SlideShare uma empresa Scribd logo
1 de 12
Baixar para ler offline
A Symantec Advisory Guide
Migrating to Symantec™ Validation and
ID Protection Service
Who should read this paperWho should read this paper
IT, security managers, and executives who use legacy on-premise two-
factor authentication solutions and are considering a switch to another
provider’s solution for two-factor authentication should read this
document. This solution brief offers advice about gauging the security of
a new solution, understanding the ease of deployment and
management, choosing the right strategy for migration, and measuring
the total cost effectiveness of a new solution.
SOLUTIONBRIEF:
MIGRATINGTOSYMANTEC™VIP
........................................
Content
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Symantec authentication is secure. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Designed and operated for strong security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Safer as token seed records are kept private . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Symantec is easier to deploy and manage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Faster setup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Easier to deploy credentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Lowers administrative burden. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Symantec is more cost effective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Next steps. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Free Trial . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Migrating to Symantec™ Validation and ID Protection Service
A Symantec Advisory Guide
Introduction
Your organization can’t afford to gamble with the security of its sensitive data. A major responsibility for your organization is to guarantee
protection of confidential business and customer data, whether stored or transmitted within your enterprise, or used in collaboration with
remote workers, customers, suppliers, business partners, and any other authorized destination of the extended enterprise.
As enterprise environments continue to evolve, IT organizations will need the ability to deliver strong authentication across an increasingly
diverse array of use cases and user populations. Unfortunately, organizations’ legacy on-premise authentication solutions fail to provide
either the flexibility or the cost-effectiveness to deliver this protection. For those organizations, Symantec™ Validation and ID Protection
Service (VIP) offers a broad and flexible strong authentication solution to address their authentication needs, both now and in the future.
This Symantec advisory guide is for IT managers, security managers, and executives who are considering replacing a legacy on-premise two-
factor authentication solution. It provides you with three reasons why your organization can migrate with confidence to Symantec VIP.
Foremost, Symantec is a global leader in security and its strong authentication service will protect your sensitive data from unauthorized
access. Symantec’s cloud-based solution is far easier to deploy and manage, which eliminates a big burden on your security staff and users.
Finally, Symantec is more cost effective. Based on a three-year total cost of ownership study between Symantec VIP and RSA SecurID® with
5,000 credentials, Symantec costs 33 percent less than the RSA on-premise solution. Symantec’s one-time purchase and deployment costs
are just 8 percent of projections
1
. Similar savings are realized when migrating from other on-premise solutions. Details and related migration
issues are covered below.
Symantec authentication is secure
SSymantec is a leading provider ofymantec is a leading provider of
sstrong authenticationtrong authentication
• Symantec is one of the top 5 vendors of
strong authentication in the world
2
with
over 400,000 clients worldwide
• Over 18 million Symantec VIP credentials
under management
• Over 30 million validations per month
• Leveraged by over 1,200 enterprises
Symantec is a global leader in providing security, storage, and systems management solutions to
help consumers and organizations secure and manage their information-driven world. Symantec
VIP is a cloud-based strong authentication service that enables enterprises to secure online
access and transactions, help achieve compliance, and reduce fraud risk. It combines two of the
three factors, something a user knows (such as a user name and password), something a user is
(such as a fingerprint), or something he or she possesses (such as a unique six-digit security
code that changes every 30 seconds and is generated by a card, token, or mobile phone)
or through token-less risk-based authentication.
Symantec VIP
1-
2-
"Two-Factor Authentication: A Total Cost of Ownership Viewpoint" White Paper, July 2015, Symantec
IDC August 2014: Worldwide Identity and Access Management 2013 Vendor Shares
Migrating to Symantec™ Validation and ID Protection Service
A Symantec Advisory Guide
1
Designed and operated fDesigned and operated for sor strong securittrong securityy
• Track record – For 18 years, Symantec has protected critical Internet infrastructure from attack including DNS root servers and security
root keys.
• Key generation and storage – Symantec VIP keys are generated with a hardware security module, and are encrypted in an Oracle®
database with AES.
• Physical security – Symantec VIP cloud operations are housed in a Tier 4 data center facility – physically and logically separated
from Symantec's corporate network; dual-control personnel are required to access sensitive key management and signing functions.
Trusted employee background checks are required for secure access.
• Certifications and compliance – PCI DSS (payment card industry data security standard), SSAE 16/SOC 2, WebTrust™ for Certificate
Authority, and federal government PKI.
• Service management – Strict change control processes are used for all IT services. Incident management processes and procedures are
applied including regular "fire drill" exercises.
• Systems and security monitoring – Symantec has a dedicated 24 hours a day, seven days a week network operations center; external
global monitoring of critical services; daily vulnerability scans; host-based and network-based intrusion detection systems for monitoring
systems, applications and network; and SSL and S/MIME for encrypted communications.
SafSafer as toker as token seed records are ken seed records are kepept privt privateate
The security of two-factor authentication is dependent on a shared secret, called a seed, that is embedded in each token and deployed to a
server responsible for providing applications with validation services. This seed controls the generation of new one-time passwords (OTP),
and any exposure of this shared secret to a third party would allow that third party to masquerade as an authorized user.
Implementation of legacy on-premise two-factor authentication solutions require communication of token seeds to the administrator; at
deployment, an administrator must manually download and associate the token's seed record within the on-premise validation server.
Exposure of this shared secret creates an additional risk. Symantec VIP handles these steps automatically, so the token seed is not made
available to the administrator and doesn't exist outside of either the token or the Symantec VIP infrastructure. These are significant reasons
why Symantec VIP is more secure than legacy on-premise approaches to delivering two-factor authentication.
