Symantec Event Template

Total Page:16

File Type:pdf, Size:1020Kb

Symantec Event Template ST B02 Profiting from the Cloud New revenue streams with Security and Information Protection services Arnaud Taddei EMEA Cloud Solution Architect – Service Providers and Telcos Your Route to SUCCESS 1 What Matters for Telcos and Service Providers 2 Symantec Unique Value Proposition 3 Mature Services co-Launched on Market 4 Nascent Services being launched on Market 5 Securing the Cloud = Brand Protection + More $$ SYMANTEC VISION 2012 What Matters for Telcos and Service Providers? SYMANTEC VISION 2012 Key Challenges for Service Providers today … From Risk and Cost #2 Reduce Churn (Improve Stickiness!) Brand Protection #3 #4 Impact of Regulation For the SP & Their Customer Reducing Total #5 Cost of Ownership SYMANTEC VISION 2012 Key Challenges for Service Providers today … Into Opportunity for Growth! Business Generation #1 to Improve Revenues #2 Reduce Churn (Improve Stickiness!) Brand Protection #3 #4 Impact of Regulation For the SP & Their Customer Reducing Total #5 Cost of Ownership SYMANTEC VISION 2012 Key Challenges for Communication Service Providers Symantec & Norton Solutions Improve Service Levels Generate new Business #1 and Customer Satisfaction Improve ARPU Reduce Complexity,#2 Reduce DriveChurn Standardization,Increase BSS Integration Customer Lifetime Value Protect Brand #3 Differentiate Protect Information and Devices (Endpoints, Servers, Carrier Network) #4 Demonstrate Compliance Fulfill EU Directives and Reduce TCO #5 Voluntary Frameworks Fast Time to Market Monetize Information Protection & Mgmt. for Consumers and Enterprises SYMANTEC VISION 2012 Summary of the requirements Service Provider / Telco ASK • 5 years of Experience at Symantec shows • Tactical Approach – Might want to discuss one solution to put on their market OR • Strategic Partnership Approach – Multiple services to launch (up to 13 per Telco so far!) – Revenue Generation • Which pauses the question of Sales Enablement, Channel, GTM – AND Brand Protection (Driver 1 and Driver 3) • Which pauses the question of the SOC SYMANTEC VISION 2012 How to Work with Symantec on which Revenue Streams Portfolio SYMANTEC VISION 2012 The ingredients for Strategic Partnership CSPs / Outsourcers Customers Consume Symantec Build Products Extend Symantec Services New CSP Consumers Cloud / Mobile SMBs Enterprises Cube Architecture Framework Services xSP Licensing Programs Symantec CSP Solution Architects Service Co-Marketing SYMANTEC VISION 2012 Consume Extend Build Use Case Examples Category Use Cases Examples • Leverage security as a service from the SYMC Cloud • VIP Consume • Cloud management service with onprem agents • Email Security.cloud • Hybrid app, onprem mgmt with a cloud module • BE.Cloud • Extend onprem security management with SaaS agents • CCS with SFDC agent Extend • Deploy security protection in IaaS • SEP agent in AWS • Backup to local as well as cloud storage targets • NBU to Nirvanix • SYMC technology embedded in 3rd party cloud app • SSL in SFDC Build • Software in public cloud to protect infrastructure • SMF / EV in Email aaS • Deploy software in private cloud to protect customer • CSP hardens *aaS servers SYMANTEC VISION 2012 The Joint Service Stack for CSPs – A Partner Play Cloud Brokerage Services O3 Corp. & Cons. Control Serv. NGNP Enterprise / Parental Controls IT Compliance Services Control Compliance Suite, DLP, Vulnerability Mgmt. Archiving Services EV. Cloud, Enterprise Vault, NGNP (Mobile Messaging) Sec. Personal Cloud Services Norton Zone Customers & Backup Services BE.cloud, NBU, Norton Online Backup, Norton 360 Target Market Storage Services Storage Foundation, VOM Enterprise Secure M2M Services MPKI for Device Authentication (Smart Meter, ...) SME Authentication