS EVOLVING
Number of Zero Day threats

11
CAUSES OF SENSITIVE DATA LOSS
Cause of Data Losses by Number of Events

Internet Threats,
Attacks and Hacks

Violations of Policies

User Errors

0%

10%

20%

30%

40%

50%

ITPolicyCompliance.com
“Taking Action to Protect Sensitive Data”, Feb. 2007

12
ADDRESSING IT RISKS &
ENABLING IT PERFORMANCE

Interactions

Manage
IT Risk

Information

Maximize
IT Performance

Infrastructure

13
13
SYMANTEC ENTERPRISE SOLUTIONS:
A POWERFUL COMBINATION OF PRODUCT & SERVICES

INFORMATION
MANAGEMENT

IT COMPLIANCE

SECURITY

Manage
IT Risk

STORAGE

Maximize
IT Performance

IT OPERATIONS

BUSINESS CONTINUITY
14
SYMANTEC ENDPOINT PROTECTION IN A
NUTSHELL
•

AntiVirus

Restricts access to registry, files, folders, and processes
Behavior-based Intrusion prevention (Whole Security)

•

Network traffic inspection adds vulnerability-based
protection
Industry’s best managed desktop firewall

•

Adaptive policies lead the pack for location awareness

•

Sygate and Symantec Client Security
Best anti-spyware, leading the pack in rootkit detection
and removal

•

Includes VxMS scanning technology (Veritas)

•

Antispyware

•

•

Firewall

Device control to prevent data leakage at the endpoint
(Sygate)

•

Intrusion
Prevention

Adds endpoint compliance to endpoint protection

•

Device and Application
Control

•
•

Network Access
Control

Includes a NAC agent to ensure each endpoint is “NACready” (Sygate)

The World’s leading anti-virus solution

•

More consecutive Virus Bulletin certifications (31) than
any vendor

15
INGREDIENTS FOR ENDPOINT
PROTECTION AntiVirus
• World’s leading AV solution
• Most (32) consecutive VB100 Awards

AntiVirus

16
INGREDIENTS FOR ENDPOINT
PROTECTION Antispyware
• Best rootkit detection and removal
• Raw Disk Scan for superior Rootkit protection

Antispyware

AntiVirus
Source: Thompson Cyber Security Labs, August 2006

17
INGREDIENTS FOR ENDPOINT
PROTECTION Firewall
• Industry leading endpoint firewall technology
• Gartner MQ “Leader” – 4 consecutive years
• Rules based FW can dynamically adjust port
settings to block threats from spreading

Firewall

Antispyware

AntiVirus

18
INGREDIENTS FOR ENDPOINT PROTECTION
Intrusion Prevention

• Most Comprehensive IPS capabilities in the industry
• Generic Exploit Blocking (GEB) – one
signature to proactively protect against all
variants
Intrusion
Prevention

• Proactive Threat Scan –

Firewall

Detects 1,000 threats/month
not detected by top 4 leading
antivirus engines

Antispyware

• Very low false positive rate (0.004%)
• Only 40 FP for every 1M computers

Antivirus

• No set up or configuration required
19

19
INTRUSION PREVENTION SYSTEM (IPS)
COMBINED TECHNOLOGIES OFFER BEST DEFENSE

Intrusion
Prevention
(IPS)

(N)IPS
Network IPS

(H)IPS
Host IPS

Generic Exploit Blocking

Vulnerability-based
(Sigs for vulnerability)

Deep packet inspection

Signature–based
(Can create custom
sigs, SNORT-like)

Proactive Threat Scan
Application Control

Behavior-based
(Whole Security)
Rules-based
(System lockdown by
controlling an
application’s ability to
read, write, execute and
network connections)

=Services Opportunity
20
INGREDIENTS FOR ENDPOINT
PROTECTION Device Control
• Prevents data leakage
Device Control

• Restrict Access to devices (USB keys, Backup drives)
• W32.SillyFDC (May 2007)

Intrusion
Prevention

Firewall

Antispyware

AntiVirus

=Services Opportunity
21
INGREDIENT FOR ENDPOINT COMPLIANCE
Network Access Control
Network Access
Control

• Network access control – ready
Device Control

• Agent is included, no extra agent deployment
• Simply license SNAC Server

Intrusion
Prevention

Firewall

Antispyware

AntiVirus

22
SYMANTEC NETWORK ACCESS CONTROL
Ensures endpoints are protected and compliant prior to
accessing network resources
1.

Reduce IT costs & greater network availability

2.