Symantec is easier to deploy and manage
The two key concerns most customers have when migrating from a legacy authentication solution are minimizing capital expenditure and
disruption in end-user productivity. This section focuses on the latter. Symantec has developed two technical migration strategies that may
be adapted to your organization’s architecture and security requirements. Typically, migration will occur over a period of time as legacy
tokens expire, or in waves of users by geographic location or business function. Other situations will require a rapid migration for the entire
enterprise. In most cases, migration from a legacy solution to Symantec VIP may require a period of time where both the legacy solution and
Symantec VIP operate in parallel.
Spectrum of open credential options
The essence of cost and complexity in a two-factor authentication system hinges on token devices and software – both for their acquisition
and deployment, and for subsequent management. Proprietary tokens associated with some legacy authentication solutions are, like so
many sole-source products, more expensive to acquire. Spikes in demand (such as the current wholesale replacement of millions of tokens)
may also trigger delays in the supply chain.
Migrating to Symantec™ Validation and ID Protection Service
A Symantec Advisory Guide
2
Symantec VIP offers several options for credentials including a token-less risk-based authentication option, mobile credentials, and a variety
of hardware tokens. Symantec VIP tokens are based on an open standard, following the Reference Architecture published by the Initiative for
Open Authentication (OATH). By using open Symantec VIP tokens, your enterprise will receive these benefits:
• Reduced deployment costs by simplifying component integration, allowing validation to occur as a network utility
• Reduced deployment costs by enabling sharing or re-use of authentication devices with multiple websites or applications
• Avoiding vendor lock-in to credential devices
• Broader choice of suppliers of credentials for flexible, best-in-class solution deployment
Symantec VIP credential options
How Symantec VIP deployment is easier
FFasaster setupter setup
Symantec VIP uses either a registered smartphone or your existing enterprise directory for the user’s first factor (device or password). This
capability simplifies end-user onboarding, training, and administrative overhead. Unlike legacy on-premise authentication approaches,
Symantec VIP does not require a dedicated server to integrate with your enterprise applications. Instead, Symantec VIP uses a lightweight
and completely stateless gateway that can run as an additional process on an existing server platform.
Easier to deploy credentialsEasier to deploy credentials
Symantec VIP's integrated platform lets you deploy multiple tokens or select the authentication method depending on user and application
requirements. Symantec VIP offers a variety of options including a token-less risk-based option that uses device ID and behavior analytics to
authenticate legitimate users without changing their logon experience. In addition, VIP offers a free, downloadable mobile credential that
supports more than 900 mobile devices. This allows end users to use their mobile device to receive the second factor (one-time password),
and eliminates the need to maili physical tokens to these users. For an even simplier option VIP Access Push can be used on the mobile
device to authentication with one-tap to verify the request - eliminating the 6-digit code. Finally, the ulimate in convenience uses biometrics
to authentication with just a fingerprint, eliminating not only the 6-digit code but also the password for online applications.
Migrating to Symantec™ Validation and ID Protection Service
A Symantec Advisory Guide
3
LLowers adminisowers administrative burdentrative burden
With Symantec VIP, the enterprise administrator no longer needs to import token seed records for each batch of tokens, or distribute
software token seeds to end users. An out-of-box self-service portal allows end users to activate their tokens without requiring IT
administrative assistance.
Two strategies for migration
To illustrate the migration process and deployment options, the following sections present how an organization would effect a seamless and
simple migration from an existing RSA SecurID installation. However, this migration process could be applied to any legacy on-premise two-
factor authentication solution.
The immediate outcome of migration is parallel two-factor authentication systems; these keep legacy tokens in operation until they’re retired
while enabling Symantec VIP credentials to smoothly take their place. Two migration strategies will get you there in different ways. Option A
preserves the same user experience, so nobody will notice a change for secure access. Option A requires extra administrative work to achieve
user transparency. Option B requires the new Symantec VIP user to use a different virtual private network (VPN) profile, but eases the
administrative burden of migration. The options are briefly explained below; for technical and administrative details, see our white paper,
“Migrating to Symantec VIP: Technical Migration Strategy.”
Option A: No change to user experience; more administration
Single VPN server RADIUS enabled, legacy authentication server with RADIUS enabled
Option A: RADIUS enabled in Legacy Authentication Server
Option A uses the credential migration feature of the VIP Enterprise Gateway. Symantec VIP requires Remote Authentication Dial-In User
Service (RADIUS) support to implement this feature. The migration feature allows the enterprise to gradually move users and their tokens
from legacy tokens to Symantec VIP without users noticing any system changes or imposing new procedures for authentication.
To implement Option A, your team will need to configure the legacy authentication server to enable RADIUS support. That server becomes a
delegation server. Authentication requests without a Symantec VIP credential are routed to the delegation server for validation. With this
Migrating to Symantec™ Validation and ID Protection Service
A Symantec Advisory Guide
4
scenario, your enterprise will not have to deploy an additional VPN profile or entry point – nor will users have to learn any new procedures for
access. However, this deployment option does require you to have RADIUS enabled on your legacy on-premise authentication server; if you
don't wish to undertake modifications to your server's configuration, see Option B below for an alternative deployment option.
Option B: Minor change to user experience; less administration
Single VPN server RADIUS enabled, legacy authentication server with no change, and second VPN profile added to existing
enterprise VPN gateway
Option B does not require RADIUS support for the legacy on-premise authentication server. However, your organization will need to configure
an additional VPN profile for the VPN gateway for use with Symantec VIP credentials. End users with legacy credentials will continue using
the existing VPN profile until they transition to Symantec VIP credentials. When the migration is completed, you will decommission the
original VPN profile.
With this option, users with new Symantec VIP will need to be told or trained to use the new profile. Depending on the circumstances, some
individuals might experience initial disruption in gaining secure remote access. The advantage of Option B is your team will not need to
