SlideShare uma empresa Scribd logo
1 de 1
DO NOTHING:
Systems will still run, partner and user
communities will help, but systems will be
open to a significant security threat
HARDWARE REPLACEMENT:
Upgrade out of maintenance physical servers
CUSTOM SUPPORT:
For-fee custom support can be costly and time-consuming
VIRTUALIZATION/CLOUD:
To achieve cost, complexity and
management benefits
PROTECTION:
Use a 3rd party product to secure servers and data, removing the time-critical need to upgrade
THE REALISATION NOW IS THAT
AFTER 14 JULY 2015 MISSION AND BUSINESS
CRITICAL APPLICATIONS ARE AT RISK
Migration carries significant challenge on
resources and information protection
Expensive custom contracts to maintain
unsupported platforms and applications
NO Technical support NO Incident support
NO Security patches NO Product hot fixes
MICROSOFT WINDOWS 2003 SERVER MIGRATION
ARE YOU READY?
?? ?
THE QUESTION IS, HOW WILL YOU MANAGE YOUR COSTS
AND MITIGATE THE RISKS?
WHAT DOES THIS MEAN
FOR MY BUSINESS
JULY
2015
14 =
STANDARDISATION
THE SUPPORT OF BYOD
MOBILITY
PRIVATE, HYBRID AND PUBLIC CLOUD
BUSINESSES ARE DRIVING FOR...
RISK
COST
Regulated industries may be fined or risk being
cut off from key trading partners who want to
protect their own compliance status
Increased vulnerability to cyber attacks and
data breach
SECURITY
COMPLIANCE
?? ?WHAT SHOULD I DO
WITH THE CHANGE IN THE
TECHNOLOGY LANDSCAPE
THE PRESSURES ON IT HAVE
BECOME MORE DEMANDING!
MICROSOFT’S EXTENDED SUPPORT OF WINDOWS 2003 SERVER ENDS IN JULY 2015. Posing potential
problems for some 10M instances of Windows that exist and the business critical systems that depend on it.
Although this doesn’t mean everything will stop working, it does mean that systems are open to potential security
risks and not conforming to regulatory compliance demands.
JULY
2015
14
2015
WHAT ARE MY
OPTIONS?
PROTECT AND
SECURE
INCREASE
APPLICATION
AVAILABILITY
MITIGATE
TRANSFORMATIONAL
RISK
DATA IS #1 PRIORITY
GUARANTEE VISIBILITY
ACROSS NEW AND
EXISTING PLATFORMS
LOWER THE SUPPORT
AND OPERATIONAL
COSTS
SYMANTEC PROTECT MORE
SYSTEMS IN THE SECURITY
SOFTWARE SPACE
THAN ANY OTHER
COMPANY
SYMANTEC BACK-UP OVER
50%
OF THE WORLDS
INFORMATION
SYMANTEC PROTECT
200 MILLION
END POINT DEVICES
THE SYMANTEC GLOBAL
INTELLIGENCE NETWORK
PROVIDES THE VERY BEST IN
SECURITY UPDATES, INSIGHT
AND GUIDANCE
CRITICAL SYSTEMS ARE SO IMPORTANT THAT YOU CANNOT
AFFORD DOWNTIME OR PERFORMANCE ISSUES. The clock is
ticking to migrate from Windows Server 2003 but it is still a key platform
that underpins your many business critical services.
DEVELOP A STRATEGY for mitigating the risk of
vulnerability, while establishing a plan for migration
DISCOVER:
Understand what applications
and workloads are being
supported
ASSESS:
Create inventory categorised
by type, importance and
complexity
TARGET:
Choose an outcome for
each application
MAP:
Match the inventory against
business risk/criticality
4.6 BILLION
CONNECTED THINGS
GIN
WHY SYMANTEC?
www.symantec.co.ukCopyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks
of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 01/15.
FIND OUT MORE
Symantec can offer a unique alternative that will extend the life of your Windows 2003
systems that is cost effective and increases your security profile.
PLATFORM LAUNCH
First camera phone
iTunes
Xbox Live/online gaming
2003
Google Apps
20102006
Amazon web
services
A
2004
Facebook Google Glass
20132007
iPhone iPad
2009
SINCE THE LAUNCH OF WINDOWS 2003 TECHNOLOGY HAS ADVANCED
REGISTER for the webinar to find out how, visit know.symantec.com/WindowsServer2003

