Backup Exec 12 and Backup Exec System Recovery 8
Download
Report
Transcript Backup Exec 12 and Backup Exec System Recovery 8
Symantec Endpoint Management
Suite Customer Presentation
TM
Manage. Secure. Recover.
Agenda
1
Today’s IT Challenges
2
Symantec’s Collaborative Architecture
3
Symantec Endpoint Management Suite
4
Connecting Symantec Technologies Today
5
Q&A
TM
2
Today’s IT Challenges
Malicious
Threats
Human
Error
Information
Natural
Disasters
Infrastructure
Failures
3
Traditional Protection isn’t Good
Enough Anymore
5%
Evil geniuses who attack us with
zero-day attacks < 5%
30%
30% can be resolved through
patch management
65%
System configuration represents 2/3
of all system weaknesses
Source: SearchSecurity.TechTarget.com
4
A Secure Endpoint is a
Well-managed Endpoint
95%
Security problems
can be solved by
endpoint management
John Pescatore, Vice President, Gartner Inc.
Source: http://searchsecurity.techtarget.com/news/interview/0,289202,sid14_gci905234,00.html
5
Symantec’s Collaborative Architecture
Open Collaborative Architecture:
Connecting People and Technology
Workflow Execution
Monitor status
Close incidents
Distribute patches
Obtain change control approval
Update signatures
Kick-off backup process
Test patches
Notify risk management team
Endpoint Security
Backup &
Recovery
Service Desk
Patch
Management
Configuration
Management
Database (CMDB)
Comprehensive Network Discovery
Common Software Delivery Process
Centralized Reporting
Remote Administration
7
Driving to Convergence
Situation
Solution
CMDB
Integration
on Altiris
Platform
• Duplication of tasks
• Gaps require manual processes
• Multiple consoles and agents
• Various data repositories
• Overlapping policies
• Native integration
• Single view of compliance
• Consolidated status reporting
• Pre-built workflow processes
8
Symantec Leads the Way
July 2007 “The Forrester Wave™:
Client Management Suites, Q3 2007”
Risky
Bets
Contenders
Strong
Performers
Leaders
Strong
Symantec
LANDesk
CA
HP
Symantec’s acquisition of Altiris in
Q2 2007 illustrates the impending
requirements of integrated security
and management—and that is
exactly what Symantec delivers.
Novell
BMC Software
IBM
Current
offering
Symantec Offers the Most Mature
Client Management Suite
Microsoft
Natalie Lambert
Senior Analyst, Forrester
Market presence
Full vendor participation
Weak
Strategy
Strong
Symantec Confidential
9
Introducing
Endpoint Management Suite
MANAGE
Altiris® Client
Management Suite™ 6.0
• Inventory and discovery
SECURE
Symantec™ Endpoint
Protection 11.0
RECOVER
Backup Exec™ System
Recovery 8
• Antivirus and
antispyware protection
• Local and offsite backup
• Software delivery and
patch management
• Firewall
• Complete system recovery
• Remote administration
• Application and device control
• Imaging and provisioning
#1 in worldwide
software distribution
(IDC 2006)
Leader in client
management suites
(Forrester 2007)
• File and folder restore
• Intrusion prevention
#1 in worldwide
secure content and
threat management
(IDC 2006)
Leader in endpoint
protection platforms
(Gartner 2007)
#1 in worldwide data
protection and
recovery (IDC 2006)
Leader enterprise
backup/recovery
software (Gartner 2007)
10
Manage.
How are you managing your Windows® desktops and laptops?
IT Lifecycle Management
Transition &
Migration
Asset
Identification
Problem
Resolution
Monitor &
Track
Business
Continuity
Endpoint
Security &
Management
•
•
•
•
Retirement
Procurement
Staging
Production
Contract
Management
Deployment &
Configuration
Application
Packaging & QA
Patch
Management
Software Distribution
& Virtualization
Endpoint
Security
12
Altiris® Client Management Suite™ 6.0
Results
Software Distribution
& Patch Management
Imaging &
Provisioning
Inventory &
Discovery
Altiris
Client Management
Suite 6.0
13
Key Ingredients for Management
Inventory and Discovery
Populates CMDB with comprehensive
data for discoverable assets
Aggregates data across environment
in real time
Assists with software license
management
Helps forecast growth requirements
Results
Inventory &
Discovery
GM Brazil > Reduced annual
software license expenses by 44
percent within 45 days, equaling a
1,000 percent ROI
Reed Smith > Reduced inventory
time from one month to minutes
14
Key Ingredients for Management
Imaging and Provisioning
Comprehensive deployment capabilities
Image-based or scripted OS install
Ongoing updates/re-provisioning
Tools for hands-free and PC user
personality migrations
Facilitates implementation of
standardized desktop configurations
Imaging &
Provisioning
Inventory &
Discovery
Reduces risks associated with
desktop changes
Results
Triple S > Reduced migration time
by 85 percent
U.S. Air Force > Responded to new
hardware imaging requests in 88
percent less time
Key Ingredients for Management
Software Distribution and
Patch Management
Implements policy-based
software management
Distribute applications, updates,
code, files to target systems
Software Distribution
& Patch Management
Imaging &
Provisioning
Inventory &
Discovery
Proactively manage software updates
to minimize security risks
Automates patch distribution with
one-click creation of collections
and policies
Bandwidth-sensitive systems
management for the mobile workforce
and roaming worker
Results
Horizon > Improved software
delivery success rate from 60
percent to 90+ percent
Edwards Lifesciences > Able
to patch their 2,000 PCs in
less than two hours
16
Secure.