reconfigure the legacy authentication server to enable RADIUS. Some organizations may thus view Option B as beneficial, for it enables the
technical team to focus on implementing the new authentication solution instead of devoting additional effort to maintaining the old
technology.
Option B: Extra VPN profile added to enterprise VPN gateway
Symantec is more cost effective
Total cost of ownership (TCO) for two-factor authentication must account for all the costs associated with planning, procuring, deploying, and
owning the solution. Symantec has created a TCO study comparing the Symantec VIP Service with an RSA SecurID on-premise
authentication solution for a deployment of 5,000 one-time password credentials deployed to secure remote access to corporate resources
over a 3 year period.
3
3- Symantec, “Two-Factor Authentication: A Total Cost of Ownership Viewpoint” (2015).
Migrating to Symantec™ Validation and ID Protection Service
A Symantec Advisory Guide
5
TCO study calculations and assumptions
The model below assumes that an organization deploys 5,000 credentials to their users (1,250 hardware and 3,750 software), 25% of whom
are remote and require shipping. Of the hardware tokens deployed, 10% will requirement replacement annually. List prices are used
for software license fees, infrastructure, hardware and software tokens costs; and current rates for staffing. It assumes the same unit cost for
Symantec assumptions
• Enterprise deploys Symantec™ VIP
Access for Mobile for 75% of end users,
absolving it of the need to staff up for
credential distribution for those users.
Mobile credentials are the most popular
option.
• Two servers per site (for redundancy and
failover) and one disaster-recovery server
co-located (VIP Enterprise Gateway is
lightweight and stateless requiring a less
costly server)
• One full-time-equivalent (FTE) project
manager, but administrator costs lower
by 30%
• 10% of issued tokens are lost or broken
annually
RSA assumptions
• Enterprise deploys mobile phone
software tokens for 75% of end users
(seed file managements still required)
• Two servers per site (for redundancy and
failover) and one disaster-recovery server
co-located (more costly servers required
to guarantee performance of proprietary
database engine)
• One full-time-equivalent (FTE) project
manager and one full-time administrator
• 10% of issued tokens are lost or broken
annually
• Hardware and software tokens are
renewed once during the 3 year period
• 20% of software license fees as recurring
software maintenance fee
shipping to remote users for both Symantec and RSA hardware tokens, regardless of whether it is
the initial purchase, replacement, or renewal. It also assumes that the unit cost at the time of
initial purchase for hardware and software tokens is the same as at the time for replacement
(and renewal for RSA).
Conclusions of the TCO study
Symantec VIP delivers significantly lower TCO than the RSA SecurID on-premise approach by 33 percent. The key number for migration is up-
front first year costs for licensing, hardware tokens, infrastructure, deployment, and management. Based on the above scenario, Symantec
Migrating to Symantec™ Validation and ID Protection Service
A Symantec Advisory Guide
6
VIP one-time costs are about 8 percent of the legacy on-premise approach. Organizations should expect to experience similar savings when
migrating from other on-premise solutions.
Migrating to Symantec provides greater value
Other Symantec solutions for
protecting your data
Security
• Security Management
• Endpoint Security
• Messaging Security
• Web Security
Information Risk & Compliance
• IT Compliance
• Discovery & Retention Management
• Data Loss Prevention
Infrastructure Operations
• Endpoint Management
• IT Service Management
• Endpoint Virtualization
Business Continuity
• Disaster Recovery
• High Availability
• Virtualization Management
• Green IT
http://www.symantec.com/business/
products/categories.jsp
• Strong two-factor authentication from the global leader in security
• Significantly lower costs, especially for hardware tokens and staffing
• Free, easy-to-use software credentials and token-less option provide significant cost savings
• Single, integrated platform supports changing authentication requirements and layered
security, using risk-based authentication, for multiple devices depending on user and
application types
• Flexible models enable you to create a customized solution for your business—OTP, token-
less, or passwordless options
• Leverage existing technology investments (directory, database, single-sign-on servers, etc.)
• Fully scalable
• Open versus proprietary—more credential choices and no vendor lock-in
• Continuous innovation in devices, both in cost and functionality (secure storage, endpoint
security, etc.)
• Out-of-the-box self-service portal allows end-user activation and management of tokens
• Cost-effective tokens—no token renewal fees and no shelf decay
Next steps
Symantec VIP provides your organization with three compelling reasons for making the switch
from your legacy on-premise authentication solution. Symantec VIP not only protects your
sensitive data, it's also far easier to deploy and manage than legacy solutions, thus reducing the
burden on your security staff and users. Finally, Symantec VIP is more cost effective. With these,
your organization can migrate in confidence to Symantec two-factor authentication.
Free Trial
As a next step, we invite you to a free 60-day trial of Symantec VIP. During the trial, you will experience how easy two-factor authentication is
to deploy as a cloud-based service, and how convenient mobile credentials are for end users. Your trial includes:
• A free Symantec VIP account for 60 days
• Unlimited, free credentials for VIP Access for Mobile
• Deployment of the VIP Enterprise Gateway to provide simple integration between Symantec VIP and your VPN, or other RADIUS-enabled
application
• Shared authentication across multiple applications and websites such as eBay, PayPal, E*TRADE, and other VIP Network Members
Ask your Symantec sales representative for more information about the free trial or visit go.symantec.com/viptrial.
Migrating to Symantec™ Validation and ID Protection Service
A Symantec Advisory Guide
7
About Symantec
Symantec Corporation (NASDAQ: SYMC) is an
information protection expert that helps people,
businesses and governments seeking the freedom
to unlock the opportunities technology brings –
anytime, anywhere. Founded in April 1982,
Symantec, a Fortune 500 company, operating one
of the largest global data-intelligence networks, has
provided leading security, backup and availability
solutions for where vital information is stored,
accessed and shared. The company's more than
19,000 employees reside in more than 50
countries. Ninety-nine percent of Fortune 500
companies are Symantec customers. In fiscal 2015,
it recorded revenues of $6.5 billion. To learn more
go to www.symantec.com or connect with Symantec
at: go.symantec.com/socialmedia.
For specific country offices
and contact numbers, please
visit our website.
Symantec World Headquarters
350 Ellis St.
Mountain View, CA 94043 USA
+1 (650) 527 8000
1 (800) 721 3934
www.symantec.com
Copyright © 2015 Symantec Corporation. All rights
reserved. Symantec, the Symantec Logo, and the
Checkmark Logo are trademarks or registered
trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may be
trademarks of their respective owners.
7/2015 21202588-3
Migrating to Symantec™ Validation and ID Protection Service
A Symantec Advisory Guide