Mais conteúdo relacionado

Mais procurados

Securing Your Network
Securing Your NetworkSecuring Your Network
Securing Your NetworkePlus
 
Thinking of choosing Sophos?
Thinking of choosing Sophos?Thinking of choosing Sophos?
Thinking of choosing Sophos?Symantec
 
I.T. Geeks Can't Talk to Management
I.T. Geeks Can't Talk to ManagementI.T. Geeks Can't Talk to Management
I.T. Geeks Can't Talk to ManagementTripwire
 
Dedicated Servers Cheap
Dedicated Servers CheapDedicated Servers Cheap
Dedicated Servers CheapMedha Hosting
 
Broadening Your Cybersecurity Mindset
Broadening Your Cybersecurity MindsetBroadening Your Cybersecurity Mindset
Broadening Your Cybersecurity MindsetCSI Solutions
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operationsPiyush Jain
 
Tripwire enterprise 87_datasheet
Tripwire enterprise 87_datasheetTripwire enterprise 87_datasheet
Tripwire enterprise 87_datasheetDevaraj Sl
 
Addressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeAddressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeePlus
 
Vidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solutionVidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solutionVidSys, Inc.
 
Physical Security Information Management Solution for the Enterprise
Physical Security Information Management Solution for the EnterprisePhysical Security Information Management Solution for the Enterprise
Physical Security Information Management Solution for the EnterpriseVidSys, Inc.
 
Endpoint and mobile security
Endpoint and mobile securityEndpoint and mobile security
Endpoint and mobile securityKen Van Hasselt
 
Open Source and Security: Engineering Security by Design - Prague, December 2011
Open Source and Security: Engineering Security by Design - Prague, December 2011Open Source and Security: Engineering Security by Design - Prague, December 2011
Open Source and Security: Engineering Security by Design - Prague, December 2011Jeremy Brown
 
collateral_datasheet_sungard
collateral_datasheet_sungardcollateral_datasheet_sungard
collateral_datasheet_sungardCheryl Goldberg
 
Qualys Brochure for CISOs
Qualys Brochure for CISOsQualys Brochure for CISOs
Qualys Brochure for CISOsQualys
 
Level Up to a Seamless End-User Experience
Level Up to a Seamless End-User ExperienceLevel Up to a Seamless End-User Experience
Level Up to a Seamless End-User ExperienceVMware
 
[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and Endpoints[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and EndpointsSymantec
 
Voyss Cloud-Based Managed Services Webinar 9-14-12
 Voyss Cloud-Based Managed Services Webinar 9-14-12 Voyss Cloud-Based Managed Services Webinar 9-14-12
Voyss Cloud-Based Managed Services Webinar 9-14-12mjamesvoyss
 
Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.Ignyte Assurance Platform
 

Mais procurados (20)

Securing Your Network
Securing Your NetworkSecuring Your Network
Securing Your Network
 
Thinking of choosing Sophos?
Thinking of choosing Sophos?Thinking of choosing Sophos?
Thinking of choosing Sophos?
 
I.T. Geeks Can't Talk to Management
I.T. Geeks Can't Talk to ManagementI.T. Geeks Can't Talk to Management
I.T. Geeks Can't Talk to Management
 
SanerNow platform-datasheet
SanerNow platform-datasheetSanerNow platform-datasheet
SanerNow platform-datasheet
 
Dedicated Servers Cheap
Dedicated Servers CheapDedicated Servers Cheap
Dedicated Servers Cheap
 
Broadening Your Cybersecurity Mindset
Broadening Your Cybersecurity MindsetBroadening Your Cybersecurity Mindset
Broadening Your Cybersecurity Mindset
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
 
Tripwire enterprise 87_datasheet
Tripwire enterprise 87_datasheetTripwire enterprise 87_datasheet
Tripwire enterprise 87_datasheet
 
Addressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeAddressing the Cyber-Security Landscape
Addressing the Cyber-Security Landscape
 
Vidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solutionVidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solution
 
Physical Security Information Management Solution for the Enterprise
Physical Security Information Management Solution for the EnterprisePhysical Security Information Management Solution for the Enterprise
Physical Security Information Management Solution for the Enterprise
 
Endpoint and mobile security
Endpoint and mobile securityEndpoint and mobile security
Endpoint and mobile security
 
Open Source and Security: Engineering Security by Design - Prague, December 2011
Open Source and Security: Engineering Security by Design - Prague, December 2011Open Source and Security: Engineering Security by Design - Prague, December 2011
Open Source and Security: Engineering Security by Design - Prague, December 2011
 
collateral_datasheet_sungard
collateral_datasheet_sungardcollateral_datasheet_sungard
collateral_datasheet_sungard
 