Increased control over unmanaged and managed
endpoints

3.

Maximize investment of security technologies

23
INTRODUCING:
SINGLE AGENT, SINGLE CONSOLE
Network Access
Control

Results:
Device Control
Increased
Protection, Control &
Manageability

Intrusion
Prevention

Firewall
Reduced
Cost, Complexity &
Risk Exposure
Antispyware

Symantec Endpoint
Protection 12.0

Symantec Network
Access Control 11.0

AntiVirus

24

24
HOW DO WE LOWER COST, COMPLEXITY AND RISK?
Cost
 Lowered system resource demands, smaller
footprint
 Single product, license, support program
 Operational efficiency

Product

Baseline
Memory Usage

Symantec AntiVirus Corporate Edition

62 MB

Complexity

Symantec Client Security

129 MB

 Fewer consoles and agents allows
standardization of technologies
 Improved UI suits any size organization

Symantec AntiVirus +
Symantec Sygate Enterprise Protection

72 MB

McAfee Total Protection SMB

71 MB

Trend Micro OfficeScan Client Server

50 MB

Risk
 Includes behavior-based IPS to protect
against unknown attacks
 Device control helps protect against data loss
and intellectual
property theft

Symantec Endpoint
Protection 12.0

21 MB!
????

Average of 84% reduction in memory usage requirements
25

25
SYMANTEC ANTIVIRUS EXTENDED
LICENSING
Symantec
Endpoint
Protection

Symantec
Endpoint
Protection Small
Business Edition

Symantec
Multi-tier
Protection

Antivirus

X

X

X

Antispyware

X

X

X

Desktop Firewall

X

X

X

Intrusion Prevention

X

X

X

Device Control

X

X

X

X

X

MS Exchange

MS Exchange/Domino/SMTP
Gateway

Mail Security

Antivirus for Mac and
Linux

X

26
SNAC PACKAGING
Enforcement Type

Agent Type

Endpoint

Gateway

DHCP

(Uses SEP Desktop
Firewall)

(Appliance)

(Appliance/Plug-in) (Appliance)

LAN-802.1x

Client
(Persistent)

On-Demand
(Dissolvable)

Agentless
(Scanner)

Symantec
Network
Access
Control
v11.0

PPP P P P P

Symantec
Network
Access
Control
Starter Edition
V 11.0

PP

P
27
COMPONENTS OF SYMANTEC ENDPOINT
PROTECTION
Symantec Endpoint Protection
Manager

Database

Symantec Protection Center (optional)
LiveUpdate Administrator (optional)
Central Quarantine (optional)

Symantec Endpoint Protection client

28
REQUIREMENTS FOR SYMANTEC ENDPOINT
PROTECTION MANAGER

29
REQUIREMENTS FOR SYMANTEC
ENDPOINT PROTECTION CLIENT

30

Contenu connexe

Tendances

Apresentação fortinet
Apresentação fortinetApresentação fortinet
Apresentação fortinetinternetbrasil
 
NIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - MindmapNIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - MindmapWAJAHAT IQBAL
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleDavid Fuchs
 
Zero-Day Vulnerability and Heuristic Analysis
Zero-Day Vulnerability and Heuristic AnalysisZero-Day Vulnerability and Heuristic Analysis
Zero-Day Vulnerability and Heuristic AnalysisAhmed Banafa
 
Got SIEM? Now what? Getting SIEM Work For You
Got SIEM? Now what? Getting SIEM Work For YouGot SIEM? Now what? Getting SIEM Work For You
Got SIEM? Now what? Getting SIEM Work For YouAnton Chuvakin
 
