Comprehensive Protection for Windows®

Total Page:16

File Type:pdf, Size:1020Kb

Comprehensive Protection for Windows® Solutions for Small and Mid-Sized Businesses October 2007 Product Comprehensive Catalog Protection for Windows® As companies increasingly rely on sophisticated technologies to support their objectives, the risks to business operations grow. The complexity of managing IT systems increases, as do the costs. And, if your company is like most, its IT staff and resources are limited and continually called on to justify their costs. Under these conditions, it’s difficult for companies to keep the Microsoft® Windows® environments they depend on to run their business secure, available, and well-managed. Symantec is uniquely qualified to address the challenge. That’s because Symantec delivers an unparalleled combination of leading technologies and services to help ensure the highest level of protection across your Microsoft Windows environment. Symantec offers comprehensive and affordable, best-in-class solutions that help protect Microsoft Windows environments by keeping data, systems, and applications secure, available, and well-managed at all times. Our world-class support programs and partners offer guidance to help you implement comprehensive solutions that will maximize your investment as they protect your IT environment. As you will see on the following pages, Symantec offers industry-leading solutions delivering enterprise-class performance without unnecessary cost or complexity. With a proven track record spanning several decades, Symantec knows how to help you keep your business up, running, and growing—no matter what happens. Symantec Product Catalog—October 2007 Comprehensive Protection for Windows® Contents Security . 2 Client, Server, and Network Security. 3 Symantec Endpoint Protection . 3 Symantec Network Access Control . 4 Symantec Multi-Tier Protection. 4 Symantec Mail Security for SMTP. 5 Symantec Mail Security for Exchange and Domino® . 5 Symantec Mail Security 8300 Series . 6 Symantec Mail Security with Premium AntiSpam for Windows Small Business Server . 6 Backup and Recovery . 7 Symantec Backup Exec for Windows Servers . 8 Symantec Backup Exec for Windows Small Business Server. 8 Symantec Backup Exec Agents and Options . 9 Media Server Options. 9 Backup Exec Central Admin Server Option . 9 Backup Exec Advanced Disk-Based Backup Option . 9 Remote Client Protection and Recovery . 9 Backup Exec Advanced Open File Option . 9 Backup Exec Agent for Windows Systems . 9 Backup Exec Remote Agent for Linux or UNIX Servers . 10 Backup Exec Remote Agent for NetWare Servers . 10 Backup Exec Remote Agent for Macintosh Servers . 10 Backup Exec Desktop and Laptop Option . 10 Online Groupware and Database Protection and Recovery . 11 Backup Exec Agent for Exchange . 11 Backup Exec Agent for SharePoint Portal Server . 11 Backup Exec Agent for SQL Server . 11 Backup Exec Agent for Active Directory . 11 Backup Exec Agent for Oracle on Windows or Linux Servers . 12 Backup Exec Agent for Oracle RAC on Windows or Linux Servers . 12 Backup Exec Agent for DB2 on Windows Servers . 12 Symantec Product Catalog—October 2007 Comprehensive Protection for Windows® Contents (con’t) Storage Options . 12 Backup Exec Library Expansion Option . 12 Backup Exec NDMP Option . 12 Backup Exec SAN Shared Storage Option . 12 Symantec Backup Exec System Recovery Server and Small Business Server Editions . 13 Symantec Backup Exec System Recovery Desktop Edition . 13 Symantec Backup Exec System Recovery Exchange Retrieve Option. 14 Symantec Backup Exec System Recovery Manager . 14 Symantec Enterprise Vault . 14 Client and Server Systems Management. 15 Symantec Ghost Solution Suite . 16 Altiris Client Management Suite. 16 Altiris Server Management Suite . 17 Symantec pcAnywhere. 17 Symantec Control Compliance Suite . 18 World-Class Partner Services and Support . 19 Partner Services . 20 Service Programs . 20 Symantec Education Services . 20 Symantec Consulting Advisory Services . 20 Symantec Consulting Enablement Services . 20 Support Services . 20 Comprehensive Windows Protection • Hackers • Natural Disasters • Spies Security Availability • Hardware Failures • Thieves (Backup and • Human Errors Recovery) Management (Systems) • Escalating Cost and Complexity • Fewer IT Staff • Managed Protection Security Availability Client and Server Security solutions deliver (Backup and Recovery) Systems Management simplified comprehensive Whether you are protecting one Client and server systems protection for endpoint systems workstation or a networked management technologies help and servers from spam, malware, environment, backup and you gain control of your Microsoft and other increasingly recovery solutions provide environment and reduce sophisticated threats, providing complete, flexible, and cost- complexity, downtime, and costs everything your business needs to effective protection for critical while complying with corporate stay up and running at all times. data and systems to help you policies and standards. keep your business up and running efficiently. Only Symantec can provide the full suite of products, services, and support you need to help keep your Microsoft Windows environment—and your business—up and running 24/7. Symantec offers industry-leading solutions to help keep your data, systems, and applications secure, available, and well-managed. 