Qualys Brochure for CISOs
Qualys Brochure for CISOsQualys Brochure for CISOs
Qualys Brochure for CISOs
 
Level Up to a Seamless End-User Experience
Level Up to a Seamless End-User ExperienceLevel Up to a Seamless End-User Experience
Level Up to a Seamless End-User Experience
 
[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and Endpoints[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and Endpoints
 
Voyss Cloud-Based Managed Services Webinar 9-14-12
 Voyss Cloud-Based Managed Services Webinar 9-14-12 Voyss Cloud-Based Managed Services Webinar 9-14-12
Voyss Cloud-Based Managed Services Webinar 9-14-12
 
CyberObserver
CyberObserverCyberObserver
CyberObserver
 
Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.
 

Destaque

Garrick Programme Dec 2016
Garrick Programme Dec 2016Garrick Programme Dec 2016
Garrick Programme Dec 2016BHD Creative Ltd
 
Berwick partners practice covers
Berwick partners practice coversBerwick partners practice covers
Berwick partners practice coversBHD Creative Ltd
 
Wolverhampton Grand Season Programme 16/17
Wolverhampton Grand Season Programme 16/17Wolverhampton Grand Season Programme 16/17
Wolverhampton Grand Season Programme 16/17BHD Creative Ltd
 
Arch i programme 01-17 issue 5
Arch i programme 01-17 issue 5Arch i programme 01-17 issue 5
Arch i programme 01-17 issue 5CosminCH
 
Sudut patriotik
Sudut patriotikSudut patriotik
Sudut patriotikwas_4411
 
Arch i programme 02-17 issue 3
Arch i programme 02-17 issue 3Arch i programme 02-17 issue 3
Arch i programme 02-17 issue 3CosminCH
 
GPS Protecta Line 2016_cpd
GPS Protecta Line 2016_cpdGPS Protecta Line 2016_cpd
GPS Protecta Line 2016_cpdBHD Creative Ltd
 
Menu rancangan makanan tambahan
Menu rancangan makanan tambahanMenu rancangan makanan tambahan
Menu rancangan makanan tambahanwas_4411
 
BHD Creative ENGAGE: Public Consultation Services
BHD Creative ENGAGE: Public Consultation ServicesBHD Creative ENGAGE: Public Consultation Services
BHD Creative ENGAGE: Public Consultation ServicesBHD Creative Ltd
 
Agility works big companies ebook web
Agility works big companies ebook webAgility works big companies ebook web
Agility works big companies ebook webBHD Creative Ltd
 
Alutec Durable Eaves Solutions CPD 2016
Alutec Durable Eaves Solutions CPD 2016Alutec Durable Eaves Solutions CPD 2016
Alutec Durable Eaves Solutions CPD 2016BHD Creative Ltd
 
Lichfield Garrick Season Brochure Sept 2016
Lichfield Garrick Season Brochure Sept 2016Lichfield Garrick Season Brochure Sept 2016
Lichfield Garrick Season Brochure Sept 2016BHD Creative Ltd
 
Veritas velocity infographic_reduce costs
Veritas velocity infographic_reduce costsVeritas velocity infographic_reduce costs
Veritas velocity infographic_reduce costsBHD Creative Ltd
 
Đề tài thực tập - chương trình quản lý in ấn
Đề tài thực tập - chương trình quản lý in ấnĐề tài thực tập - chương trình quản lý in ấn
Đề tài thực tập - chương trình quản lý in ấntam tran
 

Destaque (18)

Garrick Programme Dec 2016
Garrick Programme Dec 2016Garrick Programme Dec 2016
Garrick Programme Dec 2016
 
Berwick partners practice covers
Berwick partners practice coversBerwick partners practice covers
Berwick partners practice covers
 
Sixteen25 leaflet final
Sixteen25 leaflet finalSixteen25 leaflet final
Sixteen25 leaflet final
 
Blob tweet il manifesto
Blob tweet   il manifestoBlob tweet   il manifesto
Blob tweet il manifesto
 
Wolverhampton Grand Season Programme 16/17
Wolverhampton Grand Season Programme 16/17Wolverhampton Grand Season Programme 16/17
Wolverhampton Grand Season Programme 16/17
 
Social Media
Social MediaSocial Media
Social Media
 
Arch i programme 01-17 issue 5
Arch i programme 01-17 issue 5Arch i programme 01-17 issue 5
Arch i programme 01-17 issue 5
 
