SlideShare uma empresa Scribd logo
1 de 15
Protecting Critical Systems with
Symantec
Chris Collier
Presales Specialist
E: Chris.Collier@arrowecs.co.uk
Agenda
• Introduction
• What is a Critical System?
• Symantec Critical System Protection
• Common Customer Requirements
• Use Case
• Summary
• Q&A
2
What is a Critical System?
What is a Critical System?
Symantec Critical System Protection
Product Description
Symantec Critical System Protection secures physical and virtual
servers.
Proactively
safeguard server
environments
• Restrict application and OS behavior
• Protect against zero day threats
• Monitor approved applications
Granular, policy-
based controls
Defends physical and virtual servers.
• Monitor and protect physical and virtual data centers
• Provide granular, policy-based controls
• Use host-based intrusion detection (HIDS), intrusion
prevention (HIPS), and least-privilege access control
OS Support
– Microsoft Windows
– Sun Solaris®
– Red Hat® Linux
– SUSE Linux
– HP-UX®
– IBM AIX®
– VMware ESX Console OS
7
http://www.symantec.com/connect/blogs/symantec-critical-system-protection-hack-proof-black-hat
8
Black Hat Conference 2012
- A “Capture the flag” event
- Unpatched Windows 2003 server
- Running several vulnerable applications,
- Protected by Symantec solutions. – SEP & CSP
- More than 50 skilled hackers
- The Symantec protected systems remained hack-proof
Customer Requirements
Customer Requirements
Use Case
Use Case: VMware Customer
• Target Segments: Financial Services, technology.
public sector, manufacturing, healthcare
• Business driver: Moving business onto the cloud
to lower capital and operating expenses.
• Potential Background: Building cloud
infrastructure using vSphere.
• Feature: Symantec Critical System Protection
completely protects vSphere. It is a single solution
that protects the ESX and ESXi Hypervisors and
vCenter as well as Windows and non-Windows
guest virtual machines.
• Outcome: Physical and virtual servers are
hardened and secured from attack.
• Key Question: “What are you doing to protect the
Hypervisor?”
Summary
Summary
– Critical systems need extra security
– There are multiple opportunities for this product to be positioned.
– Physical Security
– Virtualisation Security
– Legacy & Non-Legacy System Security
– Broad Platform Support
– Proven Technology from Market Leading Security Vendor
Questions?

Mais conteúdo relacionado

Mais de Arrow ECS UK

2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internet2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internet
Arrow ECS UK
 

Mais de Arrow ECS UK (20)

Arrow Live Class Link
Arrow Live Class LinkArrow Live Class Link
Arrow Live Class Link
 
Arrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business PartnersArrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business Partners
 
2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internet2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internet
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald PresentationArrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
 
Arrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart SimmonsArrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart Simmons
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonaldArrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonald
 
Arrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian FrenchArrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian French
 
Arrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David FearneArrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David Fearne
 
Arrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete StoryArrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete Story
 
Helping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBMHelping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBM
 
Arrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV JamArrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV Jam
 
IBM Business Analytics Marketing Overview
IBM Business Analytics Marketing OverviewIBM Business Analytics Marketing Overview
IBM Business Analytics Marketing Overview
 
Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...
 
IBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan templateIBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan template
 
How to Win against the Competition
How to Win against the CompetitionHow to Win against the Competition
How to Win against the Competition
 
Align IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business PartnersAlign IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business Partners
 
Working with the IBM Business Analytics Channel
Working with the IBM Business Analytics ChannelWorking with the IBM Business Analytics Channel
Working with the IBM Business Analytics Channel
 
Big Data & Information Management Channel Manager
Big Data & Information Management Channel ManagerBig Data & Information Management Channel Manager
Big Data & Information Management Channel Manager
 
Business Partner Product Enablement Roadmap, IBM Predictive Analytics
Business Partner Product Enablement Roadmap, IBM Predictive AnalyticsBusiness Partner Product Enablement Roadmap, IBM Predictive Analytics
Business Partner Product Enablement Roadmap, IBM Predictive Analytics
 
Data Retention and eDiscovery from Symantec
Data Retention and eDiscovery from SymantecData Retention and eDiscovery from Symantec
Data Retention and eDiscovery from Symantec
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Protecting Critical Systems with Symantec

