SYMANTEC 2004 ANNUAL REPOR Ensuring Information Integrity

Total Page:16

File Type:pdf, Size:1020Kb

SYMANTEC 2004 ANNUAL REPOR Ensuring Information Integrity SYMANTEC 2004 ANNUAL REPOR Ensuring Information Integrity SYMANTEC 2004 ANNUAL REPORT T Corporate Information N Board of Directors Tania Amochaev Donald E. Frischmann Rowan M. Trollope Former Chief Executive Officer Senior Vice President, Vice President, QRS Corporation Communications and Brand Management Security Management Solutions William T. Coleman III Dieter Giesbrecht Giuseppe Verrini Founder, Chairman and Senior Vice President, Vice President, Sales and Marketing, Chief Executive Officer Enterprise Administration Europe, Middle East, and Africa Cassatt Corporation Gail E. Hamilton Arthur W. Wong Franciscus Lion Executive Vice President, Vice President, Security Response Former Board Advisor and Global Services and Support Senior Executive Vice President N Investor Information ABN Amro Bank Thomas W. Kendra Senior Vice President, Worldwide Sales Annual Meeting David L. Mahoney The annual meeting of shareholders will be Former Co-Chief Executive Officer Rebecca A. Ranninger held on Wednesday, September 15, 2004 at McKesson HBOC Senior Vice President, Human Resources 8 a.m. at Symantec’s worldwide headquarters: 20330 Stevens Creek Blvd. Robert S. Miller Enrique T. Salem Senior Vice President, Gateway Solutions Cupertino, CA 95014 Former Chairman of the Board and (408) 517 8000 Chief Executive Officer Bethlehem Steel N Other Senior Executives Stock Exchange Listing Cosmo P. Battinelli Symantec’s common stock trades on George Reyes Vice President, Global Support the Nasdaq under the symbol SYMC. Chief Financial Officer Google Robert A. Clyde Transfer Agent Vice President, Chief Technology Officer EquiServe Trust Company, N.A. Daniel H. Schulman P.O. Box 219045 Chief Executive Officer Lily T. De Los Rios Kansas City, MO 64121 Virgin Mobile USA Vice President, Client Solutions www.equiserve.com (816) 843 4299 John W. Thompson Mark E. Egan Chairman of the Board and Vice President, Information Technology Investor Relations Chief Executive Officer Investor inquires may be directed to: Symantec Corporation Gregory M. Gotta Helyn Corcos Vice President, Investor Relations N Executive Officers Gateway Security and Appliances 20330 Stevens Creek Blvd. Cupertino, CA 95014 John W. Thompson Henri J. Isenberg (408) 517 8324 Chairman of the Board and Vice President, Business Development investor-relations symantec.com Chief Executive Officer @ Charles A. Johnson www.symantec.com/invest John G. Schwarz Vice President, Global Security Services Annual Report on Form 10-K President and Chief Operating Officer Donald Kleinschnitz A copy of Symantec’s Form 10-K, including Gregory E. Myers Vice President, exhibits, for the period ended April 2, 2004, Senior Vice President of Finance Enterprise Administration Products as filed with the Securities and Exchange Chief Financial Officer Commission, is available without charge Steven B. Messick upon request or can be accessed at: Janice D. Chaffin Vice President, www.symantec.com/invest Senior Vice President, Sales and Marketing, Americas Chief Marketing Officer Outside Counsel John B. Sorci, Jr. Fenwick & West LLP Arthur F. Courville Vice President, Worldwide Operations 801 California Street tz Printing: Cenveo Anderson Lithograph Senior Vice President, Mountain View, CA 94041 General Counsel and Secretary Vincent W. Steckler (650) 988 8500 t Schwar Vice President, Sales and Marketing, Stephen G. Cullen Asia Pacific and Japan Independent Auditors Senior Vice President, KPMG LLP trait: Stuar Security Products and Solutions 500 East Middlefield Road Mountain View, CA 94043 Symantec and the Symantec logo are U.S. registered trademarks of Symantec Corporation. Norton Internet Security, Symantec Client Security, Symantec DeepSight Alert Services, Symantec Gateway Security, and Symantec Managed Security Services are trademarks of Symantec Corporation. Other brands and products are trademarks of their respective holder/s. Design: 1185 Design Executive Por © 2004 Symantec Corporation. All rights reserved. 10281117 2004 Annual Report Information is the fuel driving today’s global economy. By carefully analyzing critical information, doctors make decisions about their patients’ well-being—military com- manders guide troop movements—bankers determine how to invest millions—utilities control the flow of power and water—individuals make decisions about purchases from birthday presents to houses. To Use It,You Must Trust It A wealth of information now exists and is readily available to empower individuals, businesses, and governments to make better-informed decisions. We have come to assume that the information we rely on every day is trustworthy; however, that is not necessarily the case. Internet threats, technical failures, and everyday errors undermine the integrity of this information. To effectively use information, we must trust that it is secure and available when we need it. SYMANTEC CORPORATION «1» 2004 Annual Report To Trust It,You Must Secure It BUSINESS AND PERSONAL INFORMATION IS WORTH FAR MORE THAN THE INFRASTRUCTURE THAT STORES IT, THE DATABASE THAT MANAGES IT, THE APPLICATION THAT TRANSFORMS IT, OR THE NETWORK THAT TRANSPORTS IT COMBINED. IF THAT INFORMATION IS COMPROMISED, EVERYTHING THAT ANYONE DOES WITH IT IS SUSPECT. ENSURING THE TRUSTWORTHINESS OF CRITICAL INFORMATION ASSETS STARTS WITH SECURITY. Symantec is dedicated to helping individuals Today’s security solutions must recognize the and enterprises ensure the integrity of informa- need for early awareness of emerging threats.They tion critical to their work, play, and daily lives. must provide an understanding of and an ability to address the rapid increase in vulnerabilities Our company started on this quest nearly 15 years with more integrated technologies to protect ago when we pioneered the antivirus industry critical information assets. They must prevent and became the leaders in protecting home and attacks as well as outline a plan to respond to and small business users as well as large enterprise recover from their impact. customers. Since then, the threat spectrum has shifted toward much more sophisticated, They must block new threats automatically and aggressive, and rapid attacks. provide protection updates in real-time. Above all, they must offer the capability to manage the According to the Symantec Internet Security entire process—either by internal administrators Threat Report, blended threats accounted for 54 or by a dedicated services organization outside percent of the top attacks in the last six months of the company. 2003. Computer users are also facing an average of seven new vulnerabilities—or “holes”in soft- Whether it is an individual system connecting ware and hardware systems—discovered every day. through an Internet service provider or an office In addition, the time between the identification with thousands of systems on a network, the of a new vulnerability and the release of its security of the overall information technology exploit is shrinking from months to days, soon infrastructure directly impacts the integrity of to be within minutes or even simultaneously. the information flowing across that infrastructure. Recognizing this trend, Symantec has devel- Ensuring information integrity is about manag- oped broader information security solutions to ing the security of the computing environment, protect today’s computing environment and distributing software updates and patches, ensure information integrity. maintaining a secure archive of important data and software assets, and ensuring that the value of the infrastructure is realized. ‹‹2›› SYMANTEC CORPORATION 2004 Annual Report To Secure It,You Must Manage It TODAY’S COMPUTING INFRASTRUCTURE CAN BE TRULY SECURE ONLY IF IT IS WELL MANAGED. CENTRALIZED MANAGEMENT OF ALL GATEWAYS, SERVERS, AND CLIENTS WITHIN AN ENVIRONMENT IS ESSENTIAL TO MAINTAINING THE SECURITY AND AVAILABILITY OF INFORMATION ASSETS. Information integrity is not only about security, provisioning tools, administrators can distribute, but also availability. Information that is secure but configure, and update systems and applications, not available is virtually worthless. Individuals ensuring the network is current and consistent. and enterprises must manage the balance between making their systems and information available With asset management tools, administrators and keeping them secure. can discover and track hardware and software assets to understand where systems are installed To maintain the security and availability of a and what’s installed on them. This knowledge computing environment, users need critical is critical so that systems can be updated as information about that environment. vulnerabilities are discovered. In the enterprise, administrators must know Automated backup and recovery tools allow which systems are connecting to the network both individual and enterprise users to quickly and whether or not they meet the company’s and systematically bring systems online after the security policies.They must know which appli- occurrence of potentially disastrous events, such cations are deployed throughout the network as an attack, accidental misconfiguration, file and whether or not they have patched critical corruption, or installation of faulty software. new vulnerabilities.They must know that system and data backup procedures are being per- Underlying each of these elements are tools that allow the creation and consistent enforcement formed when required so the environment can of policies to ensure enterprise-wide security be recovered from an attack or technical failure
Recommended publications
  • Artificial Intelligence in Health Care: the Hope, the Hype, the Promise, the Peril