How are you protecting yourself from external threats?
Corporate Network
is Continually Exposed
Guests
WANs
& Extranets
Internet Kiosks
& Shared
Computers
SSL VPN
Consultants
IPsec VPN
Employees
Working at Home
Web
Applications
Wireless
Networks
Symantec Endpoint Protection 11.0
Results
Device and
Application Control
Intrusion
Prevention
Increased
Protection,
Control &
Manageability
Firewall
Antivirus &
Antispyware
Symantec Endpoint
Protection 11.0
Reduced
Cost,
Complexity &
Risk Exposure
19
Key Ingredients for Endpoint Protection
Antivirus
World’s leading antivirus solution
Most (37) consecutive VB100 Awards
Antispyware
Best rootkit detection and removal
Viruses, Trojans, Worms
Spyware, Rootkits
VxMS = superior rootkit protection
Antivirus &
Antispyware
Source: Thompson Cyber
Security Labs, August 2006
2020
Key Ingredients for Endpoint Protection
Firewall
Industry-leading endpoint
firewall technology
Gartner Magic Quadrant “Leader”
four consecutive years
Worms, Spyware
Rules-based firewall can dynamically
adjust port settings to block threats
from spreading
Firewall
Antivirus &
Antispyware
21
Key Ingredients for Endpoint Protection
Intrusion Prevention
Combines NIPS (network) and
HIPS (host)
0-Day, Key Logging
Intrusion
Prevention
Firewall
Generic Exploit Blocking (GEB)—One
signature to proactively protect against
all variants
Granular application access control
TruScan™—Proactive threat scanning
technology; very low (0.0049%) falsepositive rate
Detects 1,000 new threats per month
that are not detected by leading
antivirus engines
Antivirus &
Antispyware
No False
Alarm
25M Installations
False
Alarms
Fewer than 50 false positives for
every 1M PCs
22
Key Ingredients for Endpoint Protection
Device and Application Control
Slurping, IP Theft
Device and
Application Control
Prevents data leakage
Restrict Access to devices (USB keys,
backup drives)
Whitelisting—Allow only “trusted”
applications to run
Intrusion
Prevention
Firewall
Antivirus &
Antispyware
W32.SillyFDC
Targets removable
memory sticks
Spreads by copying itself onto
removable drives such as USB
memory sticks
Automatically runs when the
device is next connected to
a computer
Recover.
How quickly can you recover from a loss or disaster?
The Cost of System Failure
What would you lose if a
system crashed?
• Sales transactions
• Manufacturing data
• Email and other business data
• Employee productivity
• Company reputation
25
Symantec Backup Exec System
Recovery 8 Desktop Edition
Results
File or Folder
Restore
Increased
end-user
productivity
Complete System
Recovery
Local or Offsite
Backup
Reduced
downtime and
data loss
Symantec Backup Exec
System Recovery 8
26
Key Ingredients for Endpoint Recovery
Local or Offsite Backup
Create real-time, while-you-work
recovery points of the entire system
and save to any disk storage device
Supports full and incremental backups
to save disk space and increase
backup performance
Select from multiple compression
options: none, standard, medium,
or high
Select from multiple encryption options:
128-bit, 192-bit, or 256-bit AES
Local or Offsite
Backup
Automatically copy recovery points
(backups) to a network share, FTP
server, or external hard drive to
enhance disaster recovery efforts
Intelligently and uniquely identifies
and communicates to USB drives,
successfully running backup jobs even
if the drive letter for the device changes
27
Key Ingredients for Endpoint Protection
Complete System Recovery
Rapid recovery of entire systems, even
to dissimilar hardware or virtual
environments, breaks the barrier of
incompatible storage controllers and
hardware abstraction layers
File or Folder
Restore
Volumes can be resized during a
restore, making hard-drive upgrades or
full hardware migrations quick and easy
Complete System
Recovery
File or Folder Restore
Local or Offsite
Backup
Recovers individual files and folders in
seconds from either recovery points or
file/folder backups
Enables end-user recovery of files and
folders via Google Desktop™ or Backup
Exec Retrieve using a common Webbrowser interface for fast and simple
recovery, without IT intervention
Connecting Symantec
Technologies Today
Altiris Console Integration
• Centralized management
of agents
• Centralized distribution
of clients
• Create backup policies and
apply to desired systems
• Leverage other components
within the management
framework
ThreatCon Integration
• Integrates with Symantec
ThreatCon and DeepSight™
Threat Management System*
* Only requires Internet connection. Does not require
Symantec Endpoint Protection Manager
29
Symantec Endpoint Management
Suite
Symantec continues
to drive innovation
through unique
technology convergence
and integration
Thank You!
Copyright © 2008 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and
other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to
the maximum extent allowed by law. The information in this document is subject to change without notice.
31