Security posture: Dashboard Implementation through Wireframe
Security posture: Dashboard Implementation through WireframeSecurity posture: Dashboard Implementation through Wireframe
Security posture: Dashboard Implementation through WireframeShriya Rai
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
Firewall Monitoring 1.1 Security Use Case Guide
Firewall Monitoring 1.1 Security Use Case Guide	Firewall Monitoring 1.1 Security Use Case Guide
Firewall Monitoring 1.1 Security Use Case Guide Protect724manoj
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slidesrahul kundu
 
Security Awareness & Training
Security Awareness & TrainingSecurity Awareness & Training
Security Awareness & Trainingnovemberchild
 
Fortinet security fabric
Fortinet security fabricFortinet security fabric
Fortinet security fabricANSItunCERT
 
Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organizationTejas Wasule
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...Dsunte Wilson
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM AlienVault
 

Tendances (20)

Apresentação fortinet
Apresentação fortinetApresentação fortinet
Apresentação fortinet
 
Endpoint Security
Endpoint SecurityEndpoint Security
Endpoint Security
 
NIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - MindmapNIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - Mindmap
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
Zero-Day Vulnerability and Heuristic Analysis
Zero-Day Vulnerability and Heuristic AnalysisZero-Day Vulnerability and Heuristic Analysis
Zero-Day Vulnerability and Heuristic Analysis
 
Got SIEM? Now what? Getting SIEM Work For You
Got SIEM? Now what? Getting SIEM Work For YouGot SIEM? Now what? Getting SIEM Work For You
Got SIEM? Now what? Getting SIEM Work For You
 
Backdoor
BackdoorBackdoor
Backdoor
 
Security posture: Dashboard Implementation through Wireframe
Security posture: Dashboard Implementation through WireframeSecurity posture: Dashboard Implementation through Wireframe
Security posture: Dashboard Implementation through Wireframe
 
OSSIM Overview
OSSIM OverviewOSSIM Overview
OSSIM Overview
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
Firewall Monitoring 1.1 Security Use Case Guide
Firewall Monitoring 1.1 Security Use Case Guide	Firewall Monitoring 1.1 Security Use Case Guide
Firewall Monitoring 1.1 Security Use Case Guide
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Security Awareness & Training
Security Awareness & TrainingSecurity Awareness & Training
Security Awareness & Training
 
Fortinet security fabric
Fortinet security fabricFortinet security fabric
Fortinet security fabric
 
Fortinet sandboxing
Fortinet sandboxingFortinet sandboxing
Fortinet sandboxing
 
Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organization
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM
 

En vedette

CCNA Access Lists Questions
CCNA Access Lists QuestionsCCNA Access Lists Questions
CCNA Access Lists QuestionsDsunte Wilson
 
Technical interview questions -networking
Technical interview questions -networkingTechnical interview questions -networking
Technical interview questions -networkingrafiq123
 
CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP QuestionsDsunte Wilson
 
How to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guideHow to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guideIT Tech
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsDsunte Wilson
 
Computer services
Computer servicesComputer services
Computer servicesArz Sy
 
Packet Tracer 101 course
Packet Tracer 101 coursePacket Tracer 101 course
Packet Tracer 101 courseKenan Spahi
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Dsunte Wilson
 
Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers Sarmad Ali
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction Dsunte Wilson
 

En vedette (15)

CCNA Access Lists Questions
CCNA Access Lists QuestionsCCNA Access Lists Questions
CCNA Access Lists Questions
 
Technical interview questions -networking
Technical interview questions -networkingTechnical interview questions -networking
Technical interview questions -networking
 
CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP Questions
 
How to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guideHow to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guide
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks Questions
 
Computer services
Computer servicesComputer services
Computer services
 
Packet Tracer 101 course
Packet Tracer 101 coursePacket Tracer 101 course
Packet Tracer 101 course
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6
 
Ccna complete notes
Ccna complete notesCcna complete notes
Ccna complete notes
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
Cisco CCNA module 2
Cisco CCNA module 2Cisco CCNA module 2
Cisco CCNA module 2
 
CCNA CheatSheet
CCNA CheatSheetCCNA CheatSheet
CCNA CheatSheet
 
Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers
 
Cisco CCNA module 10
Cisco CCNA module 10Cisco CCNA module 10
Cisco CCNA module 10
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction
 