Services VIP, VIP Mobile, MPKI SoHo Encryption Services PGP, O3, Norton Anti-Theft, Norton Hotspot Privacy Consumer Application Mgmt. Services Apps Center Residential Personal Care Services Norton Live Services CSP SERVICES ENABLEMENT CSP SERVICES M2M Endpoint Mgmt. Services Client Management Suite, Symantec Mobile Management Endpoint Security Services SEP, Norton Internet/Mobile Security, SCSP Safe Web Services Norton DNS, Norton Identity Safe Security Intelligence Services Deepsight, SymDroid, Reputation Services, MSS SYMANTEC SYMANTEC Clean Pipe Services Symantec.cloud, NGNP, SBTS, SBMF, Norton Power Eraser ExSP & SSP Service Provider Buying Programs “Pay as you grow” Shared & Managed Services SYMANTEC VISION 2012 What is trend vs nascent? (includes Residential, SOHO, SMB, Enterprise segments) • Current areas of Services being launched – Clean Pipe (including Core Network, Mail Traffic, Web Traffic, etc.) – Data Protection (including Backup, Cloud Backup, Archiving, etc.) – Endpoint Security (Fixed, Mobile Devices, etc.) – Cloud Brokerage (includes O3, .cloud in Market Places, etc.) • Nascent Situations – Public SOC powered by MSS to secure the cloud + to provide Public SOC – Many new demands to extend clouds with Encryption, VIP, CSP, DLP, etc. – From Securing the Cloud as a major concern … – … To turn the problem into a new revenue stream with CCS, DLP, CSP, etc. SYMANTEC VISION 2012 Some Clean Pipe Use Cases SYMANTEC VISION 2012 Clean Pipe is a fundamental topic • 2 Marketing Good News – Tap Water as we know is ‘clean’ … What’s coming out of Data Pipes is ‘dirty’ – How to market water … it is the same for everyone. Yet, Nestlé, etc. gave it a brand! • Limited to Messaging Security 5 years ago • Impacted by the Outbound Spam issues 4 years ago • Moved to Web Security 3 years ago • Entered Core Network Security 2 years ago • Now under re-definition – Parental Control, Anti-Botnet, – SMS Anti-Spam, SMS Anti-Fraud, – Country level Data Rentention projects – Strong Link to the Device (see Device and Endpoint based Services) SYMANTEC VISION 2012 TELENOR– Secure Messaging services to Enterprises Partnering for success – Building solution competition cannot • Customer Requirements: – Clean Pipe Solution… – …with per customer quarantine – …and Customer Self-Care – Not exactly the best fit for Symantec Messaging Gateway ! • Architect’s job – Collect the bricks to build a solution from the requirements – Find a messaging technology partner: Message Systems – Build the architecture with Symantec products: Traffic Shaper and Message Filter – Articulate the requirements to cover the missing features – Adapt the Solution to moving requirements ! SYMANTEC VISION 2012 TELENOR– Secure Messaging services to Enterprises Final Architecture Web UI Sun T6320 Web Server Zone Customer Customer Admin Admin modifies domain and user preferences Postgres DB zone Quarantine Storage Delivery to Quarantine based on domain or user preferences Quarantine Zone Mail routing decision based on Customer preferences Symantec Brightmail Momentum Cluster Node Traffic Shaper in active- N+1 Failover active Sun T6320 VIP1 Internet VRRP Failover Database Synchronisation Queue Storage VIP2 Momentum Cluster Manager Sun T6320 DB and Logs SYMANTEC VISION 2012 TELENOR– Secure Messaging services to Enterprises Immediate benefit to Telenor’s customer 200% Clean mail volume increase 90% Spam volume decrease SYMANTEC VISION 2012 NGNP: Network-based security management Radio Access Mobile Core Network Service Layer Internet Network (RAN) Virus Subscriber Notification and Malware Recovery Option … MMSC SMSC Consumers INTERNET SGSN GGSN Mail WAP Malware Traffic Analysis Recovery Option Module Next Generation Network Protection Enterprises NGNP addresses both customer segments, consumer and