Symantec
Transcription
Symantec
A Secure Foundation for Your Business Lauren Duda - Product Marketing Manager March 13th, 2007 Sample Agenda Slide 1 Corporate issues and threat landscape 2 MS Vista and Symantec Security 3 Symantec Endpoint Security 4 Network Access Control 5 Closing Thoughts Presentation Identifier Goes Here 2 Corporate Network Is Continually Exposed Internet Kiosks & Shared Computers Guests WANs & Extranets SSL VPN Consultants IPsec VPN Employees Working at Home Wireless Networks Web Applications Presentation Identifier Goes Here 3 Endpoint Security Challenges • Endpoint management costs are increasing – Costs to acquire, manage and administer point products are increasing, as well as the demand on system resources • Complexity as well – Complexity and man power to manage disparate endpoint protection technologies are inefficient and time consuming • Growing number of new known and unknown threats – Stealth-based and silent attacks are increasing, so there is a need for anti-virus to do much more – Large amount of threats coming from internal sources Presentation Identifier Goes Here 4 Is Vista the answer to all security issues? Presentation Identifier Goes Here 5 Breaches and Implications CSO magazine 2006 E-Crime Watch Survey: • 60% of organizations dealing with financial loss • 40% reporting financial loss averaging $740,000 • 23% reporting harm done to company reputation • 27% of threats coming from Insiders Presentation Identifier Goes Here 6 Is Endpoint Protection Enough Protection ? “What “What Are Are The The Most Most Common Common Sources Sources Of Of Automated Automated Internet Internet Worm Worm Attacks Attacks ?” ?” 43% Employee Laptop 39% Internet Through Firewall 34% Non-Employee Laptop 27% VPN Home System Don’t Know 8% Other 8% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% Source: Enterprise Strategy Group, January 2005 ESG Research Report, Network Security And Intrusion Prevention Presentation Identifier Goes Here 7 Windows Vista & Security • Vista provides a more secure Operating System • Companies need a multi-tier security approach on top of Vista – Complex threats attacking all system layers, not only the O/S – 69% of vulnerabilities target web applications (ISTR X) • Web application vulnerabilities often require no exploit code, allowing for quick attacks right through the firewall with little attacker skill required – Client users are often responsible for system infection • Device usage – MP3 players, USB drives, CD/DVD • Software downloads – Screen savers, P2P, Network games • Misleading Applications – SpySherrif/WinFixer Presentation Identifier Goes Here 8 Symantec-Microsoft • Symantec has a long term partnership with Microsoft • Working together on Vista launch – Symantec Ghost-Backup and AntiVirus ready for Vista • Opportunity for incremental sales revenue with Microsoft sales – Microsoft Servers – Microsoft Exchange – Microsoft Vista Presentation Identifier Goes Here 9 Top 10 reasons why you need Symantec AntiVirus with Windows Vista 10 Vista is an operating, not a security solution 9 Microsoft, CRN and eWeek recommend having an antivirus solution on top of Vista 4 8 Microsoft’s own antivirus even failed to secure Vista! 3 Symantec Global Intelligence & Response provides deeper and faster analysis of threats around the globe 2 Symantec Endpoint Security portfolio provides the most complete & trusted technology for your network & assets 1 Symantec is the dominant worldwide security leader 7 Polymorphic viruses, spyware and other complex threats will go around the O/S and Windows Defender 6 Average financial loss from data theft is $740,000, is that in your security budget??? Trojans/Spyware 5 Your company needs robust & consistent security across the organization Managing security needs to be easy, automated and cost efficient Presentation Identifier Goes Here 10 Compliance Protection Endpoint Security Defined Worms Unknown Attacks Spyware Endpoint Security Policy Status Viruses Trojans Anti-Virus On Anti-Virus Signature Updated Personal Firewall On Service Pack Updated Patch Updated Presentation Identifier Goes Here 11 Symantec Endpoint Compliance Process Step 1 Endpoint Attaches To Network Configuration Is Determined Step 4 Monitor Endpoint To Ensure Ongoing Compliance ✗ Step 2 Compliance Of Configuration Against Policy Is Checked Step 3 Take Action Based On Outcome Of Policy Check Patch Quarantine Virtual Desktop Presentation Identifier Goes Here 12 Forrester Research The State Of Security In Enterprises & SMB December 26th 2006 “… 66% of enterprises will increase their spending on network security equipment and services this year.” “….the widgets most in demand technology is network access control (NAC)… Presentation Identifier Goes Here 13 Symantec Network Access Control Sales Opportunity #1 Mobile Computers Accessing Network Remotely Managed User VPN Corporate Network WEB Hotel Symantec Gateway Enforcer Email Server HR Server Airport CRM Server Café Home Office Symantec Sygate File Server Policy Manager Presentation Identifier Goes Here 14 Symantec Network Access Control Sales Opportunity #2 Local Computers using network Symantec LAN Enforcer Managed Endpoint Corporate Network Corporate Servers Symantec Sygate Policy Manager Presentation Identifier Goes Here 15 Symantec Network Access Control Sales Opportunity #2A Local Computers with DHCP Servers Corporate Network Symantec DHCP Enforcer Managed Endpoint DHCP Server Corporate Servers Symantec Sygate Policy Manager Presentation Identifier Goes