- Symantec Corporate Overview
- Solution Portfolio of Symantec
- Symantec Endpoint Protection - Introduction
- Symantec Endpoint Protection - Features
- Symantec Endpoint Protection - Architecture & Design
- Symantec Endpoint Protection - System Requi...
The presentation provides the following:
- Symantec Corporate Overview
- Solution Portfolio of Symantec
- Symantec Endpoint Protection - Introduction
- Symantec Endpoint Protection - Features
- Symantec Endpoint Protection - Architecture & Design
- Symantec Endpoint Protection - System Requirements
- Symantec Endpoint Protection - Licensing & Packaging
This provides a brief overview of Symantec Endpoint Protection (SEP). Please note all the information is based prior to February 2016 and the full integration of Blue Coat Systems's set of solutions.
Size: 1.85 MB
Language: en
Added: Feb 02, 2018
Slides: 23 pages
Slide Content
SYMANTEC: SOLUTION OVERVIEW SERIES Symantec Endpoint Protection Iftikhar Ali Iqbal https://www.linkedin.com/in/iftikhariqbal/ Valid till Feb 2016
Agenda Company Overview 1 Solution Portfolio 2 Features, Architecture, Design and Licensing 4 SYMANTEC: Endpoint Protection Look and Feel 5 Symantec Endpoint Protection 3
OVERVIEW: SYMANTEC Founded in 1982 Headquartered in California, United States Fortune 500 company Provides Software and Services Focus is on Consumer Security and Enterprise Security 2014 Revenue: $6.7 billion (ended March 28, 2014) Information Security: $4.2 billion 2014 Market Share: Largest security software vendor by revenue and market share (17.2%) ( Gartner ) - http://www.gartner.com/newsroom/id/3062017 SYMANTEC: Endpoint Protection
OVERVIEW: THE SPLIT On 1 st October 2015, Symantec’s Information Management business now operates as a separate privately held company Veritas Technologies Corporation Solutions: Backup and Recovery Archiving High-Availability Disaster Recovery Separate operations, partner programs, support, etc. SYMANTEC: Endpoint Protection
OVERVIEW: AREAS OF FOCUS Solutions to Protect against: Malware and Spam Advanced Persistent Threats and Cyber Attacks Identity Theft and Loss of Confidential Information Solutions to Manage: Governance, Risk and Compliance Client, Asset, Server and Mobility Services: Product Support Cyber Security Education SYMANTEC: Endpoint Protection
SYMANTEC: PORTFOLIO SYMANTEC: Endpoint Protection
PORTFOLIO: NUTSHELL Cyber Security Services Monitoring , Incident Response, Simulation, Adversary Threat Intelligence Threat Protection ENDPOINTS DATA CENTER GATEWAY Threat Prevention, Detection, Forensics & Resolution Device, Email, Server, Virtual & Cloud Workloads Available On-premise and Cloud Unified Security Analytics Platform Big data security analytics; available to customers in self-service mode Telemetry Incident Management Protection Engines Global Intelligence Threat Analytics Information Protection DATA ACCESS Identity and Data Loss Protection Cloud-based Key Management Cloud Security Broker Users Data Apps Cloud Devices Network Data Center SYMANTEC: Endpoint Protection
SYMANTEC: Endpoint Protection SYMANTEC: ENDPOINT PROTECTION Introduction and Features
ENDPOINT PROTECTION: INTRODUCTION SYMANTEC: Endpoint Protection Pre-execution detection of new and evolving threats INCURSION INFESTATION and EXFILTRATION INFECTION ANTIVIRUS NETWORK FIREWALL & INTRUSION PREVENTION APPLICATION AND DEVICE CONTROL BEHAVIOR MONITORING MEMORY EXPLOIT MITIGATION REPUTATION ANALYSIS ADVANCED MACHINE LEARNING EMULATOR Patented real-time cloud lookup for scanning of suspicious files NETWORK FIREWALL & INTRUSION PREVENTION Scans and eradicates malware that arrives on a system Blocks malware before it spreads to your machine and controls traffic Determines safety of files and websites using the wisdom of the community Monitors and blocks files that exhibit suspicious behaviors Blocks zero-day exploits against vulnerabilities in popular software Control file, registry, and device access and behavior; whitelisting, blacklisting, etc. Virtual machine detects malware hidden using custom packers Blocks malware before it spreads to your machine and controls traffic Protects laptops, desktops, and servers in your network against malware, risks, and vulnerabilities. Safeguard both physical systems and virtual systems against attacks. Integration with Symantec Advanced Threat Protection: Endpoint (ATP: Endpoint) for Endpoint Detection and Response (EDR) mechanism Current Version: 14