Similaire à SYMANTEC ENDPOINT PROTECTION Administration Introduction

Prueba de Presentacion
Prueba de PresentacionPrueba de Presentacion
Prueba de Presentacionrubychavez
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint SecurityBurak DAYIOGLU
 
B sep ds-21194634.en-us
B sep ds-21194634.en-usB sep ds-21194634.en-us
B sep ds-21194634.en-usPelos TCHIKAYA
 
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationTrend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationGraeme Wood
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfMdZabedHossain2
 
Outpost networksecurity
Outpost networksecurityOutpost networksecurity
Outpost networksecurityehsangha
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...Savvius, Inc
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 Cyd Isaak Francisco
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver NarrTI Safe
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?William hendric
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfANJUMOHANANU
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentationlaonap166
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate BrochureQualys
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdfMetaorange
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptxMetaorange
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportDell EMC World
 

Similaire à SYMANTEC ENDPOINT PROTECTION Administration Introduction (20)

Prueba de Presentacion
Prueba de PresentacionPrueba de Presentacion
Prueba de Presentacion
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
Bezpečnost není jen antivirus
Bezpečnost není jen antivirusBezpečnost není jen antivirus
Bezpečnost není jen antivirus
 
B sep ds-21194634.en-us
B sep ds-21194634.en-usB sep ds-21194634.en-us
B sep ds-21194634.en-us
 
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationTrend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
 
Symantec Endpoint Suite
Symantec Endpoint SuiteSymantec Endpoint Suite
Symantec Endpoint Suite
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
Outpost networksecurity
Outpost networksecurityOutpost networksecurity
Outpost networksecurity
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
nsx overview with use cases 1.0
nsx overview with use cases 1.0nsx overview with use cases 1.0
nsx overview with use cases 1.0
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint Protection
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 

Plus de Dsunte Wilson

Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primaveraDsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterDsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementDsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingDsunte Wilson
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced SwitchingDsunte Wilson
 
CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsDsunte Wilson
 
CCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsCCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsDsunte Wilson
 
CCNA Network Services Questions
CCNA Network Services QuestionsCCNA Network Services Questions
CCNA Network Services QuestionsDsunte Wilson
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame RelayDsunte Wilson
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network ServicesDsunte Wilson
 
CCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols QuestionsCCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols QuestionsDsunte Wilson
 
CCNA Routing Protocols Questions
CCNA Routing Protocols QuestionsCCNA Routing Protocols Questions
CCNA Routing Protocols QuestionsDsunte Wilson
 
CCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration QuestionsCCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration QuestionsDsunte Wilson
 
CCNA Router and IOS Basics Questions
CCNA Router and IOS Basics QuestionsCCNA Router and IOS Basics Questions
CCNA Router and IOS Basics QuestionsDsunte Wilson
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsDsunte Wilson
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing ProtocolsDsunte Wilson
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationDsunte Wilson
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS BasicsDsunte Wilson
 

Plus de Dsunte Wilson (20)

Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primavera
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
 
CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration Questions
 
CCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsCCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay Questions
 
CCNA Network Services Questions
CCNA Network Services QuestionsCCNA Network Services Questions
CCNA Network Services Questions
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame Relay
 
CCNA Access Lists
CCNA Access ListsCCNA Access Lists
CCNA Access Lists
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network Services
 
CCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols QuestionsCCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols Questions
 
CCNA Routing Protocols Questions
CCNA Routing Protocols QuestionsCCNA Routing Protocols Questions
CCNA Routing Protocols Questions
 
CCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration QuestionsCCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration Questions
 
CCNA Router and IOS Basics Questions
CCNA Router and IOS Basics QuestionsCCNA Router and IOS Basics Questions
CCNA Router and IOS Basics Questions
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and Configuration
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS Basics
 

Dernier

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Dernier (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