1 Security Today’s small and mid-sized businesses need to protect their endpoint systems and servers from spam, malware, and other increasingly sophisticated threats. This includes desktops, laptops, and servers as well as Microsoft® Exchange messaging systems. At the same time, end users are demanding more flexible access to network resources via VPNs, Web-based applications, telecommuting, and unmanaged devices. As a result, many businesses are scrambling to implement, monitor, and enforce controls that protect their endpoint systems and the communications traveling between them. Symantec security solutions deliver simplified comprehensive protection for endpoint systems.
Recommended publications
  • Desktop Messaging for Internet Clients
    CallPilotTM Release 2.5 Desktop Messaging User Guide for Internet Clients Updates to the Desktop Messaging User Guides Internet Clients Page 7 Call the sender of a message Call the sender of a message is not supported. Page 7 Access web-based My CallPilot to view user information and change your feature settings My CallPilot is not supported. Page 8 About this guide The Internet mail clients that are supported are: • Microsoft Outlook 2000 (Internet mail mode) • Microsoft Outlook 2002 (XP) (Internet mail mode) • Microsoft Outlook 2003 (Internet mail mode) • Microsoft Outlook Express - 5.x and 6.x • Netscape Messenger (Netscape Communicator) - 6.2x • Netscape Mail - 7.0x • Qualcomm Eudora Pro - 6.1.2 Citrix (Terminal server) functionality is supported. Page 11 CallPilot Player The Call the sender button is not available. Page 11 To select your telephone or computer to play voice messages If your telephone is call forwarded to voicemail, cancel this feature before you access your messages from CallPilot Player. Page 29 Linking to My CallPilot Linking to My CallPilot is not supported. About forwarding Desktop Messaging messages Do not use the right-click menu to forward a Desktop Messaging message. To forward a message, either: • open the message and forward it from the CallPilot window or • for Outlook, select the message in the Outlook Inbox and forward it from the Outlook toolbar. Business Communications Manager & CallPilot 100/150 Outlook, Lotus Notes, GroupWise Page 7 Call the sender of a message Call the sender of a message is not supported. Page 7 Access web-based My CallPilot to view user information and change your feature settings My CallPilot is not supported.
    [Show full text]
  • Symantec Software Datasheet
    Data Sheet: Endpoint Management Altiris™ Client Management Suite 7.0 Deploy, manage, secure, and troubleshoot Overview The suite delivers tools that are based on the IT The cost of a PC is only a small part of its total cost. Infrastructure Library (ITIL) to help align processes with Nearly 80 percent of the total cost of owning a client industry best practices so you can more efficiently system goes toward the support and maintenance of manage your client systems. the PC. Altiris™ Client Management Suite from Symantec automates time-consuming and redundant tasks to reduce the effort and costs associated with deploying, managing, securing, and troubleshooting client systems so organizations can gain control of their IT environments. Client Management Suite Delivers Client Management Suite ushers in a new generation of systems management by bringing end users, administrators, and key business decision makers Altiris Client Management Suite deploys, manages, secures, and together. The suite helps you align with organizational troubleshoots systems through the entire IT lifecycle. You can manage more technologies, with greater efficiency, on more objectives by providing easy-to-use self-service tools to platforms. users, powerful management tools to IT administrators, and custom dashboards to decision makers. Client Management Suite provides complete visibility into your organization's client systems so you can see Finding extra time is challenging, yet that's what Client what you have, where it's located, and what state it's in. Management Suite is designed to do. Now you can focus The suite's flexible and actionable reporting tools not on key initiatives that can help your business grow.