enterprise SYMANTEC VISION 2012 NGNP: Cross-selling the Norton portfolio • Norton Internet Security Radio Access Mobile Core Network •Service Norton Layer Mobile Security Internet Network (RAN) • Norton Tablet Security • Norton 360 Virus • Norton Power Eraser, ... Subscriber Notification and Malware Recovery Option … MMSC SMSC Consumers INTERNET SGSN GGSN Mail WAP Malware Traffic Analysis Recovery Option Module Next Generation Network Protection Enterprises NGNP addresses both customer segments, consumer and enterprise SYMANTEC VISION 2012 Total solution from “Beeline” «Parental Control» is implemented according to clean pipe principle - negative Internet content is not delivered to home, connected to the service. Features of “Parental Control” 1. Content Filtration Offers different categories to block the content, including the pre-defined ones for the different age of child. «up to 7 years», «from 7 to 12 years» «older 13 years» + 6 additional options 2. Time control Allows to limit the internet connectivity for the child, by managing daily and weekly calendar. 3. Report about visited Internet resources Allows to get the detailed report about internet sites visited by children by getting it to the e-mail on weekly or monthly basis. Additional option Network antivirus Provides high level protection for downloading traffic, no software installation to the client PC is required SYMANTEC VISION 2012 Some Data Protection Examples SYMANTEC VISION 2012 Data Protection is entering new patterns • From Hosted Backup and Archive 5 years ago (Cybernest) • To Remote Backup Services 3 years ago (HP) • Now to new patterns – Cloud Backup (a la Nirvanix) • A push model that helps cloud transformation – That is pushing the need for APPLIANCES (everyone forgets RESTORE!) – Cloud based Backup • NOBU for File Restore and BE.Cloud – And Cloud Archiving • EV.Cloud – To Collaboration Services • Norton Zone SYMANTEC VISION 2012 Who is Cybernest? • Telkom SA is the incumbent Fixed Line Telco in South Africa • Telkom SA has two strategic new business development
Recommended publications
  • Overview of Client Management Suite 7.1 Hands-On Lab
    Overview of Client Management Suite 7.1 Hands-On Lab Description If you are new to Altiris Client Management Suite, this lab is an excellent place to start. This introduction lab provides a hands-on overview of the suite going through many steps of IT lifecycle management. It includes the basics on software and patch management, deployment, migration, remote assistance, and more to start you on your path to effective client management. At the end of this lab, • Create an inventory policy and run reports to view the you should be able to collected data • Describe the available methods for delivering and metering software within a real-world environment • Describe the process of staging and deploying patches to systems and applications within a network environment • Use Deployment Solution 7.1 to perform an OS Migration Notes . The lab will be directed and will provide you with step-by- step walkthroughs of key features. Feel free to follow along with the instructor, or you may optionally perform this lab at your own pace. Be sure to ask your instructor any questions you may have. Thank you for coming to our lab session. Introduction Altiris® Client Management Suite™ reduces the total cost of owning client systems by automating time-consuming and redundant tasks. By minimizing the efforts and costs associated with deploying, managing, securing and troubleshooting client systems, organizations can gain control of their environments. This easy-to-use, integrated suite of solution software for Windows, Mac and Linux is designed to address IT management needs for desktop and notebook computers throughout their entire IT lifecycle.
