2. Agenda Environment and Endpoint Challenges 1 Symantec Endpoint Protection 2 Symantec Network Access Control 4 Entitlement/Deployment/Migration 3 Available Now 5
3. Corporate Network is Continually Exposed Wireless Networks Web Applications Guests Consultants IPsec VPN Employees Working at Home WANs & Extranets SSL VPN Internet Kiosks & Shared Computers
4. Business Problems at the Endpoint Source: Internet Security Threat Report Vol. XIII; Mar 2008 Significant Increase in Malicious New Code Threats
5.
6.
7.
8.
9. Intrusion Prevention System (IPS) Combined technologies offer best defense Intrusion Prevention (IPS) (N)IPS Network IPS (H)IPS Host IPS Deep packet inspection Attack-facing (Symantec sigs. via LiveUpdate, Custom sigs, SNORT-like) TruScan TM Behavior-based (Proactive Threat Scan technology) Generic Exploit Blocking Vulnerability-facing (Signatures for vulnerability) System Lockdown White listing (tightly control which applications can run)
10.
11.
12.
13. Next Generation Symantec AntiVirus Results: Antivirus Antispyware Firewall Intrusion Prevention Device and Application Control Network Access Control Single Agent, Single Console Managed by Symantec Endpoint Protection Manager Reduced Cost, Complexity & Risk Exposure Increased Protection, Control & Manageability Symantec Network Access Control 11.0 Symantec Endpoint Protection 11.0
14.
15. What analysts are saying Gartner Magic Quadrant Endpoint Protection Platforms, 12/2007 Organizations should consider Symantec Endpoint Protection if they ….. are looking for a more complete protection platform that supports the selection of multiple styles of protection from an extensible agent framework and managed from a single console.
16. Productivity Impact: Open Word and PowerPoint Faster with Symantec Microsoft Office 2007/Vista File “Open” Times (Increase Over Unprotected System) Source: The Tolly Group – Symantec Endpoint Protection vs. McAfee Total Protection for Endpoint Page 1 (08/2008) Symantec 100% Faster Symantec 800% Faster
17.
18. Is Endpoint Protection Enough Protection? Source: Enterprise Strategy Group, January 2005 ESG Research Report, Network Security And Intrusion Prevention Employee Laptop Internet Through Firewall Non-Employee Laptop VPN Home System Don’t Know Other 43% 39% 34% 27% 8% 8% “ What Are The Most Common Sources Of Automated Internet Worm Attacks ?”
19. Challenge: Access to Corporate Networks Corporate Network Open access to corporate networks means higher risk for infection Partners Consultants Auditors Home PC Hotel Business Center Partners Consultants
20.
21.
22. Symantec Network Access Control 3 Key Components 1. Central Management Console 2. Endpoint Evaluation Technology 3. Enforcer
25. 3. Enforcers Symantec LAN Enforcer-802.1X Symantec DHCP Enforcer Symantec Gateway Enforcer Symantec Self-Enforcement Host-based Network-based (optional) Best Better Good
26. How SNAC is Packaged Central Management Console Endpoint Evaluation Technology Endpoint Evaluation Technology Symantec Endpoint Protection Manager Persistent Agent (SNAC Agent) Dissolvable Agent (On-Demand Agent) Remote Vulnerability Scanner Self - Enforcement Gateway Enforcement DHCP Enforcement LAN (802.1x) Enforcement * * Add On Add On Add On Add On * Symantec Network Access Control v 11.0 Symantec Network Access Control Starter Edition v 11.0 * Required purchase of an enforcer appliance
27. Symantec NAC Self-Enforcement: How It Works Onsite or Remote Laptop Symantec Endpoint Protection Manager Remediation Resources Persistent Agent Protected Network Quarantine Client connects to network and validates policy Persistent Agent performs self-compliance checks Compliance fail: Apply “Quarantine” firewall policy Compliance pass: Apply “Office” firewall policy Host Integrity Rule Status Anti-Virus On Anti-Virus Updated Personal Firewall On Service Pack Updated Patch Updated Patch Updated
28. Where Endpoint Security Fits Satellite office Corporate Network Home office Coffee House File Server Web Server CD USB Server Endpoint Protection Endpoint Encryption Advanced Server Protection Mobile Security Network Access Control Partners Symantec TM Endpoint Protection Symantec TM Endpoint Encryption Symantec TM Critical System Protection Symantec TM Mobile Security Symantec TM Network Access Control Home PC Mobile Device Mobile office
My name is “xxxxxx”. Symantec is the leading provider of security, availability, and systems management for solutions protecting Windows environments. Symantec has made a major investment in providing incremental security technology to our customers by redefining our award winning antivirus solution and setting to stage to what endpoint security should be. (introduce other folks in the room, etc.)