SYMANTEC ENDPOINT PROTECTION Administration Introduction

  • 3. INTRODUCTION TO SYMANTEC ENDPOINT PROTECTION Symantec Endpoint Protection is a client-server solution that protects laptops, desktops, Windows and Mac computers, and servers in your network against malware. Symantec Endpoint Protection combines virus protection with advanced threat protection to proactively secure your computers against known and unknown threats. 3
  • 4. TYPES OF PROTECTION Virus and Spyware Protection Network Threat Protection Proactive Threat Protection 4
  • 5. VIRUS AND SPYWARE PROTECTION Virus and Spyware Protection protects computers from viruses and security risks, and in many cases can repair their side effects. The protection includes real-time scanning of files and email as well as scheduled scans and on-demand scans. 5
  • 6. VIRUS AND SPYWARE PROTECTION 6
  • 7. NETWORK THREAT PROTECTION Network Threat Protection provides a firewall and an intrusion prevention system to prevent intrusion attacks and malicious content from reaching the computer that runs the client software. 7
  • 9. PROACTIVE THREAT PROTECTION Proactive Threat Protection uses SONAR to protect against zero-day attack vulnerabilities in your network. Zero-day attack vulnerabilities are the new vulnerabilities that are not yet publicly known. 9
  • 10. THREAT LANDSCAPE IS EVOLVING Percentage of Top 50 Malicious Code 10
  • 11. THREAT LANDSCAPE IS EVOLVING Number of Zero Day threats 11
  • 12. CAUSES OF SENSITIVE DATA LOSS Cause of Data Losses by Number of Events Internet Threats, Attacks and Hacks Violations of Policies User Errors 0% 10% 20% 30% 40% 50% ITPolicyCompliance.com “Taking Action to Protect Sensitive Data”, Feb. 2007 12
  • 13. ADDRESSING IT RISKS & ENABLING IT PERFORMANCE Interactions Manage IT Risk Information Maximize IT Performance Infrastructure 13 13
  • 14. SYMANTEC ENTERPRISE SOLUTIONS: A POWERFUL COMBINATION OF PRODUCT & SERVICES INFORMATION MANAGEMENT IT COMPLIANCE SECURITY Manage IT Risk STORAGE Maximize IT Performance IT OPERATIONS BUSINESS CONTINUITY 14
  • 15. SYMANTEC ENDPOINT PROTECTION IN A NUTSHELL • AntiVirus Restricts access to registry, files, folders, and processes Behavior-based Intrusion prevention (Whole Security) • Network traffic inspection adds vulnerability-based protection Industry’s best managed desktop firewall • Adaptive policies lead the pack for location awareness • Sygate and Symantec Client Security Best anti-spyware, leading the pack in rootkit detection and removal • Includes VxMS scanning technology (Veritas) • Antispyware • • Firewall Device control to prevent data leakage at the endpoint (Sygate) • Intrusion Prevention Adds endpoint compliance to endpoint protection • Device and Application Control • • Network Access Control Includes a NAC agent to ensure each endpoint is “NACready” (Sygate) The World’s leading anti-virus solution • More consecutive Virus Bulletin certifications (31) than any vendor 15
  • 16. INGREDIENTS FOR ENDPOINT PROTECTION AntiVirus • World’s leading AV solution • Most (32) consecutive VB100 Awards AntiVirus 16
  • 17. INGREDIENTS FOR ENDPOINT PROTECTION Antispyware • Best rootkit detection and removal • Raw Disk Scan for superior Rootkit protection Antispyware AntiVirus Source: Thompson Cyber Security Labs, August 2006 17
  • 18. INGREDIENTS FOR ENDPOINT PROTECTION Firewall • Industry leading endpoint firewall technology • Gartner MQ “Leader” – 4 consecutive years • Rules based FW can dynamically adjust port settings to block threats from spreading Firewall Antispyware AntiVirus 18