Mais conteúdo relacionado

Mais procurados

SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...AlienVault
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM AlienVault
 
Presentazione-CyberArk-MDM-v3
Presentazione-CyberArk-MDM-v3Presentazione-CyberArk-MDM-v3
Presentazione-CyberArk-MDM-v3Marco Di Martino
 
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...Qualys
 
Open Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's GuideOpen Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's GuideAlienVault
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint SecurityBurak DAYIOGLU
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Iftikhar Ali Iqbal
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controlsAlienVault
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachRahul Neel Mani
 
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationAvoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationQualys
 
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...Qualys
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture Priyanka Aash
 
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsMeltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsAlienVault
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmPriyanka Aash
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxArrow ECS UK
 
Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureQualys
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...Raffael Marty
 
BalaBit 2015: Control Your IT Staff
BalaBit 2015: Control Your IT StaffBalaBit 2015: Control Your IT Staff
BalaBit 2015: Control Your IT StaffSectricity
 

Mais procurados (20)

SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM
 
Presentazione-CyberArk-MDM-v3
Presentazione-CyberArk-MDM-v3Presentazione-CyberArk-MDM-v3
Presentazione-CyberArk-MDM-v3
 
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
 
Open Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's GuideOpen Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's Guide
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a Breach
 
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationAvoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediation
 
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture
 
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsMeltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
Ambesh
AmbeshAmbesh
Ambesh
 
Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud Infrastructure
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
 
BalaBit 2015: Control Your IT Staff
BalaBit 2015: Control Your IT StaffBalaBit 2015: Control Your IT Staff
BalaBit 2015: Control Your IT Staff
 

Semelhante a A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection Service

Best Practices for Running Symantec Endpoint Protection 12.1 on Microsoft Azure
Best Practices for Running Symantec Endpoint Protection 12.1 on Microsoft Azure Best Practices for Running Symantec Endpoint Protection 12.1 on Microsoft Azure
Best Practices for Running Symantec Endpoint Protection 12.1 on Microsoft Azure Symantec
 
Hitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security AnalysisHitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security AnalysisHitachi ID Systems, Inc.
 
Secure Management of Access to Privileged Accounts
Secure Management of Access to Privileged AccountsSecure Management of Access to Privileged Accounts
Secure Management of Access to Privileged AccountsHitachi ID Systems, Inc.
 
Configuration Compliance For Storage, Network & Server
Configuration Compliance For Storage, Network & Server Configuration Compliance For Storage, Network & Server
Configuration Compliance For Storage, Network & Server EMC
 
Secure remote access in solaris 9
Secure remote access in solaris 9Secure remote access in solaris 9
Secure remote access in solaris 9Tintus Ardi
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Kim Jensen
 
Alternatives for-securing-virtual-networks
Alternatives for-securing-virtual-networksAlternatives for-securing-virtual-networks
Alternatives for-securing-virtual-networksJustin Cletus
 
Easing the Pains of Certificate Management
Easing the Pains of Certificate ManagementEasing the Pains of Certificate Management
Easing the Pains of Certificate ManagementEntrust Datacard
 
Si InfoSecMiddleEastLR0516
Si InfoSecMiddleEastLR0516Si InfoSecMiddleEastLR0516
Si InfoSecMiddleEastLR0516Saad Khan
 
