SlideShare a Scribd company logo
1 of 2
Download to read offline
Commercial in Confidence 1
Enterprise Security Services
Managed Anti-Virus Service
Managed risk of viruses and spyware across your organisation
Overview
As companies become increasingly dependent
upon information technology to conduct business
operations, it is imperative that they take steps to
protect these assets. If these systems and
networks are not properly secured and
managed, they can expose the organisation to
significant damage, including financial losses,
liability costs and erosion of customer
confidence.
One of the most common areas where
organisations experience this impact is at the
desktop and server levels with Viruses and
Spyware. In 2004 99% of business
experienced outbreaks of viruses (Source:
ICSA).
Total losses for organisations across the world in
2004 related to security were in excess of
USD$141 million. At number 1, USD$55
million, were virus infections. (Source: CSI/FBI)
During Jul to Dec 2004, 7360 new viruses and
worms were detected, an increase of 64% on
the previous 6 months, and a 300% increase over
the same period the previous year. (Source:
Symantec Internet Security Threat Report VII)
Unfortunately the time to detect and respond to
such outbreaks is greater than most organisations
can manage. Infections do occur and are
spreading quicker. Figure 1 highlights the time
to detect and respond has been reduced from
months to now minutes in recent times.
Figure 1 - Infection vs. response times
With Symantec’s Anti-Virus Service (SAS), your
organization can gain control of this business risk.
By combining Symantec people, process, and
technology, your business receives the assurance
it needs. With over 4,000 engagements
worldwide every year, Symantec understand the
issues customers face and the best method to
manage them.
Key Benefits
The key benefits to your organisation are:
Reduce operational costs – Lower cost than
companies can provide internally.
Reduce organisational down time –
Proactive management to reduce and eliminate
virus outbreaks.
All year round protection – 24 hours a day,
365 days a year the service monitors and
protects your business.
Guaranteed service – Backed by Symantec
Service Level Agreements (SLA).
Predictable cost model – Fixed fee per
month service based on the number of users
with no capital costs.
Complete visibility – With direct access to
management analysis and reporting tools,
clients can view status and important statistical
information from anywhere.
Key Features
Key features of the Symantec Compliance
Management service are:
Complete coverage – Coverage across all
your mobile, desktop and server environments.
Vendor independent – Manage Symantec,
heterogeneous, or other major vendor
products.
24 hour incident response capability –
The service is monitored on a 24 hour, 365
day basis with a team ready to respond and
manage issues.
Management Dashboard – A secure
management portal to view status of service.
Reporting – Regular reporting to
management on service metrics and security
statistics.
Service desk integration – Automatic
ticketing integration with Peregrine and
Remedy service desks.
Fixed contracts – Fixed price agreements
based on 3, 4 and 5 year periods.
Commercial in Confidence 2
Enterprise Security Services
Managed Anti-Virus Service
Managed risk of viruses and spyware across your organisation
Our Approach
As the approach is not product driven, Symantec
take a methodical process oriented approach to
ensure success. This involves:
An analysis of the customer’s current network
and internal processes.
Establishment of a transition plan for moving
to the new service.
Design, build, test and transition to the
service.
Perform reporting, maintenance, monitoring
and incident response services ongoing.
To achieving this in a cost effective manner,
Symantec:
Establishes automated processes and
capability through world leading technology.
Utilises the best industry experts to rapidly
and efficiently manage the service.
Symantec ensures this approach is globally
consistent and repeatable with a quality outcome
by:
Using Symantec tried and tested practices
integrated into your business processes.
Establishment of automated workflow to
manage programs of work.
Simply put, all year round Symantec utilise best of
breed technology, expert people and proven
processes to establish an integrated management
practice. This approach can be demonstrated by
Figure 2.
Figure 2 - Symantec's approach
Symantec establishes and maintains three
important activities around this service:
1. 24 by 7 monitoring and incident
response – Automated services track and
notify our incident response teams of potential
and actual issues.
2. On-demand management reporting –
Baseline and risk snap shot reporting for
operational and executive management.
3. Workflow management – Automated
remediation and activity tracking integrated
into major helpdesk ticketing systems (e.g.:
Peregrine, Remedy etc).
These activities are delivered by expert staff
trained and experienced in security risk
management to ensure relevance to your business.
About Symantec
Symantec is the global leader in information
security providing services designed to help mid-
sized businesses and large enterprises secure and
manage their IT infrastructure.
Symantec Australia Head Quarters
Riverside Corporate Park
Level 2, 1 Julius Avenue
North Ryde NSW 2113
More Information
Contact your local KAZ Account Manager for more
information or call:
New South Wales – (02) 8263 2900
Victoria – (03) 9236 6000
South Australia – (08) 8379 0466
Western Australia – (08) 9223 7900
Queensland – (07) 3887 2232
ACT – (02) 6247 7677

