Protecting Critical Systems with Symantec
-
Upload
arrow-ecs-uk -
Category
Technology
-
view
569 -
download
3
description
Transcript of Protecting Critical Systems with Symantec
![Page 1: Protecting Critical Systems with Symantec](https://reader035.fdocuments.us/reader035/viewer/2022062616/54b4a34f4a79597f518b459e/html5/thumbnails/1.jpg)
Protecting Critical Systems with Symantec
Chris Collier
Presales Specialist
![Page 2: Protecting Critical Systems with Symantec](https://reader035.fdocuments.us/reader035/viewer/2022062616/54b4a34f4a79597f518b459e/html5/thumbnails/2.jpg)
Agenda• Introduction
• What is a Critical System?
• Symantec Critical System Protection
• Common Customer Requirements
• Use Case
• Summary
• Q&A
2
![Page 3: Protecting Critical Systems with Symantec](https://reader035.fdocuments.us/reader035/viewer/2022062616/54b4a34f4a79597f518b459e/html5/thumbnails/3.jpg)
What is a Critical System?
![Page 4: Protecting Critical Systems with Symantec](https://reader035.fdocuments.us/reader035/viewer/2022062616/54b4a34f4a79597f518b459e/html5/thumbnails/4.jpg)
What is a Critical System?
Databases Application
WebFile Legacy
CriticalSystems
![Page 5: Protecting Critical Systems with Symantec](https://reader035.fdocuments.us/reader035/viewer/2022062616/54b4a34f4a79597f518b459e/html5/thumbnails/5.jpg)
Symantec Critical System Protection
![Page 6: Protecting Critical Systems with Symantec](https://reader035.fdocuments.us/reader035/viewer/2022062616/54b4a34f4a79597f518b459e/html5/thumbnails/6.jpg)
Product Description
Symantec Critical System Protection secures physical and virtual servers.
Proactively safeguard server
environments
• Restrict application and OS behavior
• Protect against zero day threats
• Monitor approved applications
Granular, policy-based controls
Defends physical and virtual servers.
• Monitor and protect physical and virtual data centers
• Provide granular, policy-based controls
• Use host-based intrusion detection (HIDS), intrusion prevention (HIPS), and least-privilege access control
![Page 7: Protecting Critical Systems with Symantec](https://reader035.fdocuments.us/reader035/viewer/2022062616/54b4a34f4a79597f518b459e/html5/thumbnails/7.jpg)
OS Support
– Microsoft Windows
– Sun Solaris®
– Red Hat® Linux
– SUSE Linux
– HP-UX®
– IBM AIX®
– VMware ESX Console OS
7
![Page 8: Protecting Critical Systems with Symantec](https://reader035.fdocuments.us/reader035/viewer/2022062616/54b4a34f4a79597f518b459e/html5/thumbnails/8.jpg)
http://www.symantec.com/connect/blogs/symantec-critical-system-protection-hack-proof-black-hat
8
Black Hat Conference 2012
- A “Capture the flag” event
- Unpatched Windows 2003 server
- Running several vulnerable applications,
- Protected by Symantec solutions. – SEP & CSP
- More than 50 skilled hackers
- The Symantec protected systems remained hack-proof
The Result?
![Page 9: Protecting Critical Systems with Symantec](https://reader035.fdocuments.us/reader035/viewer/2022062616/54b4a34f4a79597f518b459e/html5/thumbnails/9.jpg)
Customer Requirements
![Page 10: Protecting Critical Systems with Symantec](https://reader035.fdocuments.us/reader035/viewer/2022062616/54b4a34f4a79597f518b459e/html5/thumbnails/10.jpg)
Customer Requirements
![Page 11: Protecting Critical Systems with Symantec](https://reader035.fdocuments.us/reader035/viewer/2022062616/54b4a34f4a79597f518b459e/html5/thumbnails/11.jpg)
Use Case
![Page 12: Protecting Critical Systems with Symantec](https://reader035.fdocuments.us/reader035/viewer/2022062616/54b4a34f4a79597f518b459e/html5/thumbnails/12.jpg)
Use Case: VMware Customer
• Target Segments: Financial Services, technology. public sector, manufacturing, healthcare
• Business driver: Moving business onto the cloud to lower capital and operating expenses.
• Potential Background: Building cloud infrastructure using vSphere.
• Feature: Symantec Critical System Protection completely protects vSphere. It is a single solution that protects the ESX and ESXi Hypervisors and vCenter as well as Windows and non-Windows guest virtual machines.
• Outcome: Physical and virtual servers are hardened and secured from attack.
• Key Question: “What are you doing to protect the Hypervisor?”
![Page 13: Protecting Critical Systems with Symantec](https://reader035.fdocuments.us/reader035/viewer/2022062616/54b4a34f4a79597f518b459e/html5/thumbnails/13.jpg)
Summary
![Page 14: Protecting Critical Systems with Symantec](https://reader035.fdocuments.us/reader035/viewer/2022062616/54b4a34f4a79597f518b459e/html5/thumbnails/14.jpg)
Summary
– Critical systems need extra security
– There are multiple opportunities for this product to be positioned.
– Physical Security
– Virtualisation Security
– Legacy & Non-Legacy System Security
– Broad Platform Support
– Proven Technology from Market Leading Security Vendor
![Page 15: Protecting Critical Systems with Symantec](https://reader035.fdocuments.us/reader035/viewer/2022062616/54b4a34f4a79597f518b459e/html5/thumbnails/15.jpg)
Questions?