SlideShare a Scribd company logo
1 of 5
Download to read offline
DATA SHEET SYMANTEC DATA CENTER
SECURITY: SERVER 6.5
Agentless antimalware and network IPS for your VMware environments.
Data Sheet: Security Management
Symantec Data Center Security: Server
Solution Overview
Symantec™ Data Center Security (DCS): Server 6.5 delivers agentless antimalware protection, agentless network IPS, and
file reputation services for VMware environments. It enhances operational effectiveness in the data center by providing a
single-instance security service per host, protecting all virtual machines within that host.
Symantec™ DCS: Server 6.5 introduces Operations Director, a new feature that enables customers to automate and
orchestrate security provisioning of anti-malware and network IPS services at the application-level across VMware NSX
environments. This capability enables organizations to transition from traditional perimeter-centric security models that
mimic physical security infrastructures into dynamic, software-defined security models. By leveraging its out-of-the-box
integration with VMware vCenter and VMware NSX, Symantec™ Data Center Security: Server extends the ability to
automate and orchestrate application-centric security across third-party security tools that are registered with VMware
NSX Service Composer, starting with Palo Alto Networks.
1
Symantec™ DCS: Server 6.5 also features Unified Management Console (UMC), a new web-based console appliance that
delivers a consistent management experience across the Data Center Security products. Customers will use UMC to register
and configure features, reports, and products in Symantec™ Data Center Security (DCS).
Operations Director and Unified Management Console are the new software-defined security capabilities that are being
rolled out across the Symantec™ Data Center Security Product family. These enhanced capabilities are based on the core
tenets of embedding security into the platform, integrating and simplifying point technologies, and automating and
orchestrating security across the data center. These enhanced capabilities enhance operational efficiencies and mitigate
the dreaded security tax by enabling security to keep up with the speed of the business and IT operations.
WhWhyy SSymantec™ymantec™ Data Center SecuritData Center Security: Sery: Server?ver?
Symantec™ Data Center Security: Server is a good fit for your organization if your team is asking any of the questions
below:
• How do I dynamically provision application-level security for newly created virtual workloads?
• How do I deliver dynamic and operationally efficient antimalware and network IPS protection without taxing network
resources and application performance?
• How can I provision security so that it is able to keep up with the speed of business and IT?
• How can I scale out security as I scale my infrastructure and applications?
• How can I leverage my planned and current investment in VMware NSX to enhance security in my software-defined data
center?
• How can I reduce the resource impact associated with scanning and definition file updates, such as scan and update
storms?
What’s New in Symantec™ Data Center Security: Server 6.5?
• Agentless netAgentless networkwork-based threat detection and pro-based threat detection and protection (Nettection (Network IPS).work IPS). DCS: Server 6.5 leverages network
introspection for data packet inspection to detect threats. Security admins will have several options for defining security
policies that can be applied to workloads. Customers can optimize network performance and reduce disk IOPS by
creating application-specific Network IPS policies.
• Operations DirectorOperations Director.. This new feature delivers out-of-the-box security intelligence and automates policy-based security
orchestration within the Symantec Data Center Security product family. Operations Director automates the security
provisioning workflow, enables application-centric security services, and seamlessly integrates with VMware NSX.
Operations Director leverages its out of the box integration with Vmware vCenter and NSX Service Composer to extend
these capabilities into partner products like Palo Alto Networks NextGen Firewall.
• Unified Management Console (UMCUnified Management Console (UMC).). UMC is new web-based console appliance that delivers a consistent
management experience across Data Center Security products. Customers will use UMC to register and configure
features, reports, and products in the Symantec™ Data Center Security (DCS) product family.
• In-guesIn-guest file quarantine.t file quarantine. This feature enables admin to set rules on the number of days for files to age and purge, as
well as rules to purge folders based on count of files or on the size of the folder and generate alerts. This feature
supports regulatory mandates and internal data retention policies.
• Enhanced scan caching.Enhanced scan caching. This feature improves the performance of agentless malware detection.
• Support for NSX 6.1.2 and vSphere 5.5 U2.
Data Sheet: Security Management
DATA SHEET SYMANTEC DATA CENTER SECURITY: SERVER 6.5
2
SSymantec™ymantec™ Data Center SecuritData Center Security: Sery: Server Standard Fver Standard Featureseatures
• Agentless antimalware threat protection.
• Integrates with Symantec DeepSight providing reputation security technology to files and URL’s.
• Auto-deployment and provision of Security Virtual Appliance to ESX host in a cluster.
• Integrates at the hypervisor, providing real-time detection and remediation of malware infection.