More Related Content

What's hot

ISO 270001 Management Clause - 6
ISO 270001 Management Clause - 6ISO 270001 Management Clause - 6
ISO 270001 Management Clause - 6Pooja Soni
 
Example of fisma compliance analysis.1
Example of fisma compliance analysis.1Example of fisma compliance analysis.1
Example of fisma compliance analysis.1Sal Velasco
 
Information Systems Security Review 2004
Information Systems Security Review 2004Information Systems Security Review 2004
Information Systems Security Review 2004Donald E. Hester
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity AuditEC-Council
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringTieu Luu
 
Information Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkInformation Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkWilliam McBorrough
 
Comparision of ISO with NIST and COBIT framework
Comparision of ISO with NIST and COBIT frameworkComparision of ISO with NIST and COBIT framework
Comparision of ISO with NIST and COBIT frameworkPooja Soni
 
Developing a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanDeveloping a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanTripwire
 
Its time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerIts time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerEnclaveSecurity
 
Broadening Your Cybersecurity Mindset
Broadening Your Cybersecurity MindsetBroadening Your Cybersecurity Mindset
Broadening Your Cybersecurity MindsetCSI Solutions
 
Integrated Risk Management
Integrated Risk ManagementIntegrated Risk Management
Integrated Risk ManagementOmicron Systems
 
Leveraging compliance to raise the bar on security
Leveraging compliance to raise the bar on securityLeveraging compliance to raise the bar on security
Leveraging compliance to raise the bar on securityMike Lemire
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practicesphanleson
 
Information Security Risk Management Overview
Information Security Risk Management OverviewInformation Security Risk Management Overview
Information Security Risk Management OverviewWesley Moore
 
Presentation on iso 27001-2013, Internal Auditing and BCM
Presentation on iso 27001-2013, Internal Auditing and BCMPresentation on iso 27001-2013, Internal Auditing and BCM
Presentation on iso 27001-2013, Internal Auditing and BCMShantanu Rai
 
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...iFour Consultancy
 
Automated incident response
Automated incident responseAutomated incident response
Automated incident responseSiemplify
 

What's hot (20)

ISO 270001 Management Clause - 6
ISO 270001 Management Clause - 6ISO 270001 Management Clause - 6
ISO 270001 Management Clause - 6
 
Example of fisma compliance analysis.1
Example of fisma compliance analysis.1Example of fisma compliance analysis.1
Example of fisma compliance analysis.1
 
Information Systems Security Review 2004
Information Systems Security Review 2004Information Systems Security Review 2004
Information Systems Security Review 2004
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity Audit
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous Monitoring
 
Information Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkInformation Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management Framework
 
Comparision of ISO with NIST and COBIT framework
Comparision of ISO with NIST and COBIT frameworkComparision of ISO with NIST and COBIT framework
Comparision of ISO with NIST and COBIT framework
 
IS audit checklist
IS audit checklistIS audit checklist
IS audit checklist
 
Developing a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanDeveloping a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action Plan
 
Its time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerIts time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primer
 
Broadening Your Cybersecurity Mindset
Broadening Your Cybersecurity MindsetBroadening Your Cybersecurity Mindset
Broadening Your Cybersecurity Mindset
 
Integrated Risk Management
Integrated Risk ManagementIntegrated Risk Management
Integrated Risk Management
 
Ch06 Policy
Ch06 PolicyCh06 Policy
Ch06 Policy
 
Leveraging compliance to raise the bar on security
Leveraging compliance to raise the bar on securityLeveraging compliance to raise the bar on security
Leveraging compliance to raise the bar on security
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practices
 
CISSPills #3.02
CISSPills #3.02CISSPills #3.02
CISSPills #3.02
 
Information Security Risk Management Overview
Information Security Risk Management OverviewInformation Security Risk Management Overview
Information Security Risk Management Overview
 