Requirements and Security Assessment Procedure for C7 To Be PCI DSS Compliant
Requirements and Security Assessment Procedure for C7 To Be PCI DSS CompliantRequirements and Security Assessment Procedure for C7 To Be PCI DSS Compliant
Requirements and Security Assessment Procedure for C7 To Be PCI DSS CompliantOlivia Grey
 
Using gsm sim authentication in vp ns
Using gsm sim authentication in vp nsUsing gsm sim authentication in vp ns
Using gsm sim authentication in vp nsJamal Meselmani
 
Enhancing intelligence with the Internet of Things
Enhancing intelligence with the Internet of ThingsEnhancing intelligence with the Internet of Things
Enhancing intelligence with the Internet of ThingsThe Marketing Distillery
 
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docxREAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docxdanas19
 
TierPoint White Paper_With all due diligence_2015
TierPoint White Paper_With all due diligence_2015TierPoint White Paper_With all due diligence_2015
TierPoint White Paper_With all due diligence_2015sllongo3
 
With-All-Due-Diligence20150330
With-All-Due-Diligence20150330With-All-Due-Diligence20150330
With-All-Due-Diligence20150330Jim Kramer
 

Semelhante a A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection Service (20)

Best Practices for Running Symantec Endpoint Protection 12.1 on Microsoft Azure
Best Practices for Running Symantec Endpoint Protection 12.1 on Microsoft Azure Best Practices for Running Symantec Endpoint Protection 12.1 on Microsoft Azure
Best Practices for Running Symantec Endpoint Protection 12.1 on Microsoft Azure
 
Selecting a Password Management Product
Selecting a Password Management ProductSelecting a Password Management Product
Selecting a Password Management Product
 
Password Management Project Roadmap
Password Management Project RoadmapPassword Management Project Roadmap
Password Management Project Roadmap
 
Hitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security AnalysisHitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security Analysis
 
Secure Management of Access to Privileged Accounts
Secure Management of Access to Privileged AccountsSecure Management of Access to Privileged Accounts
Secure Management of Access to Privileged Accounts
 
Secure Management of Privileged Passwords
Secure Management of Privileged PasswordsSecure Management of Privileged Passwords
Secure Management of Privileged Passwords
 
Sace client guide
Sace client guideSace client guide
Sace client guide
 
Configuration Compliance For Storage, Network & Server
Configuration Compliance For Storage, Network & Server Configuration Compliance For Storage, Network & Server
Configuration Compliance For Storage, Network & Server
 
Secure remote access in solaris 9
Secure remote access in solaris 9Secure remote access in solaris 9
Secure remote access in solaris 9
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report
 
Alternatives for-securing-virtual-networks
Alternatives for-securing-virtual-networksAlternatives for-securing-virtual-networks
Alternatives for-securing-virtual-networks
 
Easing the Pains of Certificate Management
Easing the Pains of Certificate ManagementEasing the Pains of Certificate Management
Easing the Pains of Certificate Management
 
Si InfoSecMiddleEastLR0516
Si InfoSecMiddleEastLR0516Si InfoSecMiddleEastLR0516
Si InfoSecMiddleEastLR0516
 
Requirements and Security Assessment Procedure for C7 To Be PCI DSS Compliant
Requirements and Security Assessment Procedure for C7 To Be PCI DSS CompliantRequirements and Security Assessment Procedure for C7 To Be PCI DSS Compliant
Requirements and Security Assessment Procedure for C7 To Be PCI DSS Compliant
 
Identity Management Project Roadmap
Identity Management Project RoadmapIdentity Management Project Roadmap
Identity Management Project Roadmap
 
Using gsm sim authentication in vp ns
Using gsm sim authentication in vp nsUsing gsm sim authentication in vp ns
Using gsm sim authentication in vp ns
 
Enhancing intelligence with the Internet of Things
Enhancing intelligence with the Internet of ThingsEnhancing intelligence with the Internet of Things
Enhancing intelligence with the Internet of Things
 
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docxREAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
 
TierPoint White Paper_With all due diligence_2015
TierPoint White Paper_With all due diligence_2015TierPoint White Paper_With all due diligence_2015
TierPoint White Paper_With all due diligence_2015
 
With-All-Due-Diligence20150330
With-All-Due-Diligence20150330With-All-Due-Diligence20150330
With-All-Due-Diligence20150330
 

Mais de Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

Mais de Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Último

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Último (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection Service