Here 16 SNAC slide • May be a change between content on this slide and the next Presentation Identifier Goes Here 17 SNAC Scanner Checks • Over 200 checks – 75 Windows-specific – no Admin credentials – Includes server and desktop checks • Scans for – Buffer overflow vulnerabilities in services and applications (IIS, SSH, – Presence of viruses, worms, or backdoors (Welchia, MyDoom, Trinoo, etc.) – Unpatched or outdated versions of applications (sendmail, BIND, Oracle, OpenSSL) – Services/applications: Windows Messenger, Oracle Listener, MSSQL, SNMP, etc. – NULL or weak passwords – CGI and web server/file retrieval vulnerabilities Presentation Identifier Goes Here 18 Symantec AntiVirus v10.2 • Available now • Same award winning security features as 10.1 – Complete malware detection and removal – Integrated Reporting • Products released – Symantec AntiVirus Corporate Edition 10.2 • Now supporting Windows Vista (32 and 64 bit) – Symantec AntiVirus Enterprise Edition 10.2 • Multi-tier AV protection at desktop, server and gateway • Now includes Symantec Client Security 3.1 (pre-Vista version) Presentation Identifier Goes Here 19 And Coming Soon… • Next-generation of Symantec AntiVirus – Unified management console – Unified agent that combines SYMC, Sygate and Whole Security – Includes proactive, behavioral based protection – Provides layered security: AV,FW, HIPS, device control, SNAC & behavior blocking • We encourage customers to maintain a valid maintenance contract with Symantec • Explore our new license and support programs: – http://www.symantec.com/enterprise/licensing/index.jsp Presentation Identifier Goes Here 20 Q&A [email protected] Q&A Lauren Duda [email protected] © 2006 Symantec Corporation. All rights reserved. THIS DOCUMENT IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY AND IS NOT INTENDED AS ADVERTISING. ALL WARRANTIES RELATING TO THE INFORMATION IN THIS DOCUMENT, EITHER EXPRESS OR IMPLIED, ARE DISCLAIMED TO THE MAXIMUM EXTENT ALLOWED BY LAW. THE INFORMATION IN THIS DOCUMENT IS SUBJECT TO CHANGE WITHOUT NOTICE. Presentation Identifier Goes Here 22 Back Up Slides Symantec Security Response at a Glance Global Intelligence Network • 150 million client, server, and gateway anti-virus systems • 40,000 sensors in 180 different countries • Over 15 years combating threats • 200+ security specialists • 24x7x365 worldwide operations • 2000 Technical Support Expert • 2 million decoy email accounts • Tracking vulnerabilities in 35,000 product versions from 4,200 vendors • 500 Symantec Managed Security Services customers • Bi-annual Internet Security Threat Reports Presentation Identifier Goes Here 24 Best-of-Breed Personal Firewall Personal Firewall Features • Rule-based firewall engine • Firewall rule triggers • Application, host, service, time • Full TCP/IP support • TCP, UDP, ICMP, Raw IP Protocol • Support for Ethernet protocols • Allow or block • Token ring, IPX/SPX, AppleTalk, NetBEUI • Able to block protocol drivers • E.g., VMware, WinPcap • Adapter-specific rules This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from Symantec.The Magic Quadrant is copyrighted Junel 2006 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims allSource: warranties, express or implied, with respect to 1Q06, this research, including Magic Quadrant for Personal Firewalls John Girald, 27 Presentation Identifier Goes Here any warranties of merchantability or fitness for a particular purpose. June 2006 25 Protection Versus The Most Complex Threats • Symantec best at handling sophisticated, dynamic threats • The latest AV Comparative test shows Symantec the top performer in protection versus polymorphic threats Protection Versus Polymorphic Threats 100 99.4 99.4 94.3 84 79.5 N or m an nd a nd itD ef e Pa er e 36 B M cA fe et eS ur e ec FS as pe r K Sy m an te sk y c 37 Source: Andreas Clementi, February 2006 Presentation Identifier Goes Here 26 Symantec for Accurate, Reliable Detection Ziff Davis Editor’s Choice “Symantec… blitzed the field in detection which is what you really want” Ziff Davis Detection Accuracy Comparison Symantec PC Tools Computer Associates Webroot Microsoft McAfee Trend Micro Lavasoft 0 1 2 3 4 5 6 7 8 9 http://www.zdnet.com.au/reviews/software/security/soa/To_catch_a_spy_Eight_anti_spyware_tools_reviewed/0,39023452,39225147,00.htm Presentation Identifier Goes Here 27 Surgical Remediation “Symantec clearly establishes itself as the leader when remediating critical files, which comprises of executable content (i.e. *.exe, *.dll) and essential registry keys.” -Thompson CyberSecurity Labs, 2005 Competitive Comparison - Removal of Executables Files 200 195 190 Symantec Webroot 185 180 175 170 165 160 Microsoft McAfee Spyware Doctor 155 150 Executable Components Removed Presentation Identifier Goes Here 28 Best-of-Breed Spyware Detection & Removal • SAV 11.0 outperforms the competition in spyware detection, disinfection and removal 100% 80% 60% 40% Removal Rate Disinfection Rate 20% Detection Rate W elt S Su nb so ft Mi c ro We br oo t Mc Af ee Sy ma nte c PC To ols 0% From tests performed by Thompson Cyber Security Labs Presentation Identifier Goes Here 29 Endpoint protection built on Symantec AntiVirus Symantec: • Submitted all supported environments for analysis since Nov. ‘99 • ONLY vendor to obtain 30 consecutive VB100 Awards • Pass: Detected all "In the Wild viruses" in comparative tests (with no false positives) • Fail: Missed detection after three attempts • —: Chose not to submit for testing Presentation Identifier Goes Here 30