    [Show full text]
  • India Business Volume 2 Symantec Size
    Business Superbrands- 2nd edition(Main) 8/27/08 4:12 AM Page 136 Market 30% of the world’s email traffic. At the as Global Market Share Leader in Enterprise Adware, spyware, worms, viruses, trojans, company’s three security operation centres – Backup; Backup and Recovery Software; Core spam… computer users the world over are one of which is in India – employees analyse Storage Management Software; and Email Active now familiar with these gremlins that often and correlate emerging threats to help Archiving. Between 2006 and 2007, in the make working on a PC or laptop a nightmare. customers prepare for and withstand attacks. Gartner Magic Quadrants, the company was There is a universal quest for a protector.The Powerful protection – and only available from listed as a leader in PC Configuration Life Cycle one name that has become virtually Symantec – is the company credo. Its pedigree Management; Managed Security Services synonymous with computer software, is supported by other illustrious names and Providers (NA); Storage Services; Security particularly in the realms of security and includes industry leaders such as Veritas, Altiris Information and Event Management; Email information management is Symantec. and Brightmail (Source: archival data). Active Archiving; Content Monitoring and Headquartered in Cupertino, California, the Filtering for Data Loss Prevention and Email US$ 5.19 billion (Rs. 20,760 crore) company Achievements Security Boundary. operates in more than 40 countries and is part Its aptitude to successfully integrate acquired During the last two years, the accolades and of the NASDAQ and Fortune 500 listing. technologies has kept Symantec at the front of recognition have been overwhelming.
    [Show full text]
  • Altiris™ Software Management Solution 7.1 SP2 from Symantec™ User Guide Altiris™ Software Management Solution 7.1 SP2 from Symantec™ User Guide
    Altiris™ Software Management Solution 7.1 SP2 from Symantec™ User Guide Altiris™ Software Management Solution 7.1 SP2 from Symantec™ User Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Legal Notice Copyright © 2011 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Altiris are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations.
    [Show full text]
  • Server Management Suite 8.1 Release Notes
    Symantec™ Server Management Suite 8.1 powered by Altiris™ technology Release Notes Symantec™ Server Management Suite 8.1 powered by Altiris™ technology Release Notes Legal Notice Copyright © 2017 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo and Altiris and Symantec or Altiris are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. Symantec Corporation 350 Ellis Street Mountain View, CA 94043 http://www.symantec.com Technical Support Symantec Technical Support maintains support centers globally. Technical Support’s primary role is to respond to specific queries about product features and functionality. The Technical Support group also creates content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion.
    [Show full text]
  • Overall Messaging/Description (We'll Want to Highlight
    Storage and Availability Management Group Data Protection Group At-a-Glance PROFILE Symantec provides enterprise customers with storage management, high availability and data protection solutions across heterogeneous storage and server platforms in both physical and virtual environments. These solutions enable companies to standardize on a single layer of infrastructure software that works on every major distributed operating system and supports every major storage device, database and application. Storage and Availability Management – Symantec’s storage management and high availability family of products provide storage management, storage resource management, storage utilization management, storage area network, or SAN management, storage virtualization and replication, allowing enterprises to ensure the availability of critical applications and data. Products include Veritas CommandCentral Storage, Veritas Storage Foundation and Veritas Cluster Server. Data Protection – Symantec’s data protection family of products is designed to ensure successful backup and recovery of information and systems for organizations across all market segments, from small and medium-sized businesses to large enterprises, using the latest disk, tape, deduplication, indexing and virtual technologies. Products include Veritas NetBackup Platform, Symantec Backup Exec and Symantec Backup Exec System Recovery. LEADERSHIP • Rob Soderbery, senior vice president, Storage and Availability Management Group • Deepak Mohan, senior vice president, Data Protection Group Symantec Corp., 2008 1 STORAGE AND AVAILABILITY MANAGEMENT PRODUCTS Veritas Storage Foundation Veritas Storage Foundation from Symantec provides a complete solution for heterogeneous online storage management. Based on the industry-leading Veritas Volume Manager and Veritas File System, it provides a standard set of integrated tools to centrally manage explosive data growth, maximize storage hardware investments, provide data protection and adapt to changing business requirements.