    Artificial Intelligence in Health Care: The Hope, the Hype, the Promise, the Peril Michael Matheny, Sonoo Thadaney Israni, Mahnoor Ahmed, and Danielle Whicher, Editors WASHINGTON, DC NAM.EDU PREPUBLICATION COPY - Uncorrected Proofs NATIONAL ACADEMY OF MEDICINE • 500 Fifth Street, NW • WASHINGTON, DC 20001 NOTICE: This publication has undergone peer review according to procedures established by the National Academy of Medicine (NAM). Publication by the NAM worthy of public attention, but does not constitute endorsement of conclusions and recommendationssignifies that it is the by productthe NAM. of The a carefully views presented considered in processthis publication and is a contributionare those of individual contributors and do not represent formal consensus positions of the authors’ organizations; the NAM; or the National Academies of Sciences, Engineering, and Medicine. Library of Congress Cataloging-in-Publication Data to Come Copyright 2019 by the National Academy of Sciences. All rights reserved. Printed in the United States of America. Suggested citation: Matheny, M., S. Thadaney Israni, M. Ahmed, and D. Whicher, Editors. 2019. Artificial Intelligence in Health Care: The Hope, the Hype, the Promise, the Peril. NAM Special Publication. Washington, DC: National Academy of Medicine. PREPUBLICATION COPY - Uncorrected Proofs “Knowing is not enough; we must apply. Willing is not enough; we must do.” --GOETHE PREPUBLICATION COPY - Uncorrected Proofs ABOUT THE NATIONAL ACADEMY OF MEDICINE The National Academy of Medicine is one of three Academies constituting the Nation- al Academies of Sciences, Engineering, and Medicine (the National Academies). The Na- tional Academies provide independent, objective analysis and advice to the nation and conduct other activities to solve complex problems and inform public policy decisions.
    [Show full text]
  • Norton 360™ Version 3.0, Norton Internet Security™ 2009, and Norton Antivirus™ 2009 Feature Comparison Chart
    Norton 360™ Version 3.0, Norton Internet Security™ 2009, and Norton AntiVirus™ 2009 Feature Comparison Chart Feature Norton 360 Norton Internet Norton Explanation Version 3.0 Security 2009 AntiVirus 2009 Core Protection Antivirus ✔ ✔ ✔ Detects and removes viruses, Internet worms, and Trojan horses Antispyware ✔ ✔ ✔ Prevents spyware from infecting the PC Email and instant messaging protection ✔ ✔ ✔ Monitors email and instant messaging so users can exchange files without exchanging threats Antispam ✔ ✔ Automatically filters out annoying and fraudulent or phishing email from the user’s email inbox Advanced Protection Botnet detection ✔ ✔ ✔ Detects and prevents others from taking control of the PC, accessing private information, or using the computer to host an attack Rootkit detection ✔ ✔ ✔ Finds and removes threats that are hidden deep in the operating system Norton™ Insight ✔ ✔ ✔ Includes innovative, intelligence-driven technology for faster, fewer, shorter scans Norton™ Pulse Updates ✔ ✔ ✔ Delivers rapid pulse updates every 5 to 15 minutes for protection against new threats Smart, two-way firewall ✔ ✔ Makes intelligent incoming and outgoing security decisions without interrupting users to ask them each time Enhanced browser protection ✔ ✔ ✔ Secures against Web-based attacks that use browser vulnerabilities to infect PCs with malware Real-time behavioral protection ✔ ✔ ✔ Provides enhanced, real-time protection (SONAR™) Wireless network security protection ✔ ✔ Checks the status of wireless network security and provides expert advice on managing
    [Show full text]
  • Desktop Messaging for Internet Clients
    CallPilotTM Release 2.5 Desktop Messaging User Guide for Internet Clients Updates to the Desktop Messaging User Guides Internet Clients Page 7 Call the sender of a message Call the sender of a message is not supported. Page 7 Access web-based My CallPilot to view user information and change your feature settings My CallPilot is not supported. Page 8 About this guide The Internet mail clients that are supported are: • Microsoft Outlook 2000 (Internet mail mode) • Microsoft Outlook 2002 (XP) (Internet mail mode) • Microsoft Outlook 2003 (Internet mail mode) • Microsoft Outlook Express - 5.x and 6.x • Netscape Messenger (Netscape Communicator) - 6.2x • Netscape Mail - 7.0x • Qualcomm Eudora Pro - 6.1.2 Citrix (Terminal server) functionality is supported. Page 11 CallPilot Player The Call the sender button is not available. Page 11 To select your telephone or computer to play voice messages If your telephone is call forwarded to voicemail, cancel this feature before you access your messages from CallPilot Player. Page 29 Linking to My CallPilot Linking to My CallPilot is not supported. About forwarding Desktop Messaging messages Do not use the right-click menu to forward a Desktop Messaging message. To forward a message, either: • open the message and forward it from the CallPilot window or • for Outlook, select the message in the Outlook Inbox and forward it from the Outlook toolbar. Business Communications Manager & CallPilot 100/150 Outlook, Lotus Notes, GroupWise Page 7 Call the sender of a message Call the sender of a message is not supported. Page 7 Access web-based My CallPilot to view user information and change your feature settings My CallPilot is not supported.
