Backup Exec 12 and Backup Exec System Recovery 8

Download Report

Transcript Backup Exec 12 and Backup Exec System Recovery 8

Symantec Endpoint Management
Suite Customer Presentation
TM
Manage. Secure. Recover.
Agenda
1
Today’s IT Challenges
2
Symantec’s Collaborative Architecture
3
Symantec Endpoint Management Suite
4
Connecting Symantec Technologies Today
5
Q&A
TM
2
Today’s IT Challenges
Malicious
Threats
Human
Error
Information
Natural
Disasters
Infrastructure
Failures
3
Traditional Protection isn’t Good
Enough Anymore
5%
Evil geniuses who attack us with
zero-day attacks < 5%
30%
30% can be resolved through
patch management
65%
System configuration represents 2/3
of all system weaknesses
Source: SearchSecurity.TechTarget.com
4
A Secure Endpoint is a
Well-managed Endpoint
95%
Security problems
can be solved by
endpoint management
John Pescatore, Vice President, Gartner Inc.
Source: http://searchsecurity.techtarget.com/news/interview/0,289202,sid14_gci905234,00.html
5
Symantec’s Collaborative Architecture
Open Collaborative Architecture:
Connecting People and Technology
Workflow Execution
Monitor status
Close incidents
Distribute patches
Obtain change control approval
Update signatures
Kick-off backup process
Test patches
Notify risk management team
Endpoint Security
Backup &
Recovery
Service Desk
Patch
Management
Configuration
Management
Database (CMDB)
Comprehensive Network Discovery
Common Software Delivery Process
Centralized Reporting
Remote Administration
7
Driving to Convergence
Situation
Solution
CMDB
Integration
on Altiris
Platform
• Duplication of tasks
• Gaps require manual processes
• Multiple consoles and agents
• Various data repositories
• Overlapping policies
• Native integration
• Single view of compliance
• Consolidated status reporting
• Pre-built workflow processes
8
Symantec Leads the Way
July 2007 “The Forrester Wave™:
Client Management Suites, Q3 2007”
Risky
Bets
Contenders
Strong
Performers
Leaders
Strong
Symantec
LANDesk
CA
HP
Symantec’s acquisition of Altiris in
Q2 2007 illustrates the impending
requirements of integrated security
and management—and that is
exactly what Symantec delivers.
Novell
BMC Software
IBM
Current
offering
Symantec Offers the Most Mature
Client Management Suite
Microsoft
Natalie Lambert
Senior Analyst, Forrester
Market presence
Full vendor participation
Weak
Strategy
Strong
Symantec Confidential
9
Introducing
Endpoint Management Suite
MANAGE
Altiris® Client
Management Suite™ 6.0
• Inventory and discovery
SECURE
Symantec™ Endpoint
Protection 11.0
RECOVER
Backup Exec™ System
Recovery 8
• Antivirus and
antispyware protection
• Local and offsite backup
• Software delivery and
patch management
• Firewall
• Complete system recovery
• Remote administration
• Application and device control
• Imaging and provisioning
#1 in worldwide
software distribution
(IDC 2006)
Leader in client
management suites
(Forrester 2007)
• File and folder restore
• Intrusion prevention
#1 in worldwide
secure content and
threat management
(IDC 2006)
Leader in endpoint
protection platforms
(Gartner 2007)
#1 in worldwide data
protection and
recovery (IDC 2006)
Leader enterprise
backup/recovery
software (Gartner 2007)
10
Manage.
How are you managing your Windows® desktops and laptops?
IT Lifecycle Management
Transition &
Migration
Asset
Identification
Problem
Resolution
Monitor &
Track
Business
Continuity
Endpoint
Security &
Management
•
•
•
•
Retirement
Procurement
Staging
Production
Contract
Management
Deployment &
Configuration
Application
Packaging & QA
Patch
Management
Software Distribution
& Virtualization
Endpoint
Security
12
Altiris® Client Management Suite™ 6.0
Results
Software Distribution
& Patch Management
Imaging &
Provisioning
Inventory &
Discovery
Altiris
Client Management
Suite 6.0
13
Key Ingredients for Management
Inventory and Discovery
 Populates CMDB with comprehensive
data for discoverable assets
 Aggregates data across environment
in real time
 Assists with software license
management
 Helps forecast growth requirements
Results
Inventory &
Discovery
 GM Brazil > Reduced annual
software license expenses by 44
percent within 45 days, equaling a
1,000 percent ROI
 Reed Smith > Reduced inventory
time from one month to minutes
14
Key Ingredients for Management
Imaging and Provisioning
 Comprehensive deployment capabilities
 Image-based or scripted OS install
 Ongoing updates/re-provisioning
 Tools for hands-free and PC user
personality migrations
 Facilitates implementation of
standardized desktop configurations
Imaging &
Provisioning
Inventory &
Discovery
 Reduces risks associated with
desktop changes
Results
 Triple S > Reduced migration time
by 85 percent
 U.S. Air Force > Responded to new
hardware imaging requests in 88
percent less time
Key Ingredients for Management
Software Distribution and
Patch Management
 Implements policy-based
software management
 Distribute applications, updates,
code, files to target systems
Software Distribution
& Patch Management
Imaging &
Provisioning
Inventory &
Discovery
 Proactively manage software updates
to minimize security risks
 Automates patch distribution with
one-click creation of collections
and policies
 Bandwidth-sensitive systems