Presentation on iso 27001-2013, Internal Auditing and BCM
Presentation on iso 27001-2013, Internal Auditing and BCMPresentation on iso 27001-2013, Internal Auditing and BCM
Presentation on iso 27001-2013, Internal Auditing and BCM
 
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
 
Automated incident response
Automated incident responseAutomated incident response
Automated incident response
 

Viewers also liked

Londýn 2015
Londýn 2015Londýn 2015
Londýn 2015ZSLanzhot
 
EL VOLEI
EL VOLEIEL VOLEI
EL VOLEIESO1
 
架設Hadoop叢集以及mapreduce開發環境
架設Hadoop叢集以及mapreduce開發環境架設Hadoop叢集以及mapreduce開發環境
架設Hadoop叢集以及mapreduce開發環境Phate334
 
Ridha mekki l'expert
Ridha mekki   l'expertRidha mekki   l'expert
Ridha mekki l'expertSonia Charbti
 
Liberalism by lt hobhouse
Liberalism by lt hobhouseLiberalism by lt hobhouse
Liberalism by lt hobhouseTaxScout Inc.
 
Risking Other People’s Money: Experimental Evidence on Bonus Schemes, Competi...
Risking Other People’s Money: Experimental Evidence on Bonus Schemes, Competi...Risking Other People’s Money: Experimental Evidence on Bonus Schemes, Competi...
Risking Other People’s Money: Experimental Evidence on Bonus Schemes, Competi...Stockholm Institute of Transition Economics
 
Different Types of Drainage Pumps
Different Types of Drainage PumpsDifferent Types of Drainage Pumps
Different Types of Drainage PumpsWater tanks
 
Розв’язування квадратних рівнянь з параметрами
Розв’язування квадратних рівнянь з параметрамиРозв’язування квадратних рівнянь з параметрами
Розв’язування квадратних рівнянь з параметрами270479
 
Kallie's Coaching Philosophy
Kallie's Coaching PhilosophyKallie's Coaching Philosophy
Kallie's Coaching PhilosophyKallie Corbin
 
موقع ملزمتي - مراجعة دراسات للصف الأول الإعدادي الترم الثاني
موقع ملزمتي - مراجعة دراسات للصف الأول الإعدادي الترم الثانيموقع ملزمتي - مراجعة دراسات للصف الأول الإعدادي الترم الثاني
موقع ملزمتي - مراجعة دراسات للصف الأول الإعدادي الترم الثانيملزمتي
 
Aggregate Programming in Scala
Aggregate Programming in ScalaAggregate Programming in Scala
Aggregate Programming in ScalaRoberto Casadei
 

Viewers also liked (17)

What is Socialism
What is SocialismWhat is Socialism
What is Socialism
 
Londýn 2015
Londýn 2015Londýn 2015
Londýn 2015
 
EL VOLEI
EL VOLEIEL VOLEI
EL VOLEI
 
架設Hadoop叢集以及mapreduce開發環境
架設Hadoop叢集以及mapreduce開發環境架設Hadoop叢集以及mapreduce開發環境
架設Hadoop叢集以及mapreduce開發環境
 
Ridha mekki l'expert
Ridha mekki   l'expertRidha mekki   l'expert
Ridha mekki l'expert
 
Liberalism by lt hobhouse
Liberalism by lt hobhouseLiberalism by lt hobhouse
Liberalism by lt hobhouse
 
Mon amie
Mon amieMon amie
Mon amie
 
Risking Other People’s Money: Experimental Evidence on Bonus Schemes, Competi...
Risking Other People’s Money: Experimental Evidence on Bonus Schemes, Competi...Risking Other People’s Money: Experimental Evidence on Bonus Schemes, Competi...
Risking Other People’s Money: Experimental Evidence on Bonus Schemes, Competi...
 
Evaluation 6
Evaluation 6Evaluation 6
Evaluation 6
 
Different Types of Drainage Pumps
Different Types of Drainage PumpsDifferent Types of Drainage Pumps
Different Types of Drainage Pumps
 
Розв’язування квадратних рівнянь з параметрами
Розв’язування квадратних рівнянь з параметрамиРозв’язування квадратних рівнянь з параметрами
Розв’язування квадратних рівнянь з параметрами
 
Kallie's Coaching Philosophy
Kallie's Coaching PhilosophyKallie's Coaching Philosophy
Kallie's Coaching Philosophy
 