    [Show full text]
  • Gartner's Magic Quadrant for Endpoint Protection Platform 2010
    Magic Quadrant for Endpoint Protection Platforms Gartner RAS Core Research Note G00208912, Peter Firstbrook, John Girard, Neil MacDonald, 17 December 2010, R3563 01092012 Malware effectiveness continues to accelerate, while vendors are busy polishing increasingly ineffective solutions and doing little to fundamentally reduce the attack surface and protect users. WHAT YOU NEED TO KNOW • This year’s analysis did not show considerable movement of vendors from last year’s analysis. • Malware detection accuracy has not improved significantly, while malware is improving in efficiency and volume. • The inclusion of basic vulnerability and configuration management in endpoint protection platform (EPP) suites is still low as vendors continue to focus on signature-based defenses rather than addressing root causes. • Application control (also referred to as “default deny” or “whitelisting”) holds significant promise, but with a few exceptions, most of the vendors in this analysis do not provide flexible enough solutions for larger enterprises. MAGIC QUADRANT Market Overview The threat environment continues to outpace improvements in malware detection effectiveness. High-profile attacks, such as Aurora and Stuxnet in 2010, illustrate the growing sophistication of malware attacks. While the volume and effectiveness of malware are growing rapidly, there have been few effective improvements in EPP vendors’ defensive technologies. Gartner clients are increasingly frustrated with having to clean PCs from well- known consumer infections like “Fake AV” and are concerned about the potential impact of more stealthy, undetected, targeted attacks. Signature-based malware detection has been limping along on life support for years, yet vendors seem unwilling to aggressively invest in more-effective solutions, preferring to “tweak” the existing paradigm.
    [Show full text]
  • Altiris™ IT Analytics Solution 7.1 SP2 from Symantec™ User Guide Altiris™ IT Analytics Solution 7.1 from Symantec™ User Guide
    Altiris™ IT Analytics Solution 7.1 SP2 from Symantec™ User Guide Altiris™ IT Analytics Solution 7.1 from Symantec™ User Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Legal Notice Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo, Altiris, and any Altiris or Symantec trademarks are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This Symantec product may contain third party software for which Symantec is required to provide attribution to the third party (“Third Party Programs”). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Please see the Third Party Legal Notice Appendix to this Documentation or TPIP ReadMe File accompanying this Symantec product for more information on the Third Party Programs. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.
    [Show full text]
  • Altiris™ Software Management Solution from Symantec Users Guide
    Altiris™ Software Management Solution from Symantec Users Guide Version 7.0 SP2 Altiris™ Software Management Solution from Symantec Users Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 7.0 SP2 Legal Notice Copyright © 2010 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Altiris are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations.
    [Show full text]
  • HOW to USE THIS DOCUMENT: Buying Programs
    ___________________________________________________________________________________ HOW TO USE THIS DOCUMENT: You can find a key word to use in your search on the repository. • You can use Ctrl + F to search this entire document. • You can also jump to a particular group and manually scroll. Buying Programs Which includes: Express Buying Program Certificate Services Which includes: MPKI for SSL; SSL Certificate; Roots and Audits; Managed PKI (MPKI) Online Services Which includes: CloudSOC (CASB) (formerly Elastica); Web Security Service; DLP Cloud; VIP; Cyber Security Services Education and Technical Services Which includes Customer Success; Training Consumer Software Which includes Norton Enterprise Software Which includes SEP and ATP Version 2019.09.20 ___________________________________________________________________________________ Buying Programs Use These Key Word To Look for These Associated Documents Express Buying Program • Express Buying Program Terms and Conditions [Back to Top] Version 2019.09.20 ___________________________________________________________________________________ Certificate Services Symantec completed its divestiture of its certificate services to DigiCert on October 31, 2017. For standard agreements, service descriptions, audit reports and root policies relevant to the Certificate Authority business (including Symantec, Thawte, GeoTrust, and RapidSSL), please visit the Certificate Authority Repository. [Back to Top] Version 2019.09.20 ___________________________________________________________________________________
    [Show full text]
  • Altiris Symantec™ Endpoint Protection Integration Component 7.1 SP2 User Guide Altiris Symantec™ Endpoint Protection Integration Component 7.1 SP2 User Guide
    Altiris Symantec™ Endpoint Protection Integration Component 7.1 SP2 User Guide Altiris Symantec™ Endpoint Protection Integration Component 7.1 SP2 User Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Legal Notice Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo, Altiris, and any Altiris or Symantec trademarks are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations.