  • 1. A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection Service Who should read this paperWho should read this paper IT, security managers, and executives who use legacy on-premise two- factor authentication solutions and are considering a switch to another provider’s solution for two-factor authentication should read this document. This solution brief offers advice about gauging the security of a new solution, understanding the ease of deployment and management, choosing the right strategy for migration, and measuring the total cost effectiveness of a new solution. SOLUTIONBRIEF: MIGRATINGTOSYMANTEC™VIP ........................................
  • 2.
  • 3. Content Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Symantec authentication is secure. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Designed and operated for strong security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Safer as token seed records are kept private . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Symantec is easier to deploy and manage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Faster setup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Easier to deploy credentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Lowers administrative burden. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Symantec is more cost effective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Next steps. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Free Trial . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Migrating to Symantec™ Validation and ID Protection Service A Symantec Advisory Guide
  • 4. Introduction Your organization can’t afford to gamble with the security of its sensitive data. A major responsibility for your organization is to guarantee protection of confidential business and customer data, whether stored or transmitted within your enterprise, or used in collaboration with remote workers, customers, suppliers, business partners, and any other authorized destination of the extended enterprise. As enterprise environments continue to evolve, IT organizations will need the ability to deliver strong authentication across an increasingly diverse array of use cases and user populations. Unfortunately, organizations’ legacy on-premise authentication solutions fail to provide either the flexibility or the cost-effectiveness to deliver this protection. For those organizations, Symantec™ Validation and ID Protection Service (VIP) offers a broad and flexible strong authentication solution to address their authentication needs, both now and in the future. This Symantec advisory guide is for IT managers, security managers, and executives who are considering replacing a legacy on-premise two- factor authentication solution. It provides you with three reasons why your organization can migrate with confidence to Symantec VIP. Foremost, Symantec is a global leader in security and its strong authentication service will protect your sensitive data from unauthorized access. Symantec’s cloud-based solution is far easier to deploy and manage, which eliminates a big burden on your security staff and users. Finally, Symantec is more cost effective. Based on a three-year total cost of ownership study between Symantec VIP and RSA SecurID® with 5,000 credentials, Symantec costs 33 percent less than the RSA on-premise solution. Symantec’s one-time purchase and deployment costs are just 8 percent of projections 1 . Similar savings are realized when migrating from other on-premise solutions. Details and related migration issues are covered below. Symantec authentication is secure SSymantec is a leading provider ofymantec is a leading provider of sstrong authenticationtrong authentication • Symantec is one of the top 5 vendors of strong authentication in the world 2 with over 400,000 clients worldwide • Over 18 million Symantec VIP credentials under management • Over 30 million validations per month • Leveraged by over 1,200 enterprises Symantec is a global leader in providing security, storage, and systems management solutions to help consumers and organizations secure and manage their information-driven world. Symantec VIP is a cloud-based strong authentication service that enables enterprises to secure online access and transactions, help achieve compliance, and reduce fraud risk. It combines two of the three factors, something a user knows (such as a user name and password), something a user is (such as a fingerprint), or something he or she possesses (such as a unique six-digit security code that changes every 30 seconds and is generated by a card, token, or mobile phone) or through token-less risk-based authentication. Symantec VIP 1- 2- "Two-Factor Authentication: A Total Cost of Ownership Viewpoint" White Paper, July 2015, Symantec IDC August 2014: Worldwide Identity and Access Management 2013 Vendor Shares Migrating to Symantec™ Validation and ID Protection Service A Symantec Advisory Guide 1
  • 5. Designed and operated fDesigned and operated for sor strong securittrong securityy • Track record – For 18 years, Symantec has protected critical Internet infrastructure from attack including DNS root servers and security root keys. • Key generation and storage – Symantec VIP keys are generated with a hardware security module, and are encrypted in an Oracle® database with AES. • Physical security – Symantec VIP cloud operations are housed in a Tier 4 data center facility – physically and logically separated from Symantec's corporate network; dual-control personnel are required to access sensitive key management and signing functions. Trusted employee background checks are required for secure access. • Certifications and compliance – PCI DSS (payment card industry data security standard), SSAE 16/SOC 2, WebTrust™ for Certificate Authority, and federal government PKI. • Service management – Strict change control processes are used for all IT services. Incident management processes and procedures are applied including regular "fire drill" exercises. • Systems and security monitoring – Symantec has a dedicated 24 hours a day, seven days a week network operations center; external global monitoring of critical services; daily vulnerability scans; host-based and network-based intrusion detection systems for monitoring systems, applications and network; and SSL and S/MIME for encrypted communications. SafSafer as toker as token seed records are ken seed records are kepept privt privateate The security of two-factor authentication is dependent on a shared secret, called a seed, that is embedded in each token and deployed to a server responsible for providing applications with validation services. This seed controls the generation of new one-time passwords (OTP), and any exposure of this shared secret to a third party would allow that third party to masquerade as an authorized user. Implementation of legacy on-premise two-factor authentication solutions require communication of token seeds to the administrator; at deployment, an administrator must manually download and associate the token's seed record within the on-premise validation server. Exposure of this shared secret creates an additional risk. Symantec VIP handles these steps automatically, so the token seed is not made available to the administrator and doesn't exist outside of either the token or the Symantec VIP infrastructure. These are significant reasons why Symantec VIP is more secure than legacy on-premise approaches to