    [Show full text]
  • The Application Usage and Risk Report an Analysis of End User Application Trends in the Enterprise
    The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise 8th Edition, December 2011 Palo Alto Networks 3300 Olcott Street Santa Clara, CA 94089 www.paloaltonetworks.com Table of Contents Executive Summary ........................................................................................................ 3 Demographics ............................................................................................................................................. 4 Social Networking Use Becomes More Active ................................................................ 5 Facebook Applications Bandwidth Consumption Triples .......................................................................... 5 Twitter Bandwidth Consumption Increases 7-Fold ................................................................................... 6 Some Perspective On Bandwidth Consumption .................................................................................... 7 Managing the Risks .................................................................................................................................... 7 Browser-based Filesharing: Work vs. Entertainment .................................................... 8 Infrastructure- or Productivity-Oriented Browser-based Filesharing ..................................................... 9 Entertainment Oriented Browser-based Filesharing .............................................................................. 10 Comparing Frequency and Volume of Use
    [Show full text]
  • Manual Norton Partition Magic 8.0 Full Version for Windows 7
    Manual Norton Partition Magic 8.0 Full Version For Windows 7 Norton Partition Magic is an application used to manage hard disks on your computer, that has a If you are a moderator please see our troubleshooting guide. A familiar layout with disk map plus a full User Manual and lots of Help resources From EaseUS: As Partition Magic alternative, EaseUS Partition Master Home and GUID partition table (GPT) disk under Windows 2000/XP/Vista/7/8/8.1/10. If you have a Windows 8/8.1 system, DO NOT manage your partition with this. Supported OS: Windows 10/7/8/vista/XP and Windows Server 2003/2008/2012 Guide & Tips. How to extend system partition But Windows 8 is not supported by Norton Partition Magic), or can not be boot from a bootable CD/DVD. Partition. How to backup photos from iphone4 to icloud server backup windows server 2008 · Ipad compatible backup camera symantec netbackup 7.5 error code 58 Dodge grand caravan everyone the key NTFS partitions, made Source manually copy two components to users whose machines almost completely dead HDD. Magic EaseUS Partition Master is totally free partition manager for home users. Guide & Tips Say, create a new partition to install Windows 7, or extend the full system partition manager software for Windows 7 32 bit and 64 bit and Windows 8. Partition Magic ® is a registered trademark of Symantec Corporation. filemaker pro 12 crack norton partitionmagic 8.05 serial number keylogger for windows Camtasia studio 8 free download for windows 7 32bit vray 3ds max 2010 64 with Powerdvd 10 ultra 3d free download full version sony architect pro 5.2 photoshop lightroom mac serial windows 8 the missing manual captivate 4.
    [Show full text]
  • Symantec Backup Exec™ 2012 Sales Script
    Symantec Backup Exec™ 2012 Sales Script Partner Competitive Sales Script Product overview The Symantec Backup Exec™ 2012 product portfolio drives sales with a name customers know and trust plus new technology fit for both simple and complex IT environments. One integrated product protects virtual AND physical environments, simplifies both backup AND disaster recovery, and recovers data or systems at any scale, from an individual item to an entire server. New technologies include integrated disaster recovery, physical to virtual conversions and a renovated interface with default settings for the most common backup options. Available as packaged software, appliances, or cloud-based backup and recovery, Backup Exec is the one data protection choice for growing businesses and the partners that serve them. Why sell it? Selling Symantec Backup Exec 2012 product portfolio provides unlimited sales opportunities for you. • Attach with every new Windows® server, application, and VMware® or Hyper-V® virtual server sale to further build a complete and differentiating solution. • Quickly grow your deal size by adding Backup Exec Agents and Options. • Cross-sell other Symantec solutions, such as Symantec Enterprise Vault™, Symantec™ Endpoint Protection or Symantec™ ApplicationHA, for comprehensive protection. • Provide additional add-on installation service opportunities to further grow your margin. Key features of Backup Exec 2012 • Unite physical and virtual machine backups. Only Symantec Backup Exec™ with V-Ray technology offers flexible backup and recovery capabilities, deduplication, and policy management across VMware, Hyper-V and physical server environments. • New! One Product! Any Recovery! Complete data, application, and disaster recovery for physical and virtual environments from a single console.