  • 19. INGREDIENTS FOR ENDPOINT PROTECTION Intrusion Prevention • Most Comprehensive IPS capabilities in the industry • Generic Exploit Blocking (GEB) – one signature to proactively protect against all variants Intrusion Prevention • Proactive Threat Scan – Firewall Detects 1,000 threats/month not detected by top 4 leading antivirus engines Antispyware • Very low false positive rate (0.004%) • Only 40 FP for every 1M computers Antivirus • No set up or configuration required 19 19
  • 20. INTRUSION PREVENTION SYSTEM (IPS) COMBINED TECHNOLOGIES OFFER BEST DEFENSE Intrusion Prevention (IPS) (N)IPS Network IPS (H)IPS Host IPS Generic Exploit Blocking Vulnerability-based (Sigs for vulnerability) Deep packet inspection Signature–based (Can create custom sigs, SNORT-like) Proactive Threat Scan Application Control Behavior-based (Whole Security) Rules-based (System lockdown by controlling an application’s ability to read, write, execute and network connections) =Services Opportunity 20
  • 21. INGREDIENTS FOR ENDPOINT PROTECTION Device Control • Prevents data leakage Device Control • Restrict Access to devices (USB keys, Backup drives) • W32.SillyFDC (May 2007) Intrusion Prevention Firewall Antispyware AntiVirus =Services Opportunity 21
  • 22. INGREDIENT FOR ENDPOINT COMPLIANCE Network Access Control Network Access Control • Network access control – ready Device Control • Agent is included, no extra agent deployment • Simply license SNAC Server Intrusion Prevention Firewall Antispyware AntiVirus 22
  • 23. SYMANTEC NETWORK ACCESS CONTROL Ensures endpoints are protected and compliant prior to accessing network resources 1. Reduce IT costs & greater network availability 2. Increased control over unmanaged and managed endpoints 3. Maximize investment of security technologies 23
  • 24. INTRODUCING: SINGLE AGENT, SINGLE CONSOLE Network Access Control Results: Device Control Increased Protection, Control & Manageability Intrusion Prevention Firewall Reduced Cost, Complexity & Risk Exposure Antispyware Symantec Endpoint Protection 12.0 Symantec Network Access Control 11.0 AntiVirus 24 24
  • 25. HOW DO WE LOWER COST, COMPLEXITY AND RISK? Cost  Lowered system resource demands, smaller footprint  Single product, license, support program  Operational efficiency Product Baseline Memory Usage Symantec AntiVirus Corporate Edition 62 MB Complexity Symantec Client Security 129 MB  Fewer consoles and agents allows standardization of technologies  Improved UI suits any size organization Symantec AntiVirus + Symantec Sygate Enterprise Protection 72 MB McAfee Total Protection SMB 71 MB Trend Micro OfficeScan Client Server 50 MB Risk  Includes behavior-based IPS to protect against unknown attacks  Device control helps protect against data loss and intellectual property theft Symantec Endpoint Protection 12.0 21 MB! ???? Average of 84% reduction in memory usage requirements 25 25
  • 26. SYMANTEC ANTIVIRUS EXTENDED LICENSING Symantec Endpoint Protection Symantec Endpoint Protection Small Business Edition Symantec Multi-tier Protection Antivirus X X X Antispyware X X X Desktop Firewall X X X Intrusion Prevention X X X Device Control X X X X X MS Exchange MS Exchange/Domino/SMTP Gateway Mail Security Antivirus for Mac and Linux X 26
  • 27. SNAC PACKAGING Enforcement Type Agent Type Endpoint Gateway DHCP (Uses SEP Desktop Firewall) (Appliance) (Appliance/Plug-in) (Appliance) LAN-802.1x Client (Persistent) On-Demand (Dissolvable) Agentless (Scanner) Symantec Network Access Control v11.0 PPP P P P P Symantec Network Access Control Starter Edition V 11.0 PP P 27
  • 28. COMPONENTS OF SYMANTEC ENDPOINT PROTECTION Symantec Endpoint Protection Manager Database Symantec Protection Center (optional) LiveUpdate Administrator (optional) Central Quarantine (optional) Symantec Endpoint Protection client 28
  • 29. REQUIREMENTS FOR SYMANTEC ENDPOINT PROTECTION MANAGER 29
  • 30. REQUIREMENTS FOR SYMANTEC ENDPOINT PROTECTION CLIENT 30