delivering two-factor authentication. Symantec is easier to deploy and manage The two key concerns most customers have when migrating from a legacy authentication solution are minimizing capital expenditure and disruption in end-user productivity. This section focuses on the latter. Symantec has developed two technical migration strategies that may be adapted to your organization’s architecture and security requirements. Typically, migration will occur over a period of time as legacy tokens expire, or in waves of users by geographic location or business function. Other situations will require a rapid migration for the entire enterprise. In most cases, migration from a legacy solution to Symantec VIP may require a period of time where both the legacy solution and Symantec VIP operate in parallel. Spectrum of open credential options The essence of cost and complexity in a two-factor authentication system hinges on token devices and software – both for their acquisition and deployment, and for subsequent management. Proprietary tokens associated with some legacy authentication solutions are, like so many sole-source products, more expensive to acquire. Spikes in demand (such as the current wholesale replacement of millions of tokens) may also trigger delays in the supply chain. Migrating to Symantec™ Validation and ID Protection Service A Symantec Advisory Guide 2
  • 6. Symantec VIP offers several options for credentials including a token-less risk-based authentication option, mobile credentials, and a variety of hardware tokens. Symantec VIP tokens are based on an open standard, following the Reference Architecture published by the Initiative for Open Authentication (OATH). By using open Symantec VIP tokens, your enterprise will receive these benefits: • Reduced deployment costs by simplifying component integration, allowing validation to occur as a network utility • Reduced deployment costs by enabling sharing or re-use of authentication devices with multiple websites or applications • Avoiding vendor lock-in to credential devices • Broader choice of suppliers of credentials for flexible, best-in-class solution deployment Symantec VIP credential options How Symantec VIP deployment is easier FFasaster setupter setup Symantec VIP uses either a registered smartphone or your existing enterprise directory for the user’s first factor (device or password). This capability simplifies end-user onboarding, training, and administrative overhead. Unlike legacy on-premise authentication approaches, Symantec VIP does not require a dedicated server to integrate with your enterprise applications. Instead, Symantec VIP uses a lightweight and completely stateless gateway that can run as an additional process on an existing server platform. Easier to deploy credentialsEasier to deploy credentials Symantec VIP's integrated platform lets you deploy multiple tokens or select the authentication method depending on user and application requirements. Symantec VIP offers a variety of options including a token-less risk-based option that uses device ID and behavior analytics to authenticate legitimate users without changing their logon experience. In addition, VIP offers a free, downloadable mobile credential that supports more than 900 mobile devices. This allows end users to use their mobile device to receive the second factor (one-time password), and eliminates the need to maili physical tokens to these users. For an even simplier option VIP Access Push can be used on the mobile device to authentication with one-tap to verify the request - eliminating the 6-digit code. Finally, the ulimate in convenience uses biometrics to authentication with just a fingerprint, eliminating not only the 6-digit code but also the password for online applications. Migrating to Symantec™ Validation and ID Protection Service A Symantec Advisory Guide 3
  • 7. LLowers adminisowers administrative burdentrative burden With Symantec VIP, the enterprise administrator no longer needs to import token seed records for each batch of tokens, or distribute software token seeds to end users. An out-of-box self-service portal allows end users to activate their tokens without requiring IT administrative assistance. Two strategies for migration To illustrate the migration process and deployment options, the following sections present how an organization would effect a seamless and simple migration from an existing RSA SecurID installation. However, this migration process could be applied to any legacy on-premise two- factor authentication solution. The immediate outcome of migration is parallel two-factor authentication systems; these keep legacy tokens in operation until they’re retired while enabling Symantec VIP credentials to smoothly take their place. Two migration strategies will get you there in different ways. Option A preserves the same user experience, so nobody will notice a change for secure access. Option A requires extra administrative work to achieve user transparency. Option B requires the new Symantec VIP user to use a different virtual private network (VPN) profile, but eases the administrative burden of migration. The options are briefly explained below; for technical and administrative details, see our white paper, “Migrating to Symantec VIP: Technical Migration Strategy.” Option A: No change to user experience; more administration Single VPN server RADIUS enabled, legacy authentication server with RADIUS enabled Option A: RADIUS enabled in Legacy Authentication Server Option A uses the credential migration feature of the VIP Enterprise Gateway. Symantec VIP requires Remote Authentication Dial-In User Service (RADIUS) support to implement this feature. The migration feature allows the enterprise to gradually move users and their tokens from legacy tokens to Symantec VIP without users noticing any system changes or imposing new procedures for authentication. To implement Option A, your team will need to configure the legacy authentication server to enable RADIUS support. That server becomes a delegation server. Authentication requests without a Symantec VIP credential are routed to the delegation server for validation. With this Migrating to Symantec™ Validation and ID Protection Service A Symantec Advisory Guide 4
  • 8. scenario, your enterprise will not have to deploy an additional VPN profile or entry point – nor will users have to learn any new procedures for access. However, this deployment option does require you to have RADIUS enabled on your legacy on-premise authentication server; if you don't wish to undertake modifications to your server's configuration, see Option B below for an alternative deployment option. Option B: Minor change to user experience; less administration Single VPN server RADIUS enabled, legacy authentication server with no change, and second VPN profile added to existing enterprise VPN gateway Option B does not require RADIUS support for the legacy on-premise authentication server. However, your organization will need to configure an additional VPN profile for the VPN gateway for use with Symantec VIP credentials. End users with legacy credentials will continue using the existing VPN profile until they transition to Symantec VIP credentials. When the migration is completed, you will decommission the original VPN profile. With this option, users with new Symantec VIP will need to be told or trained to use the new profile. Depending on the circumstances, some individuals might experience initial disruption in gaining secure remote access. The advantage of Option B is your team will not need to reconfigure the legacy authentication server to enable RADIUS. Some organizations may thus view Option B as beneficial, for it enables the technical team to focus on implementing the new authentication solution instead of devoting additional effort to maintaining the old technology. Option B: Extra VPN profile added to enterprise VPN gateway Symantec is more cost effective Total cost of ownership (TCO) for two-factor authentication must account for all the costs associated with planning, procuring, deploying, and owning the solution. Symantec has created a TCO study comparing the Symantec VIP Service with an RSA SecurID on-premise authentication solution for a deployment of 5,000 one-time password credentials deployed to secure remote access to corporate resources over a 3 year period. 3 3- Symantec, “Two-Factor Authentication: A Total Cost of Ownership Viewpoint” (2015). Migrating to Symantec™ Validation and ID Protection Service A Symantec Advisory Guide 5