    [Show full text]
  • Callpilot 4.0 Desktop Messaging User Guide for My Callpilot (En)
    C a l l P i l o t TM Release 4.0 - Standard 1.02 Desktop Messaging User Guide for My CallPilot CallPilot Desktop Messaging User Guide for My CallPilot Product releases: 4.0 Document release: Standard 1.02 Date: July 2005 Copyright © Nortel Networks Limited. All rights reserved. Information is subject to change without notice. Nortel Networks reserves the right to make changes in design or components as progress in engineering and manufacturing may warrant. The process of transmitting data and call messaging between CallPilot and its servers, switches or system is proprietary to Nortel Networks. Any other use of the data and the transmission process is a violation of the user license unless specifically authorized in writing by Nortel Networks prior to such use. Violations of the license by alternative usage of any portion of this process or the related hardware constitutes grounds for an immediate termination of the license and Nortel Networks reserves the right to seek all allowable remedies for such breach. Nortel Networks and third-party trademarks appear on the following pages: 2 *Nortel Networks, the Nortel Networks logo, the Globemark, and Unified Networks, BNR, CallPilot, DMS, DMS-100, DMS-250, DMS-MTX, DMS-SCP, DPN, Dualmode, Helmsman, IVR, MAP, Meridian, Meridian 1, Meridian Link, Meridian Mail, Norstar, SL-1, SL-100, Succession, Supernode, Symposium, Telesis, and Unity are trademarks of Nortel Networks. 3COM is a trademark of 3Com Corporation. ACCENT is a trademark of Accent Software International Ltd. ADOBE is a trademark of Adobe Systems Incorporated. AMDEK is a trademark of Amdek Corporation.
    [Show full text]
  • Product Releases Dec 02
    Historical Product Releases Dec-02 Symantec ManHunt 2.2 Symantec ManTrap 3.0 Symantec Host Intrusion Detection 4.0 Symantec NetRecon 3.6 Symantec Event Manager for Antivirus 1.0 Symantec Event Manager for Client Security 1.0 Symantec Event Collector for NET ePO Symantec Event Relay Tivoli Symantec Incident Manager 1.0 Symantec AntiVirus Corporate Edition 8.0 EMC Symantec AntiVirus Scan Engine 4.0 Symantec AntiVirus 4.0 for ISA Symantec AntiVirus 4.0 for NetApp Filer Symantec AntiVirus for NetApp NetCache Symantec AntiVirus Filtering for Domino W2NT v 3.1 Norton Internet Security Professional 2003 Sep-02 Enterprise Security Manager for Databases 3.0 Enterprise Security Manager for Firewall 2.0 Enterprise Security Manager for HIPAA 1.0 Symantec AntiVirus for SMTP Gateways 3.0 Symantec AntiVirus Gateway Solution 3.0 Symantec AntiVirus Enterprise Edition 8.5 Symantec Client Security Norton AntiVirus 2003 Norton AntiVirus Professional 2003 Norton Ghost 2003 Norton Internet Security 2003 Norton Personal Firewall 2003 Norton SystemWorks 2003 Norton SystemWorks Professional 2003 Jun-02 Symantec Web Security 2.5 Syamantec Gateway Security (models 5100, 5200, 5300) VelociRaptor 1.5 (models 1100, 1200, 1300) Net Prowler 3.5.1 Symantec AntiVirus Gateway Solution Symantec AntiVirus Scan Engine 3.0 Symantec AntiVirus for Inktomi Traffic Edge 3.0 Symantec AntiVirus for Network Appliances filer/NetCache 3.0 Norton AntiVirus for Lotus Notes/Domino on Linux Mar-02 Symantec Gateway Security RK4 ESM - Best Practice Policies Firewall 1.0 ESM - Best Practice
    [Show full text]
  • Overview of Client Management Suite 7.1 Hands-On Lab
    Overview of Client Management Suite 7.1 Hands-On Lab Description If you are new to Altiris Client Management Suite, this lab is an excellent place to start. This introduction lab provides a hands-on overview of the suite going through many steps of IT lifecycle management. It includes the basics on software and patch management, deployment, migration, remote assistance, and more to start you on your path to effective client management. At the end of this lab, • Create an inventory policy and run reports to view the you should be able to collected data • Describe the available methods for delivering and metering software within a real-world environment • Describe the process of staging and deploying patches to systems and applications within a network environment • Use Deployment Solution 7.1 to perform an OS Migration Notes . The lab will be directed and will provide you with step-by- step walkthroughs of key features. Feel free to follow along with the instructor, or you may optionally perform this lab at your own pace. Be sure to ask your instructor any questions you may have. Thank you for coming to our lab session. Introduction Altiris® Client Management Suite™ reduces the total cost of owning client systems by automating time-consuming and redundant tasks. By minimizing the efforts and costs associated with deploying, managing, securing and troubleshooting client systems, organizations can gain control of their environments. This easy-to-use, integrated suite of solution software for Windows, Mac and Linux is designed to address IT management needs for desktop and notebook computers throughout their entire IT lifecycle.
    [Show full text]
  • Historical Product Releases Jun-05 Symantec Client Security 3.0
    Historical Product Releases Jun-05 Symantec Client Security 3.0 Symantec Client Security for Small and Medium Business 3.0 Symantec Mobile Security 4.0 for Symbian Symantec AntiVirus Enterprise Edition 10.0 Symantec AntiVirus Corporate Edition 10.0 Symantec AntiVirus for Small and Medium Business 10.0 Symantec AntiVirus 4.3 for Messaging Symantec LiveState Patch Manager 6.0 Symantec Discovery 6.0 Symantec LiveState Delivery 6.0 Symantec LiveState Delivery Enterprise Manager 6.0 Symantec LiveState Client Management Suite Symantec Enterprise Security Manager Version 6.5 Managed Security Services Vulnerability Data Integration Norton AntiVirus Mac 10.0 Norton Internet Security 2005 AntiSpyware Edition Mar-05 Symantec AntiVirus 4.3 for Microsoft SharePoint Symantec Network Security 4.0 Symantec Mail Security Appliance Symantec Smart Agent for Dragon Symantec Smart Agent for Cisco Intrusion Detection System Symantec Smart Agent for Snort 2.0 Symantec LiveState Recovery Manager Dec-04 Symantec Enterprise Security Architecture 2.1 Symantec Gateway Security 400 Series Appliance Symantec Network Security Fiber Fail-Open Solution 1.0 Appliance Symantec Livestate Recovery Desktop 3.0 Symantec Livestate Recovery Desktop 3.0 Small & Medium Business Symantec Livestate Recovery Standard Server 3.0 Small & Medium Business Symantec Ghost Solution Suite 1.0 pcAnywhere 11.5 Symantec Mail Security 4.1 for Domino Symantec Mail Security for Domino Multi Platform Bundle Edition Symantec Mail Security for Microsft Exchange 4.6 Symantec Mail Security for SMTP
    [Show full text]
  • Callpilot Meridian Mail to Callpilot Migration Utility Guide
    555-7101-801 555-7101-801 CallPilot Meridian Mail to CallPilot Migration Utility Guide Product release 2.x Standard 2.0 May 2004 CallPilot Meridian Mail to CallPilot Migration Utility Guide Publication number: 555-7101-801 Product release: 2.x Document release: Standard 2.0 Date: May 2004 Copyright © 2004 Nortel Networks, All Rights Reserved Information is subject to change without notice. Nortel Networks reserves the right to make changes in design or components as progress in engineering and manufacturing may warrant. The process of transmitting data and call messaging between the CallPilot server and the switch or system is proprietary to Nortel Networks. Any other use of the data and the transmission process is a violation of the user license unless specifically authorized in writing by Nortel Networks prior to such use. Violations of the license by alternative usage of any portion of this process or the related hardware constitutes grounds for an immediate termination of the license and Nortel Networks reserves the right to seek all allowable remedies for such breach. This page and the following page are considered the title page, and contain Nortel Networks and third-party trademarks. Nortel Networks, the Nortel Networks logo, the Globemark, and Unified Networks, BNR, CallPilot, DMS, DMS-100, DMS-250, DMS-MTX, DMS-SCP, DPN, Dualmode, Helmsman, IVR, MAP, Meridian, Meridian 1, Meridian Link, Meridian Mail, Norstar, SL-1, SL-100, Succession, Supernode, Symposium, Telesis, and Unity are trademarks of Nortel Networks. 3COM is a trademark of 3Com Corporation. ACCENT is a trademark of Accent Software International Ltd. ADOBE is a trademark of Adobe Systems Incorporated.