Notes de l'éditeur

  1. Symantec Endpoint Protection protects against malware such as viruses, worms, Trojan horses, spyware, and adware. It provides protection against even the most sophisticated attacks that evade traditional security measures, such as rootkits, zero-day attacks, and spyware that mutates. Providing low maintenance and high power, Symantec Endpoint Protection communicates over your network to automatically safeguard for both physical systems and virtual systems against attacks.
  2. Virus and spyware scans detect viruses and the security risks that can put a computer, as well as a network, at risk. Security risks include spyware, adware, and other malicious files.
  3. Virus and Spyware Protection detects new threats earlier and more accurately using not just signature-based and behavioral-based solutions, but other technologies as well. Symantec Insight provides faster and more accurate malware detection to find the new and the unknown threats that other approaches miss. Insight identifies new and zero-day threats by using the collective wisdom of millions of systems in hundreds of countries.Bloodhound uses heuristics to detect known and unknown threats.Auto-Protect scans files from a signature list as they are read from or written to the client computer.
  4. The firewall allows or blocks network traffic based on the various criteria that the administrator sets. If the administrator permits it, end users can also configure firewall policies. The Intrusion Prevention System (IPS) analyzes all the incoming and the outgoing information for the data patterns that are typical of an attack. It detects and blocks malicious traffic and attempts by outside users to attack the client computer. Intrusion prevention also monitors outbound traffic and prevents the spread of worms.
  5. The rules-based firewall engine blocks malicious threats before they can harm the computer. The IPS scans network traffic and files for indications of intrusions or attempted intrusions.Browser Intrusion Prevention scans for the attacks that are directed at browser vulnerabilities.Universal download protection monitors all downloads from browsers and validates that the downloads are not malware.
  6. Threats that exploit these vulnerabilities can evade signature-based detection, such as spyware definitions. Zero-day attacks may be used in targeted attacks and in the propagation of malicious code. SONAR provides real-time behavioral protection by monitoring processes and threats as they execute. Application and Device Control monitors and controls the behavior of applications on client computers and manages the hardware devices that access client computers.
  7. Symantec Endpoint Protection Manager system requirementsComponent RequirementsProcessor■ 32-bit processor: 1-GHz Intel Pentium III or equivalent minimum(Intel Pentium 4 or equivalent recommended)■ 64-bit processor: 2-GHz Pentium 4 with x86-64 support orequivalent minimumNote: Intel Itanium IA-64 processors are not supported.Physical RAM1 GB of RAM for 32-bit operating systems, 2 GB of RAM for 64-bitoperating systems, or higher if required by the operating systemHard drive 4 GB ormore free space; plus 4 GB for the locally installed database.Display 1024 x 768Operating system■ Windows XP (32-bit, SP2 or later; 64-bit, all SPs; all editions exceptHome)■ Windows 7 (32-bit, 64-bit;RTMand SP1; all editions except Home)■ Windows 8 (32-bit, 64-bit)■ Windows Server 2003 (32-bit, 64-bit, R2, SP1 or later)■ Windows Server 2008 (32-bit, 64-bit, R2, RTM, SP1 and SP2)■ Windows Server 2012■ Windows Small Business Server 2003 (32-bit)■ Windows Small Business Server 2008 (64-bit)■ Windows Small Business Server 2011 (64-bit)■ Windows Essential Business Server 2008 (64-bit)Browser■ Microsoft Internet Explorer 7, 8, 9, 10■ Mozilla Firefox■ Google Chrome
  8. Processor■ 32-bit processor for Windows: 1-GHz Intel Pentium III orequivalent minimum (Intel Pentium 4 or equivalentrecommended)■ 32-bit processor for Mac: Intel Core Solo, Intel Core Duo. PowerPCprocessors are not supported.■ 64-bit processor for Windows: 2-GHz Pentium 4 with x86-64support or equivalent minimum. Itanium processors are notsupported.■ 64-bit processor for Mac: Intel Core 2 Duo, Intel Quad-Core XeonPhysical RAMWindows: 512MBofRAM(1GBrecommended), or higher if requiredby the operating systemMac: 1 GB of RAM for 10.6; 2 GB for 10.7 and 10.8Hard driveWindows: 850 MB of available hard disk space for the installation;additional space is required for content and logsNote: Space requirements are based on NTFS file systems.Mac: 500 MB of available hard disk space for the installationDisplay 800 x 600