    [Show full text]
  • Symantec Software Datasheet
    Data Sheet: Endpoint Management Altiris™ Client Management Suite 7.0 Deploy, manage, secure, and troubleshoot Overview The suite delivers tools that are based on the IT The cost of a PC is only a small part of its total cost. Infrastructure Library (ITIL) to help align processes with Nearly 80 percent of the total cost of owning a client industry best practices so you can more efficiently system goes toward the support and maintenance of manage your client systems. the PC. Altiris™ Client Management Suite from Symantec automates time-consuming and redundant tasks to reduce the effort and costs associated with deploying, managing, securing, and troubleshooting client systems so organizations can gain control of their IT environments. Client Management Suite Delivers Client Management Suite ushers in a new generation of systems management by bringing end users, administrators, and key business decision makers Altiris Client Management Suite deploys, manages, secures, and together. The suite helps you align with organizational troubleshoots systems through the entire IT lifecycle. You can manage more technologies, with greater efficiency, on more objectives by providing easy-to-use self-service tools to platforms. users, powerful management tools to IT administrators, and custom dashboards to decision makers. Client Management Suite provides complete visibility into your organization's client systems so you can see Finding extra time is challenging, yet that's what Client what you have, where it's located, and what state it's in. Management Suite is designed to do. Now you can focus The suite's flexible and actionable reporting tools not on key initiatives that can help your business grow.
    [Show full text]
  • Essential Trends and Dynamics of the Endpoint Security Industry
    Essential Trends and Dynamics of the Endpoint Security Industry Lenny Zeltser wrote this paper together with a co-author who chose to remain anonymous. May 2005 This paper examines trends and dynamics of the endpoint security industry, and shows how business strategies of market leaders such as Symantec exemplify these factors. When exploring current developments in the information security marketplace, we stipulate that this sector is beginning to converge with the general IT software industry in response to factors such as the evolution of the industry structure, competitive dynamics, regulatory compliance efforts, and the maturing state of security products. Lenny Zeltser & Co-Author Page 1 Table of Contents Introduction ......................................................................................................................... 2 Characteristics of the Endpoint Security Industry........................................................... 2 Scope of the Industry ............................................................................................................ 2 Industry Size Estimates.........................................................................................................3 Structural Characteristics of the Industry............................................................................... 3 Competitive Dynamics........................................................................................................... 4 Industry Evolution: From 1990 to 2005 ............................................................................
    [Show full text]
  • Antivirus – Internet Security Software
    AntiVirus – Internet Security Software Recommended AntiVirus Software to use with OfficeEMR™: Norton AntiVirus Symantec Endpoint Protection Business Class – Enterprise – AntiVirus Solution AntiVirus ONLY software products WITHOUT additional Firewalls What Happens with Internet Security Software Products and OfficeEMR™: Provide an additional Firewall and/or Shields Can prevent you from accessing secure Web Sites such as https://www.officemd.net Scan every Web Page that you go to when it loads Can make screens in OfficeEMR™ take a long time to load Can prevent our AutoConfigure from running Can prevent scanning documents into OfficeEMR™ from completing What You Can Do: Setup our Web Site www.officemd.net as an exception in its Firewall. --- or --- Turn off (Disable) the additional Firewall included and / or applicable Shields Contact Technical Support via the software company’s Web Site o many offer e-mail, phone, and/or chat for technical support o get help with and options available to be able to access secure (https://...) Web --- or --- Sites o get help with and options available for making www.officemd.net an exception o get help with and options available for turning off their Firewall and / or applicable Shields. --- or --- Uninstall and Install the AntiVirus ONLY version of that software product. --- or --- Uninstall and Install a different AntiVirus ONLY software product. Revised 05/2009 AntiVirus – Internet Security Software More Detailed Information: Internet Security Software Products provide an added Firewall and / or Shields to help block malicious content or Web Sites while surfing on the Web. Without changing settings, by default, Internet Security Software Products will scan every Web Page that you go to when it loads.