  • 1. Protecting Critical Systems with Symantec Chris Collier Presales Specialist E: Chris.Collier@arrowecs.co.uk
  • 2. Agenda • Introduction • What is a Critical System? • Symantec Critical System Protection • Common Customer Requirements • Use Case • Summary • Q&A 2
  • 3. What is a Critical System?
  • 4. What is a Critical System?
  • 6. Product Description Symantec Critical System Protection secures physical and virtual servers. Proactively safeguard server environments • Restrict application and OS behavior • Protect against zero day threats • Monitor approved applications Granular, policy- based controls Defends physical and virtual servers. • Monitor and protect physical and virtual data centers • Provide granular, policy-based controls • Use host-based intrusion detection (HIDS), intrusion prevention (HIPS), and least-privilege access control
  • 7. OS Support – Microsoft Windows – Sun Solaris® – Red Hat® Linux – SUSE Linux – HP-UX® – IBM AIX® – VMware ESX Console OS 7
  • 8. http://www.symantec.com/connect/blogs/symantec-critical-system-protection-hack-proof-black-hat 8 Black Hat Conference 2012 - A “Capture the flag” event - Unpatched Windows 2003 server - Running several vulnerable applications, - Protected by Symantec solutions. – SEP & CSP - More than 50 skilled hackers - The Symantec protected systems remained hack-proof
  • 12. Use Case: VMware Customer • Target Segments: Financial Services, technology. public sector, manufacturing, healthcare • Business driver: Moving business onto the cloud to lower capital and operating expenses. • Potential Background: Building cloud infrastructure using vSphere. • Feature: Symantec Critical System Protection completely protects vSphere. It is a single solution that protects the ESX and ESXi Hypervisors and vCenter as well as Windows and non-Windows guest virtual machines. • Outcome: Physical and virtual servers are hardened and secured from attack. • Key Question: “What are you doing to protect the Hypervisor?”
  • 14. Summary – Critical systems need extra security – There are multiple opportunities for this product to be positioned. – Physical Security – Virtualisation Security – Legacy & Non-Legacy System Security – Broad Platform Support – Proven Technology from Market Leading Security Vendor

Notas do Editor

  1. Control Compliance Suite is a modular solution, comprising of seven key components.These components are fully interoperable and available separately or as part of the broader suite. Key infrastructure capabilities available with all modules include a unique and highly scalable data framework to normalize and analyse large volumes of data, customizable Web-based dashboards and reports, and workflow integration with remediation ticketing systems.Symantec™ Control Compliance Suite Risk Manager conveys the impact of IT risk in business-relevant terms. You can work with business leaders to identify IT risk thresholds, assign ownership, and track risk reduction over time.Symantec™ Control Compliance Suite Policy Manager simplifies policy management with out-of-the-box policy content for multiple mandates, automatically mapped to controls and updated on a quarterly basis.Symantec™ Control Compliance Suite Standards Manager is an industry-leading configuration assessment solution designed to evaluate if systems are secured, configured, and patched according to standards.Symantec™ Control Compliance Suite Vulnerability Manager performs end-to-end vulnerability assessment of Web applications, databases, servers, and network devices, delivering a single view of security threats across your IT infrastructure.Symantec™ Control Compliance Suite Assessment Manager simplifies the evaluation of procedural controls by providing automated Web-based questionnaires. These questionnaires can also be used to evaluate overall employee security awareness.Symantec™ Control Compliance Suite Virtualization Security Manager allows you to confidently take advantage of the benefits of virtualization without worrying about degrading your security or compliance posture.Symantec™ Control Compliance Suite Vendor Risk Manager allows you to actively assess and monitor your vendor risk exposure to safeguard your sensitive data and reduce overall business risk.
  2. Symantec Control Compliance Suite
  3. Symantec Critical System Protection completely protects vSphere, the leading virtualization platform for building cloud infrastructures. Symantec’s ability to protect vSphere is a competitive advantage against all key competitors. It is a single solution to harden virtual and physical servers that works well for any regulated industry where a company is required to demonstrate compliance. Open the conversation with any VMware customer by asking the question: “What are you doing to protect the Hypervisor?”