    [Show full text]
  • Magic Quadrant for Endpoint Protection Platforms Published: 2 January 2013
    This research note is restricted to the personal use of [email protected] G00239869 Magic Quadrant for Endpoint Protection Platforms Published: 2 January 2013 Analyst(s): Peter Firstbrook, John Girard, Neil MacDonald The endpoint protection platform provides a collection of security utilities to protect PCs and tablets. Vendors in this market compete on the quality of their protection capabilities, the depth and breadth of features, and the ease of administration. Strategic Planning Assumption By 2017, more than 50% of end-user devices will be restricted to running only apps that have been preinspected for security and privacy risks, up from 20% today. Market Definition/Description The enterprise endpoint protection platform (EPP) market is a composite market primarily made up of collections of products. These include: ■ Anti-malware ■ Anti-spyware ■ Personal firewalls ■ Host-based intrusion prevention ■ Port and device control ■ Full-disk and file encryption, also known as mobile data protection ■ Endpoint data loss prevention (DLP) ■ Vulnerability assessment ■ Application control (see Note 1) ■ Mobile device management (MDM) These products and features are typically centrally managed and ideally integrated by shared policies. This research note is restricted to the personal use of [email protected] This research note is restricted to the personal use of [email protected] DLP, MDM and vulnerability assessment are also evaluated in their own Magic Quadrant or MarketScope analyses. Longer term, portions of these markets will get subsumed by the EPP market, as the personal firewall, host intrusion prevention, device control and anti-spyware markets have in the past. EPP suites are a logical place for convergence of these functions.
    [Show full text]
  • List of Applications Updated in ARL #2554
    List of Applications Updated in ARL #2554 Application Name Publisher SyncBackLite 8.6 2BrightSparks TaxACT 2001 2nd Story Software TaxACT 2003 2nd Story Software TaxACT 2004 2nd Story Software TaxACT 2005 2nd Story Software 3DxWare 3Dconnexion 3DxWare 10 3Dconnexion HotDocs 6.3 AbacusNext PROMOD IV 11 ABB FineReader 6 Professional ABBYY Typora 0.9 Abner Lee AccuWeather Desktop 1.8 AccuWeather ACDSee 3.1 ACD Systems ACDSee 7 ACD Systems ACDSee Pro 7.0 ACD Systems Acoustica CD/DVD Label Maker Acoustica CutePDF Writer 3 Acro Software ISO Burner 1.1 Active Data Recovery Software FlySpeed SQL Query 3.3 ActiveDBSoft ActivePerl 5.16 ActiveState Rome - Total War 1.0 Activision Visual Lighting 2.4 Acuity Brands Lighting Easy-CD Pro 2.0 Adaptec OneSite 5.6 Adaptiva Acrobat 1 Adobe Acrobat 2 Adobe Acrobat 4 Adobe Acrobat 6 Pro Adobe Acrobat 7.0 Pro Adobe Acrobat DC (2019) Adobe Acrobat DC (2020) Continuous Adobe Acrobat Reader 6 Adobe Acrobat Reader 7 Adobe Acrobat Reader DC Adobe AcroTray Adobe AcroTray XI Adobe After Effects CC (2015) - UNAUTHORIZED Adobe After Effects CC (2018) Adobe After Effects CC (2019) Adobe After Effects CC (2020) Adobe Animate CC (2017) - UNAUTHORIZED Adobe Animate CC (2019) Adobe Animate CC (2020) Adobe Audition CC (2015) - UNAUTHORIZED Adobe Audition CC (2020) Adobe Authorware Runtime 4 Adobe Authorware Runtime 5 Adobe Authorware Runtime 7 Adobe Authorware Web Player 6 Adobe Bridge CC (2020) Adobe Capture Classic FormFlow Filler 2.2 Adobe Character Animator CC (2020) Adobe Connect 2019.3 Adobe Connect 2020.1 Adobe Contribute
    [Show full text]