    [Show full text]
  • Manual Norton Partition Magic 8.0 Full Version for Windows 7
    Manual Norton Partition Magic 8.0 Full Version For Windows 7 Norton Partition Magic is an application used to manage hard disks on your computer, that has a If you are a moderator please see our troubleshooting guide. A familiar layout with disk map plus a full User Manual and lots of Help resources From EaseUS: As Partition Magic alternative, EaseUS Partition Master Home and GUID partition table (GPT) disk under Windows 2000/XP/Vista/7/8/8.1/10. If you have a Windows 8/8.1 system, DO NOT manage your partition with this. Supported OS: Windows 10/7/8/vista/XP and Windows Server 2003/2008/2012 Guide & Tips. How to extend system partition But Windows 8 is not supported by Norton Partition Magic), or can not be boot from a bootable CD/DVD. Partition. How to backup photos from iphone4 to icloud server backup windows server 2008 · Ipad compatible backup camera symantec netbackup 7.5 error code 58 Dodge grand caravan everyone the key NTFS partitions, made Source manually copy two components to users whose machines almost completely dead HDD. Magic EaseUS Partition Master is totally free partition manager for home users. Guide & Tips Say, create a new partition to install Windows 7, or extend the full system partition manager software for Windows 7 32 bit and 64 bit and Windows 8. Partition Magic ® is a registered trademark of Symantec Corporation. filemaker pro 12 crack norton partitionmagic 8.05 serial number keylogger for windows Camtasia studio 8 free download for windows 7 32bit vray 3ds max 2010 64 with Powerdvd 10 ultra 3d free download full version sony architect pro 5.2 photoshop lightroom mac serial windows 8 the missing manual captivate 4.
    [Show full text]
  • “Global Positioning Systems” GPS Mean Never Having to Say “I’M Lost”?
    APRIL 2003 VOLUME 19 NUMBER 4 PPCUGPPCUG NEWS A PUBLICATION OF THE PRINCETON PC USERS GROUP Monday April 14, 2003 “Global Positioning Systems” GPS mean never having to say “I’m Lost”? Don Arrowsmith will demonstrate the Garmin Street Pilot III Auto Navigation unit and the MapSource PC software. At Lawrence Library Meetng Rooms 1 & 2 US Route 1 South & Darrah Lane, Lawrenceville, NJ Meetings of an organization at any of the facilities of the Mercer County Library System in No Way implies endorsement of its programs In this issue About PPCUG............................................. 2 Presidents Message .................................. 2 Parcel Pick-up @TCF2003 ........................ 2 Backups-Lite .............................................. 3 New Year’s Resolutions ............................ 4 Member E-mail Directory .......................... 5 General Meeting Minutes ........ Back Cover Digital Photo by: Tom Carman Tom Digital Photo by: President Clarke Walker making his opening remarks to the group at the March general meeting. About PPCUG General Meetings Coming Events Second Monday of the month at the May 3 & 4, 2003 - Trenton Computer Festival Lawrenceville Library. Route 1 and Darrah Lane. May 12, 2003 - Lindow Operating System - Jim Russ 7:00-7:45 PM: Social Time / Tech Corner June 9, 2003 - Batch Files & Scripting - Vic Laurie 7:45 PM: Meeting Comes to Order 8 PM: Featured Presentation July 14, 2003 - Music & Video on Your PC - Don Slepian For information about upcoing meetings or joining PPCUG call 908-218-0778 to leave a message. Board Meetings Presidents Message For Meeting Location, Date and Time, call By: Clarke Walker 908-218-0778 Board meetings are open to All. I want to thank everyone who participated in last month’s “Digital Camera Show, Tell and Shoot”.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Third BUSINES Superbrands-2010-Final 6/1/11 12:46 PM Page 92
    Third BUSINES Superbrands-2010-final 6/1/11 12:46 PM Page 92 Market safeguard and keep open cyber highways is a imminently powerful, year after year. Cyberspace is full of creepy crawlies. Consider source of abiding comfort for millions of In 2007, for instance, International Data the latest gremlins – Pillenz, Bamital, Sefrnit, internet users. Corporation (IDC) recognised Symantec in a Pylespa, Daonol, Zbot and Tidserv and add the Its success can be attributed to keeping its wide range of award categories including Data old, broad-spectrum favourites, spyware, adware, ears to the ground and developing technologies Protection and Recovery; Cross-platform worms, viruses, trojans and spam and you’ve that synchronise with the needs of customers. provider