management for the mobile workforce
and roaming worker
Results
 Horizon > Improved software
delivery success rate from 60
percent to 90+ percent
 Edwards Lifesciences > Able
to patch their 2,000 PCs in
less than two hours
16
Secure.
How are you protecting yourself from external threats?
Corporate Network
is Continually Exposed
Guests
WANs
& Extranets
Internet Kiosks
& Shared
Computers
SSL VPN
Consultants
IPsec VPN
Employees
Working at Home
Web
Applications
Wireless
Networks
Symantec Endpoint Protection 11.0
Results
Device and
Application Control
Intrusion
Prevention
Increased
Protection,
Control &
Manageability
Firewall
Antivirus &
Antispyware
Symantec Endpoint
Protection 11.0
Reduced
Cost,
Complexity &
Risk Exposure
19
Key Ingredients for Endpoint Protection
Antivirus
 World’s leading antivirus solution
 Most (37) consecutive VB100 Awards
Antispyware
 Best rootkit detection and removal
Viruses, Trojans, Worms
Spyware, Rootkits
 VxMS = superior rootkit protection
Antivirus &
Antispyware
Source: Thompson Cyber
Security Labs, August 2006
2020
Key Ingredients for Endpoint Protection
Firewall
 Industry-leading endpoint
firewall technology
 Gartner Magic Quadrant “Leader”
four consecutive years
Worms, Spyware
 Rules-based firewall can dynamically
adjust port settings to block threats
from spreading
Firewall
Antivirus &
Antispyware
21
Key Ingredients for Endpoint Protection
Intrusion Prevention
 Combines NIPS (network) and
HIPS (host)
0-Day, Key Logging
Intrusion
Prevention
Firewall
 Generic Exploit Blocking (GEB)—One
signature to proactively protect against
all variants
 Granular application access control
 TruScan™—Proactive threat scanning
technology; very low (0.0049%) falsepositive rate
 Detects 1,000 new threats per month
that are not detected by leading
antivirus engines
Antivirus &
Antispyware
No False
Alarm
25M Installations
False
Alarms
Fewer than 50 false positives for
every 1M PCs
22
Key Ingredients for Endpoint Protection
Device and Application Control
Slurping, IP Theft
Device and
Application Control
 Prevents data leakage
 Restrict Access to devices (USB keys,
backup drives)
 Whitelisting—Allow only “trusted”
applications to run
Intrusion
Prevention
Firewall
Antivirus &
Antispyware
W32.SillyFDC
 Targets removable
memory sticks
 Spreads by copying itself onto
removable drives such as USB
memory sticks
 Automatically runs when the
device is next connected to
a computer
Recover.
How quickly can you recover from a loss or disaster?
The Cost of System Failure
What would you lose if a
system crashed?
• Sales transactions
• Manufacturing data
• Email and other business data
• Employee productivity
• Company reputation
25
Symantec Backup Exec System
Recovery 8 Desktop Edition
Results
File or Folder
Restore
Increased
end-user
productivity
Complete System
Recovery
Local or Offsite
Backup
Reduced
downtime and
data loss
Symantec Backup Exec
System Recovery 8
26
Key Ingredients for Endpoint Recovery
Local or Offsite Backup
 Create real-time, while-you-work
recovery points of the entire system
and save to any disk storage device
 Supports full and incremental backups
to save disk space and increase
backup performance
 Select from multiple compression
options: none, standard, medium,
or high
 Select from multiple encryption options:
128-bit, 192-bit, or 256-bit AES
Local or Offsite
Backup
 Automatically copy recovery points
(backups) to a network share, FTP
server, or external hard drive to
enhance disaster recovery efforts
 Intelligently and uniquely identifies
and communicates to USB drives,
successfully running backup jobs even
if the drive letter for the device changes
27
Key Ingredients for Endpoint Protection
Complete System Recovery
 Rapid recovery of entire systems, even
to dissimilar hardware or virtual
environments, breaks the barrier of
incompatible storage controllers and
hardware abstraction layers
File or Folder
Restore
 Volumes can be resized during a
restore, making hard-drive upgrades or
full hardware migrations quick and easy
Complete System
Recovery
File or Folder Restore
Local or Offsite
Backup
 Recovers individual files and folders in
seconds from either recovery points or
file/folder backups
 Enables end-user recovery of files and
folders via Google Desktop™ or Backup
Exec Retrieve using a common Webbrowser interface for fast and simple
recovery, without IT intervention
Connecting Symantec
Technologies Today
Altiris Console Integration
• Centralized management
of agents
• Centralized distribution
of clients
• Create backup policies and
apply to desired systems
• Leverage other components
within the management
framework
ThreatCon Integration
• Integrates with Symantec
ThreatCon and DeepSight™
Threat Management System*
* Only requires Internet connection. Does not require
Symantec Endpoint Protection Manager
29
Symantec Endpoint Management
Suite
Symantec continues
to drive innovation
through unique
technology convergence
and integration
Thank You!
Copyright © 2008 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and
other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to
the maximum extent allowed by law. The information in this document is subject to change without notice.
31