Sudut patriotik
Sudut patriotikSudut patriotik
Sudut patriotik
 
Arch i programme 02-17 issue 3
Arch i programme 02-17 issue 3Arch i programme 02-17 issue 3
Arch i programme 02-17 issue 3
 
La vocale di Babbo Natale
La vocale di Babbo NataleLa vocale di Babbo Natale
La vocale di Babbo Natale
 
GPS Protecta Line 2016_cpd
GPS Protecta Line 2016_cpdGPS Protecta Line 2016_cpd
GPS Protecta Line 2016_cpd
 
Menu rancangan makanan tambahan
Menu rancangan makanan tambahanMenu rancangan makanan tambahan
Menu rancangan makanan tambahan
 
BHD Creative ENGAGE: Public Consultation Services
BHD Creative ENGAGE: Public Consultation ServicesBHD Creative ENGAGE: Public Consultation Services
BHD Creative ENGAGE: Public Consultation Services
 
Agility works big companies ebook web
Agility works big companies ebook webAgility works big companies ebook web
Agility works big companies ebook web
 
Alutec Durable Eaves Solutions CPD 2016
Alutec Durable Eaves Solutions CPD 2016Alutec Durable Eaves Solutions CPD 2016
Alutec Durable Eaves Solutions CPD 2016
 
Lichfield Garrick Season Brochure Sept 2016
Lichfield Garrick Season Brochure Sept 2016Lichfield Garrick Season Brochure Sept 2016
Lichfield Garrick Season Brochure Sept 2016
 
Veritas velocity infographic_reduce costs
Veritas velocity infographic_reduce costsVeritas velocity infographic_reduce costs
Veritas velocity infographic_reduce costs
 
Đề tài thực tập - chương trình quản lý in ấn
Đề tài thực tập - chương trình quản lý in ấnĐề tài thực tập - chương trình quản lý in ấn
Đề tài thực tập - chương trình quản lý in ấn
 

Semelhante a Symantec Migration infographic

How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesSymantec
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the MassesIRJET Journal
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2jeffirby
 
Cybersecurity Presentation at WVONGA spring meeting 2018
Cybersecurity Presentation at WVONGA spring meeting 2018Cybersecurity Presentation at WVONGA spring meeting 2018
Cybersecurity Presentation at WVONGA spring meeting 2018Jack Shaffer
 
2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital SecurityShawn Wells
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!Dell EMC World
 
V mware business trend brief - crash insurance - protect your business with...
V mware   business trend brief - crash insurance - protect your business with...V mware   business trend brief - crash insurance - protect your business with...
V mware business trend brief - crash insurance - protect your business with...VMware_EMEA
 
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...Symantec
 
Iaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd Iaetsd
 
Panda Security Corporate Presentation
Panda Security Corporate PresentationPanda Security Corporate Presentation
Panda Security Corporate PresentationPanda Security
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterVMUG IT
 
Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360Panda Security
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksSkycure
 
V mware quick start guide to disaster recovery
V mware   quick start guide to disaster recoveryV mware   quick start guide to disaster recovery
V mware quick start guide to disaster recoveryVMware_EMEA
 
Vmware’s move to a digital workspace
Vmware’s move to a digital workspaceVmware’s move to a digital workspace
Vmware’s move to a digital workspacesporta72
 

Semelhante a Symantec Migration infographic (20)

How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
 
Cybersecurity Presentation at WVONGA spring meeting 2018
Cybersecurity Presentation at WVONGA spring meeting 2018Cybersecurity Presentation at WVONGA spring meeting 2018
Cybersecurity Presentation at WVONGA spring meeting 2018
 
2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
V mware business trend brief - crash insurance - protect your business with...
V mware   business trend brief - crash insurance - protect your business with...V mware   business trend brief - crash insurance - protect your business with...
V mware business trend brief - crash insurance - protect your business with...
 