    [Show full text]
  • Optimization and Visualization of Strategies for Platforms
    Optimization and Visualization of Strategies for Platforms, Complements, and Services. by Richard B. LeVine BA, Psychology, State University of New York at Albany, 1980 MS, Computer Science, Union College, Schenectady New York, 1986 SUBMITTED TO THE ALFRED P. SLOAN SCHOOL OF MANAGEMENT IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTERS OF SCIENCE at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY June 2003 ©2003 Richard B. LeVine. All rights reserved. The author hereby grants to MIT permission to reproduce and to distribute publicly paper and electronic copies of this thesis document in whole or in part. Signature of Author: Alfred P. Sloan School of Management May 8, 2003 Certified by: Professor James Utterback, Chair, Management of Technology Program Reader Certified by: Professor Michael Cusumano, Sloan Management Review Distinguished Professor of Management Thesis Supervisor Accepted by: David Weber Director, Management of Technology Program 1 of 160 Optimization and Visualization of Strategies for Platforms, Complements, and Services by Richard B. LeVine Submitted to the Alfred P. Sloan School of Management on May 8, 2003, in Partial Fulfillment of the Requirement for the Degree of Masters of Science. Abstract This thesis probes the causal elements of product platform strategies and the effects of platform strategy on a firm. Platform strategies may be driven by internal or external forces, and the lifecycle of a firm and of a platform strategy evolve over time in response to both the needs of the firm and the changes in the external environment. This external environment may consist of a “platform ecology,” in which the platform strategies of firms affect one another.
    [Show full text]
  • Veritas Backup Reporter Getting Started Guide Veritas Backup Reporter Getting Started Guide
    Veritas Backup Reporter Getting Started Guide Veritas Backup Reporter Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 6.0 PN: : (HRO7210)SKU 11132088 Legal Notice Copyright © 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government Users Subject to Standard License Terms and Conditions. Actionable Infrastructure™, Active Extensions™, ActiveAdmin™, Anti-Freeze™, Application Saver™, Backup Exec™, Bare Metal Restore™, BindView™, Bloodhound™, Bootguard™, Brightmail™, bv-Admin™, bv-Control™, CarrierScan™, CleanSweep™, ColorScale™, CommandCentral™, Confidence Online™, CrashGuard™, Day-End Sync™, dbAnywhere™, DeepSight™, Defender™, Digital Immune System™, DiskDoubler™, DiskLock™, Drive Image™, Enterprise Security Manager™, Enterprise Vault™, FlashSnap™, FlowChaser™, Ghost Walker™, Ghost™, GoBack™, Healthy PC™, i3™, iCommand™, I-Gear™, Indepth™, Information Integrity™, Intellicrypt™, Intruder Alert™, LiveUpdate™, LiveState™, Mail-Gear™, ManHunt™, ManTrap™, MicroMeasure™, Mobile Update™, NetBackup™, NetProwler™, NetRecon™, Norton™, Norton 360™, Norton AntiSpam™, Norton AntiVirus™, Norton Commander™, Norton Editor™, Norton Guides™, Norton Internet Security™, Norton Mobile Essentials™, Norton Password Security™, Norton SystemWorks™, Norton Utilities™, Norton WinDoctor™, OmniGuard™, OpForce™, PartitionMagic™, pcAnywhere™, PowerQuest™, PowerVPN™, Procomm™, Procomm Plus™,
    [Show full text]