Türkiye Konut Piyasası Raporu 2015 - İGD İstanbul Gayrimenkul Değerleme
Türkiye Konut Piyasası Raporu 2015 - İGD İstanbul Gayrimenkul DeğerlemeTürkiye Konut Piyasası Raporu 2015 - İGD İstanbul Gayrimenkul Değerleme
Türkiye Konut Piyasası Raporu 2015 - İGD İstanbul Gayrimenkul Değerleme
 
موقع ملزمتي - مراجعة دراسات للصف الأول الإعدادي الترم الثاني
موقع ملزمتي - مراجعة دراسات للصف الأول الإعدادي الترم الثانيموقع ملزمتي - مراجعة دراسات للصف الأول الإعدادي الترم الثاني
موقع ملزمتي - مراجعة دراسات للصف الأول الإعدادي الترم الثاني
 
Abdul Wahab_CV
Abdul Wahab_CVAbdul Wahab_CV
Abdul Wahab_CV
 
Preview trend report_2016
Preview trend report_2016Preview trend report_2016
Preview trend report_2016
 
Aggregate Programming in Scala
Aggregate Programming in ScalaAggregate Programming in Scala
Aggregate Programming in Scala
 

Similar to Symantec Managed AV Service - KAZ

Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceEffectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceAlireza Ghahrood
 
Alignia for Business Security
Alignia for Business SecurityAlignia for Business Security
Alignia for Business SecurityLaurie LeBlanc
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Accounting_Whitepapers
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessAyham Kochaji
 
security-team-guide-reducing-operational-risk.pdf
security-team-guide-reducing-operational-risk.pdfsecurity-team-guide-reducing-operational-risk.pdf
security-team-guide-reducing-operational-risk.pdfgokuforhelp
 
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...cyberprosocial
 
Active security monitoring
Active security monitoringActive security monitoring
Active security monitoringPetra Divekyova
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
Power your businesswith risk informed decisions
Power your businesswith risk informed decisionsPower your businesswith risk informed decisions
Power your businesswith risk informed decisionsAlireza Ghahrood
 
Risk Management
Risk ManagementRisk Management
Risk Managementijtsrd
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016Ben Browning
 
NQA - Information security best practice guide
NQA - Information security best practice guideNQA - Information security best practice guide
NQA - Information security best practice guideNA Putra
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management WorkshopStacy Willis
 
MATH215 Introduction To Analysis.docx
MATH215 Introduction To Analysis.docxMATH215 Introduction To Analysis.docx
MATH215 Introduction To Analysis.docxstirlingvwriters
 
1973-16 Tackling the challenges of cyber security_19_03_15
1973-16 Tackling the challenges of cyber security_19_03_151973-16 Tackling the challenges of cyber security_19_03_15
1973-16 Tackling the challenges of cyber security_19_03_15shed59
 

Similar to Symantec Managed AV Service - KAZ (20)

Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceEffectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
 
Qatar Proposal
Qatar ProposalQatar Proposal
Qatar Proposal
 
Alignia for Business Security
Alignia for Business SecurityAlignia for Business Security
Alignia for Business Security
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 
security-team-guide-reducing-operational-risk.pdf
security-team-guide-reducing-operational-risk.pdfsecurity-team-guide-reducing-operational-risk.pdf
security-team-guide-reducing-operational-risk.pdf
 
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
 
CISO-Fundamentals
CISO-FundamentalsCISO-Fundamentals
CISO-Fundamentals
 
Active security monitoring
Active security monitoringActive security monitoring
Active security monitoring
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Power your businesswith risk informed decisions
Power your businesswith risk informed decisionsPower your businesswith risk informed decisions
Power your businesswith risk informed decisions
 
RAP GC 2016
RAP GC 2016RAP GC 2016
RAP GC 2016
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
 
NQA - Information security best practice guide
NQA - Information security best practice guideNQA - Information security best practice guide
NQA - Information security best practice guide
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
 
MATH215 Introduction To Analysis.docx
MATH215 Introduction To Analysis.docxMATH215 Introduction To Analysis.docx
MATH215 Introduction To Analysis.docx
 
1973-16 Tackling the challenges of cyber security_19_03_15
1973-16 Tackling the challenges of cyber security_19_03_151973-16 Tackling the challenges of cyber security_19_03_15
1973-16 Tackling the challenges of cyber security_19_03_15
 