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
 
Iaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems using
 
Panda Security Corporate Presentation
Panda Security Corporate PresentationPanda Security Corporate Presentation
Panda Security Corporate Presentation
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
 
Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber Attacks
 
Cyberlink Deck
Cyberlink DeckCyberlink Deck
Cyberlink Deck
 
V mware quick start guide to disaster recovery
V mware   quick start guide to disaster recoveryV mware   quick start guide to disaster recovery
V mware quick start guide to disaster recovery
 
Vmware’s move to a digital workspace
Vmware’s move to a digital workspaceVmware’s move to a digital workspace
Vmware’s move to a digital workspace
 
MultiValue Security
MultiValue SecurityMultiValue Security
MultiValue Security
 

Mais de BHD Creative Ltd

Sample GPS Application Guide Gas
Sample GPS Application Guide Gas Sample GPS Application Guide Gas
Sample GPS Application Guide Gas BHD Creative Ltd
 
Wolverhampton Grand A0 Panto Boards
Wolverhampton Grand A0 Panto BoardsWolverhampton Grand A0 Panto Boards
Wolverhampton Grand A0 Panto BoardsBHD Creative Ltd
 
BE15 infographic transform
BE15 infographic transformBE15 infographic transform
BE15 infographic transformBHD Creative Ltd
 
Durapipe CPD Industrial Services Presentation
Durapipe CPD Industrial Services PresentationDurapipe CPD Industrial Services Presentation
Durapipe CPD Industrial Services PresentationBHD Creative Ltd
 
GPS : NELLY : internal launch
GPS : NELLY : internal launchGPS : NELLY : internal launch
GPS : NELLY : internal launchBHD Creative Ltd
 
Lichfield Garrick 'Visitors Guide' advert
Lichfield Garrick 'Visitors Guide' advertLichfield Garrick 'Visitors Guide' advert
Lichfield Garrick 'Visitors Guide' advertBHD Creative Ltd
 
Lichfield Garrick Sleeping Beauty 2016
Lichfield Garrick Sleeping Beauty 2016Lichfield Garrick Sleeping Beauty 2016
Lichfield Garrick Sleeping Beauty 2016BHD Creative Ltd
 
Lichfield Garrick Theatre Jack and the Beanstalk Christmas 2015
Lichfield Garrick Theatre Jack and the Beanstalk Christmas 2015Lichfield Garrick Theatre Jack and the Beanstalk Christmas 2015
Lichfield Garrick Theatre Jack and the Beanstalk Christmas 2015BHD Creative Ltd
 
Lichfield Garrick : Hired Man
Lichfield Garrick : Hired Man Lichfield Garrick : Hired Man
Lichfield Garrick : Hired Man BHD Creative Ltd
 
Creative Learning Brochure 12pp_oct16
Creative Learning Brochure 12pp_oct16Creative Learning Brochure 12pp_oct16
Creative Learning Brochure 12pp_oct16BHD Creative Ltd
 

Mais de BHD Creative Ltd (14)

Evcloud infographic
Evcloud infographicEvcloud infographic
Evcloud infographic
 
Sample GPS Application Guide Gas
Sample GPS Application Guide Gas Sample GPS Application Guide Gas
Sample GPS Application Guide Gas
 
Wolverhampton Grand A0 Panto Boards
Wolverhampton Grand A0 Panto BoardsWolverhampton Grand A0 Panto Boards
Wolverhampton Grand A0 Panto Boards
 
BE15 infographic transform
BE15 infographic transformBE15 infographic transform
BE15 infographic transform
 
Integrc Infographic
Integrc Infographic Integrc Infographic
Integrc Infographic
 
Durapipe CPD Industrial Services Presentation
Durapipe CPD Industrial Services PresentationDurapipe CPD Industrial Services Presentation
Durapipe CPD Industrial Services Presentation
 
GPS : CPD Advert
GPS : CPD AdvertGPS : CPD Advert
GPS : CPD Advert
 
GPS CSS PPT 2016
GPS CSS PPT 2016GPS CSS PPT 2016
GPS CSS PPT 2016
 
GPS : NELLY : internal launch
GPS : NELLY : internal launchGPS : NELLY : internal launch
GPS : NELLY : internal launch
 
Lichfield Garrick 'Visitors Guide' advert
Lichfield Garrick 'Visitors Guide' advertLichfield Garrick 'Visitors Guide' advert
Lichfield Garrick 'Visitors Guide' advert
 
Lichfield Garrick Sleeping Beauty 2016
Lichfield Garrick Sleeping Beauty 2016Lichfield Garrick Sleeping Beauty 2016
Lichfield Garrick Sleeping Beauty 2016
 
Lichfield Garrick Theatre Jack and the Beanstalk Christmas 2015
Lichfield Garrick Theatre Jack and the Beanstalk Christmas 2015Lichfield Garrick Theatre Jack and the Beanstalk Christmas 2015
Lichfield Garrick Theatre Jack and the Beanstalk Christmas 2015
 