  • 9. TCO study calculations and assumptions The model below assumes that an organization deploys 5,000 credentials to their users (1,250 hardware and 3,750 software), 25% of whom are remote and require shipping. Of the hardware tokens deployed, 10% will requirement replacement annually. List prices are used for software license fees, infrastructure, hardware and software tokens costs; and current rates for staffing. It assumes the same unit cost for Symantec assumptions • Enterprise deploys Symantec™ VIP Access for Mobile for 75% of end users, absolving it of the need to staff up for credential distribution for those users. Mobile credentials are the most popular option. • Two servers per site (for redundancy and failover) and one disaster-recovery server co-located (VIP Enterprise Gateway is lightweight and stateless requiring a less costly server) • One full-time-equivalent (FTE) project manager, but administrator costs lower by 30% • 10% of issued tokens are lost or broken annually RSA assumptions • Enterprise deploys mobile phone software tokens for 75% of end users (seed file managements still required) • Two servers per site (for redundancy and failover) and one disaster-recovery server co-located (more costly servers required to guarantee performance of proprietary database engine) • One full-time-equivalent (FTE) project manager and one full-time administrator • 10% of issued tokens are lost or broken annually • Hardware and software tokens are renewed once during the 3 year period • 20% of software license fees as recurring software maintenance fee shipping to remote users for both Symantec and RSA hardware tokens, regardless of whether it is the initial purchase, replacement, or renewal. It also assumes that the unit cost at the time of initial purchase for hardware and software tokens is the same as at the time for replacement (and renewal for RSA). Conclusions of the TCO study Symantec VIP delivers significantly lower TCO than the RSA SecurID on-premise approach by 33 percent. The key number for migration is up- front first year costs for licensing, hardware tokens, infrastructure, deployment, and management. Based on the above scenario, Symantec Migrating to Symantec™ Validation and ID Protection Service A Symantec Advisory Guide 6
  • 10. VIP one-time costs are about 8 percent of the legacy on-premise approach. Organizations should expect to experience similar savings when migrating from other on-premise solutions. Migrating to Symantec provides greater value Other Symantec solutions for protecting your data Security • Security Management • Endpoint Security • Messaging Security • Web Security Information Risk & Compliance • IT Compliance • Discovery & Retention Management • Data Loss Prevention Infrastructure Operations • Endpoint Management • IT Service Management • Endpoint Virtualization Business Continuity • Disaster Recovery • High Availability • Virtualization Management • Green IT http://www.symantec.com/business/ products/categories.jsp • Strong two-factor authentication from the global leader in security • Significantly lower costs, especially for hardware tokens and staffing • Free, easy-to-use software credentials and token-less option provide significant cost savings • Single, integrated platform supports changing authentication requirements and layered security, using risk-based authentication, for multiple devices depending on user and application types • Flexible models enable you to create a customized solution for your business—OTP, token- less, or passwordless options • Leverage existing technology investments (directory, database, single-sign-on servers, etc.) • Fully scalable • Open versus proprietary—more credential choices and no vendor lock-in • Continuous innovation in devices, both in cost and functionality (secure storage, endpoint security, etc.) • Out-of-the-box self-service portal allows end-user activation and management of tokens • Cost-effective tokens—no token renewal fees and no shelf decay Next steps Symantec VIP provides your organization with three compelling reasons for making the switch from your legacy on-premise authentication solution. Symantec VIP not only protects your sensitive data, it's also far easier to deploy and manage than legacy solutions, thus reducing the burden on your security staff and users. Finally, Symantec VIP is more cost effective. With these, your organization can migrate in confidence to Symantec two-factor authentication. Free Trial As a next step, we invite you to a free 60-day trial of Symantec VIP. During the trial, you will experience how easy two-factor authentication is to deploy as a cloud-based service, and how convenient mobile credentials are for end users. Your trial includes: • A free Symantec VIP account for 60 days • Unlimited, free credentials for VIP Access for Mobile • Deployment of the VIP Enterprise Gateway to provide simple integration between Symantec VIP and your VPN, or other RADIUS-enabled application • Shared authentication across multiple applications and websites such as eBay, PayPal, E*TRADE, and other VIP Network Members Ask your Symantec sales representative for more information about the free trial or visit go.symantec.com/viptrial. Migrating to Symantec™ Validation and ID Protection Service A Symantec Advisory Guide 7
  • 11.
  • 12. About Symantec Symantec Corporation (NASDAQ: SYMC) is an information protection expert that helps people, businesses and governments seeking the freedom to unlock the opportunities technology brings – anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company, operating one of the largest global data-intelligence networks, has provided leading security, backup and availability solutions for where vital information is stored, accessed and shared. The company's more than 19,000 employees reside in more than 50 countries. Ninety-nine percent of Fortune 500 companies are Symantec customers. In fiscal 2015, it recorded revenues of $6.5 billion. To learn more go to www.symantec.com or connect with Symantec at: go.symantec.com/socialmedia. For specific country offices and contact numbers, please visit our website. Symantec World Headquarters 350 Ellis St. Mountain View, CA 94043 USA +1 (650) 527 8000 1 (800) 721 3934 www.symantec.com Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 7/2015 21202588-3 Migrating to Symantec™ Validation and ID Protection Service A Symantec Advisory Guide