Symantec Managed AV Service - KAZ

  • 1. Commercial in Confidence 1 Enterprise Security Services Managed Anti-Virus Service Managed risk of viruses and spyware across your organisation Overview As companies become increasingly dependent upon information technology to conduct business operations, it is imperative that they take steps to protect these assets. If these systems and networks are not properly secured and managed, they can expose the organisation to significant damage, including financial losses, liability costs and erosion of customer confidence. One of the most common areas where organisations experience this impact is at the desktop and server levels with Viruses and Spyware. In 2004 99% of business experienced outbreaks of viruses (Source: ICSA). Total losses for organisations across the world in 2004 related to security were in excess of USD$141 million. At number 1, USD$55 million, were virus infections. (Source: CSI/FBI) During Jul to Dec 2004, 7360 new viruses and worms were detected, an increase of 64% on the previous 6 months, and a 300% increase over the same period the previous year. (Source: Symantec Internet Security Threat Report VII) Unfortunately the time to detect and respond to such outbreaks is greater than most organisations can manage. Infections do occur and are spreading quicker. Figure 1 highlights the time to detect and respond has been reduced from months to now minutes in recent times. Figure 1 - Infection vs. response times With Symantec’s Anti-Virus Service (SAS), your organization can gain control of this business risk. By combining Symantec people, process, and technology, your business receives the assurance it needs. With over 4,000 engagements worldwide every year, Symantec understand the issues customers face and the best method to manage them. Key Benefits The key benefits to your organisation are: Reduce operational costs – Lower cost than companies can provide internally. Reduce organisational down time – Proactive management to reduce and eliminate virus outbreaks. All year round protection – 24 hours a day, 365 days a year the service monitors and protects your business. Guaranteed service – Backed by Symantec Service Level Agreements (SLA). Predictable cost model – Fixed fee per month service based on the number of users with no capital costs. Complete visibility – With direct access to management analysis and reporting tools, clients can view status and important statistical information from anywhere. Key Features Key features of the Symantec Compliance Management service are: Complete coverage – Coverage across all your mobile, desktop and server environments. Vendor independent – Manage Symantec, heterogeneous, or other major vendor products. 24 hour incident response capability – The service is monitored on a 24 hour, 365 day basis with a team ready to respond and manage issues. Management Dashboard – A secure management portal to view status of service. Reporting – Regular reporting to management on service metrics and security statistics. Service desk integration – Automatic ticketing integration with Peregrine and Remedy service desks. Fixed contracts – Fixed price agreements based on 3, 4 and 5 year periods.
  • 2. Commercial in Confidence 2 Enterprise Security Services Managed Anti-Virus Service Managed risk of viruses and spyware across your organisation Our Approach As the approach is not product driven, Symantec take a methodical process oriented approach to ensure success. This involves: An analysis of the customer’s current network and internal processes. Establishment of a transition plan for moving to the new service. Design, build, test and transition to the service. Perform reporting, maintenance, monitoring and incident response services ongoing. To achieving this in a cost effective manner, Symantec: Establishes automated processes and capability through world leading technology. Utilises the best industry experts to rapidly and efficiently manage the service. Symantec ensures this approach is globally consistent and repeatable with a quality outcome by: Using Symantec tried and tested practices integrated into your business processes. Establishment of automated workflow to manage programs of work. Simply put, all year round Symantec utilise best of breed technology, expert people and proven processes to establish an integrated management practice. This approach can be demonstrated by Figure 2. Figure 2 - Symantec's approach Symantec establishes and maintains three important activities around this service: 1. 24 by 7 monitoring and incident response – Automated services track and notify our incident response teams of potential and actual issues. 2. On-demand management reporting – Baseline and risk snap shot reporting for operational and executive management. 3. Workflow management – Automated remediation and activity tracking integrated into major helpdesk ticketing systems (e.g.: Peregrine, Remedy etc). These activities are delivered by expert staff trained and experienced in security risk management to ensure relevance to your business. About Symantec Symantec is the global leader in information security providing services designed to help mid- sized businesses and large enterprises secure and manage their IT infrastructure. Symantec Australia Head Quarters Riverside Corporate Park Level 2, 1 Julius Avenue North Ryde NSW 2113 More Information Contact your local KAZ Account Manager for more information or call: New South Wales – (02) 8263 2900 Victoria – (03) 9236 6000 South Australia – (08) 8379 0466 Western Australia – (08) 9223 7900 Queensland – (07) 3887 2232 ACT – (02) 6247 7677