Lichfield Garrick : Hired Man
Lichfield Garrick : Hired Man Lichfield Garrick : Hired Man
Lichfield Garrick : Hired Man
 
Creative Learning Brochure 12pp_oct16
Creative Learning Brochure 12pp_oct16Creative Learning Brochure 12pp_oct16
Creative Learning Brochure 12pp_oct16
 

Último

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Symantec Migration infographic

  • 1. DO NOTHING: Systems will still run, partner and user communities will help, but systems will be open to a significant security threat HARDWARE REPLACEMENT: Upgrade out of maintenance physical servers CUSTOM SUPPORT: For-fee custom support can be costly and time-consuming VIRTUALIZATION/CLOUD: To achieve cost, complexity and management benefits PROTECTION: Use a 3rd party product to secure servers and data, removing the time-critical need to upgrade THE REALISATION NOW IS THAT AFTER 14 JULY 2015 MISSION AND BUSINESS CRITICAL APPLICATIONS ARE AT RISK Migration carries significant challenge on resources and information protection Expensive custom contracts to maintain unsupported platforms and applications NO Technical support NO Incident support NO Security patches NO Product hot fixes MICROSOFT WINDOWS 2003 SERVER MIGRATION ARE YOU READY? ?? ? THE QUESTION IS, HOW WILL YOU MANAGE YOUR COSTS AND MITIGATE THE RISKS? WHAT DOES THIS MEAN FOR MY BUSINESS JULY 2015 14 = STANDARDISATION THE SUPPORT OF BYOD MOBILITY PRIVATE, HYBRID AND PUBLIC CLOUD BUSINESSES ARE DRIVING FOR... RISK COST Regulated industries may be fined or risk being cut off from key trading partners who want to protect their own compliance status Increased vulnerability to cyber attacks and data breach SECURITY COMPLIANCE ?? ?WHAT SHOULD I DO WITH THE CHANGE IN THE TECHNOLOGY LANDSCAPE THE PRESSURES ON IT HAVE BECOME MORE DEMANDING! MICROSOFT’S EXTENDED SUPPORT OF WINDOWS 2003 SERVER ENDS IN JULY 2015. Posing potential problems for some 10M instances of Windows that exist and the business critical systems that depend on it. Although this doesn’t mean everything will stop working, it does mean that systems are open to potential security risks and not conforming to regulatory compliance demands. JULY 2015 14 2015 WHAT ARE MY OPTIONS? PROTECT AND SECURE INCREASE APPLICATION AVAILABILITY MITIGATE TRANSFORMATIONAL RISK DATA IS #1 PRIORITY GUARANTEE VISIBILITY ACROSS NEW AND EXISTING PLATFORMS LOWER THE SUPPORT AND OPERATIONAL COSTS SYMANTEC PROTECT MORE SYSTEMS IN THE SECURITY SOFTWARE SPACE THAN ANY OTHER COMPANY SYMANTEC BACK-UP OVER 50% OF THE WORLDS INFORMATION SYMANTEC PROTECT 200 MILLION END POINT DEVICES THE SYMANTEC GLOBAL INTELLIGENCE NETWORK PROVIDES THE VERY BEST IN SECURITY UPDATES, INSIGHT AND GUIDANCE CRITICAL SYSTEMS ARE SO IMPORTANT THAT YOU CANNOT AFFORD DOWNTIME OR PERFORMANCE ISSUES. The clock is ticking to migrate from Windows Server 2003 but it is still a key platform that underpins your many business critical services. DEVELOP A STRATEGY for mitigating the risk of vulnerability, while establishing a plan for migration DISCOVER: Understand what applications and workloads are being supported ASSESS: Create inventory categorised by type, importance and complexity TARGET: Choose an outcome for each application MAP: Match the inventory against business risk/criticality 4.6 BILLION CONNECTED THINGS GIN WHY SYMANTEC? www.symantec.co.ukCopyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 01/15. FIND OUT MORE Symantec can offer a unique alternative that will extend the life of your Windows 2003 systems that is cost effective and increases your security profile. PLATFORM LAUNCH First camera phone iTunes Xbox Live/online gaming 2003 Google Apps 20102006 Amazon web services A 2004 Facebook Google Glass 20132007 iPhone iPad 2009 SINCE THE LAUNCH OF WINDOWS 2003 TECHNOLOGY HAS ADVANCED REGISTER for the webinar to find out how, visit know.symantec.com/WindowsServer2003