ENDPOINT PROTECTION: FEATURES – MANAGEMENT Scans: Create scheduled scans and run on-demand scans Customize scan settings for your environment Adjust scans to improve client computer performance Configure exceptions for scans Manage files in the Quarantine Client Management: Add groups Import existing groups Inheritance Groups :– location, assign clients, manage policies SYMANTEC: Endpoint Protection
ENDPOINT PROTECTION: FEATURES – MANAGEMENT Client Deployment: Client Deployment Wizard:– web, email, push, export third-party security software removal https://support.symantec.com/en_US/article.TECH195029.html Using third-party tools to deploy Monitoring and Reporting: Review the security status of your network Locate which client computers need protection Configure notifications to alert you when security events occur Create custom quick reports and scheduled reports for ongoing monitoring SYMANTEC: Endpoint Protection
ENDPOINT PROTECTION: FEATURES – VIRTUAL INFRASTRUCTURE Shared Insight Cache vShield -enabled Shared Insight Cache network-based Shared Insight Cache Virtual Image Exception Non-persistent VDI SYMANTEC: Endpoint Protection Trusted by Insight VIE VIE VIE VIE Trusted by VIE
SYMANTEC: Endpoint Protection SYMANTEC: ENDPOINT PROTECTION Architecture, Design and System Requirements
ENDPOINT PROTECTION: ARCHITECTURE SYMANTEC: Endpoint Protection Windows Linux Mac Embedded SEPM GUP LiveUpdate Server SEPM Console Virtual * Events and Policy Management Content Updates Content Distribution Protection and Logs Endpoint Protection Internet * SEPM can use an embedded database of MS-SQL. MS-SQL is recommended for larger organization 1000+ Endpoints
ENDPOINT PROTECTION: DESIGN Multi-Site :- High Availability SYMANTEC: Endpoint Protection
ENDPOINT PROTECTION: SYSTEM REQUIREMENTS Symantec Endpoint Protection Manager CPU: Intel Pentium Dual-Core or equivalent minimum RAM: 4 GB RAM or more available recommended HD: 16 GB available minimum (100 GB recommended) for the management server; 40 GB available minimum (200 GB recommended) for the management server and a locally installed database. OS: Microsoft Windows Server 2003, 2008, 2012 including R2 Database: Microsoft SQL Server 2005, 2008, 2012, 2014 Symantec Endpoint Protection Client Windows Embedded Windows Desktop and Server flavours Mac OS X 10.8, 10.9, 10.10 Cent OS, Debian , Novell OES, Oracle Linux, RHEL, SUSE Server and Desktop, Ubuntu Server and Desktop Azure, AWS, VMware , Citrix , Virtual Box, Hyper-V, MED-V, Virtual Server Always make sure to check for latest system requirements: https://support.symantec.com/en_US/article.TECH230602.html SYMANTEC: Endpoint Protection
SYMANTEC: Endpoint Protection SYMANTEC: ENDPOINT PROTECTION Licensing and Packaging
ENDPOINT PROTECTION: LICENSING SEP 14.0 is licensed ”per-user” – User or Device Embedded Databased – Sybase is included Virtualized Environment: Each separately installed and concurrently running instance of the software must be licensed VMware Example: 2 VMware Hosts with 25 Guest Machines = 25 Hyper-V Example: 2 Hyper-V Hosts with 25 Guest Machines = 27 Hyper-V: To protect the virtual instances themselves and the hosts SYMANTEC: Endpoint Protection
ENDPOINT PROTECTION: PACKAGING Symantec Endpoint Protection Symantec Endpoint Protection – Small Business Edition (subscription) Symantec Endpoint Protection for VDI Symantec Protection Suite Symantec Endpoint Protection Symantec Mail Security for Exchange Symantec Messaging Gateway Symantec Advance Threat Protection: Endpoint (subscription) Requires Symantec Endpoint Protection (not included in ATP) SYMANTEC: Endpoint Protection
SYMANTEC: Endpoint Protection SYMANTEC: ENDPOINT PROTECTION Look and Feel
Iftikhar Ali Iqbal https://www.linkedin.com/in/iftikhariqbal/ SYMANTEC: Endpoint Protection