of Clustering and Availability; Email entered the world of cyber crime.These are the To accomplish this feat the company has created Archiving Applications; Security and Vulnerability pests which have made working on a PC or a unique web called the Symantec Global Management; and Policy and Compliance, and laptop a forgettable nightmare.The universal Intelligence Network.This is an extraordinary Host and Vulnerability Software; plus an award quest for a protector has thrown up several resource which provides a real-time view of for software developed for Messaging Security names but the one that has become virtually emerging digital threats almost anywhere in the and Virus Protection. synonymous with computer software, world. With more than 40,000 sensors in 180 In the same year, Gartner rated the company particularly in the realms of security and countries and more than 6200 managed security as Global Market Share Leader in Enterprise information management, is Symantec.
    [Show full text]
  • Overview of Client Management Suite 7.1 Hands-On Lab
    Overview of Client Management Suite 7.1 Hands-On Lab Description If you are new to Altiris Client Management Suite, this lab is an excellent place to start. This introduction lab provides a hands-on overview of the suite going through many steps of IT lifecycle management. It includes the basics on software and patch management, deployment, migration, remote assistance, and more to start you on your path to effective client management. At the end of this lab, • Create an inventory policy and run reports to view the you should be able to collected data • Describe the available methods for delivering and metering software within a real-world environment • Describe the process of staging and deploying patches to systems and applications within a network environment • Use Deployment Solution 7.1 to perform an OS Migration Notes . The lab will be directed and will provide you with step-by- step walkthroughs of key features. Feel free to follow along with the instructor, or you may optionally perform this lab at your own pace. Be sure to ask your instructor any questions you may have. Thank you for coming to our lab session. Introduction Altiris® Client Management Suite™ reduces the total cost of owning client systems by automating time-consuming and redundant tasks. By minimizing the efforts and costs associated with deploying, managing, securing and troubleshooting client systems, organizations can gain control of their environments. This easy-to-use, integrated suite of solution software for Windows, Mac and Linux is designed to address IT management needs for desktop and notebook computers throughout their entire IT lifecycle.
    [Show full text]
  • India Business Volume 2 Symantec Size
    Business Superbrands- 2nd edition(Main) 8/27/08 4:12 AM Page 136 Market 30% of the world’s email traffic. At the as Global Market Share Leader in Enterprise Adware, spyware, worms, viruses, trojans, company’s three security operation centres – Backup; Backup and Recovery Software; Core spam… computer users the world over are one of which is in India – employees analyse Storage Management Software; and Email Active now familiar with these gremlins that often and correlate emerging threats to help Archiving. Between 2006 and 2007, in the make working on a PC or laptop a nightmare. customers prepare for and withstand attacks. Gartner Magic Quadrants, the company was There is a universal quest for a protector.The Powerful protection – and only available from listed as a leader in PC Configuration Life Cycle one name that has become virtually Symantec – is the company credo. Its pedigree Management; Managed Security Services synonymous with computer software, is supported by other illustrious names and Providers (NA); Storage Services; Security particularly in the realms of security and includes industry leaders such as Veritas, Altiris Information and Event Management; Email information management is Symantec. and Brightmail (Source: archival data). Active Archiving; Content Monitoring and Headquartered in Cupertino, California, the Filtering for Data Loss Prevention and Email US$ 5.19 billion (Rs. 20,760 crore) company Achievements Security Boundary. operates in more than 40 countries and is part Its aptitude to successfully integrate acquired During the last two years, the accolades and of the NASDAQ and Fortune 500 listing. technologies has kept Symantec at the front of recognition have been overwhelming.
    [Show full text]