• Always-on security with the best-of-breed security protection technology
• Supports VMware vSphere 5.5 and NSX 6.1.
CusCustomer Benefitstomer Benefits
• Optimize network and application performance of guests and hosts via agentless antimalware and agentless network
IPS.
• Improve network performance by having single definition updates.
• File and URL reputation services to complement the agentless malware protection service.
• Auto-deployment of virtual appliances enables the workloads to scale while minimizing any additional OpEx cost.
• Increase operational effectiveness by providing a single-instance security service per host.
– Eliminate virus scanning on each virtual machine by providing security at the hypervisor
– Centralized management of virus definitions eliminates the need for virus updates to each and every guest VM
• Enable always-on security during new workload provisioning, thus reducing the security tax.
Data Sheet: Security Management
DATA SHEET SYMANTEC DATA CENTER SECURITY: SERVER 6.5
3
SSymantec™ymantec™ Data Center SecuritData Center Security Solutionsy Solutions
Symantec™ Data Center Security enables organizations to harden their physical and virtual servers, securely transition into
software-defined data centers, and enable application-centric security across their public, private and private cloud
environments.
The Symantec™ Data Center Security Product family includes:
SSymantec™ Data Center Securitymantec™ Data Center Security: Sery: Serverver delivers friction-less threat protection with agentless anti-malware, network based
IPS and file reputation services for the VmWare environments. It supports in-guest quarantine feature to isolate suspected
malware files and remediate based on policy. Symantec™ Data Center Security: Server auto-delivers Security Virtual
Appliances (SVA) that scales out, resulting in huge savings in OpEx costs.
SSymantec™ Data Center Securitymantec™ Data Center Security: Monitoring Ey: Monitoring Editiondition enables organizations to continuously monitor the security and
compliance posture of its physical and virtual infrastructure, as well as its public (AWS) and private (OpenStack) clouds. It
combines agent-less malicious code protection along with the IPS/IDS monitoring, file integrity monitoring, and
configuration monitoring. This product is intended to enable customers automate and centralize their security operations
and compliance monitoring and reporting objectives.
SSymantec™ Data Center Securitymantec™ Data Center Security: Sery: Server Advver Advancedanced delivers security detection, monitoring, and prevention capabilities for
both physical and virtual server infrastructures. In addition to delivering agentless antimalware protection and security
monitoring for virtual and physical infrastructures and across the AWS and OpenStack clouds, Symantec™ Data Center
Security: Server Advanced protects both physical and virtual servers by delivering application and protected whitelisting,
fine-grained intrusion detection and prevention; file, system and admin lockdown; and file integrity and configuration
monitoring. It also supports full hardening of OpenStack Keystone.
SSymantec™ Control Compliance Suiteymantec™ Control Compliance Suite enables asset and network autodiscovery, automates security assessments and
calculates and aggregates the CVSS/CIS risk scores. Customers use Control Compliance Suite to enable basic security
hygiene, and gain visibility into their security, compliance, and risk postures. Customers use this intelligence to prioritize
remediation and optimize security resource allocation.
SSymantec™ymantec™ ProProtection Enginetection Engine delivers content scanning, antimalware, outbreak detection, anti-spam, insight and
reputation services, and granular content filtering technologies for various types of data stores such as cloud storage, NAS,
email, and AWS. Out-of-the-box support is available for NetApp NAS, Microsoft Exchange, and Sharepoint Data Stores, and
a robust SDK enables custom integration for other data stores.
More Information
Visit our website
http://enterprise.symantec.com
To speak with a Product Specialist in the U.S.
Call toll-free 1 (800) 745 6054
To speak with a Product Specialist outside the U.S.
For specific country offices and contact numbers, please visit our website.
About Symantec
Symantec Corporation (NASDAQ: SYMC) is an information protection expert that helps people, businesses, and
governments seeking the freedom to unlock the opportunities technology brings—anytime, anywhere. Founded in April
1982, Symantec, a Fortune 500 company operating one of the largest global data intelligence networks, has provided
Data Sheet: Security Management
DATA SHEET SYMANTEC DATA CENTER SECURITY: SERVER 6.5
4
leading security, backup, and availability solutions for where vital information is stored, accessed, and shared. The
company's more than 20,000 employees reside in more than 50 countries. Ninety-nine percent of Fortune 500 companies
are Symantec customers. In fiscal 2014, it recorded revenue of $6.7 billion. To learn more go to www.symantec.com or
connect with Symantec at: go.symantec.com/socialmedia.
Symantec World Headquarters
350 Ellis St.
Mountain View, CA 94043 USA
+1 (650) 527 8000
1 (800) 721 3934
www.symantec.com
Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the
U.S. and other countries. Other names may be trademarks of their respective owners.
21347665 02/15
Data Sheet: Security Management
DATA SHEET SYMANTEC DATA CENTER SECURITY: SERVER 6.5
5

More Related Content

What's hot

Azure Security and Management
Azure Security and ManagementAzure Security and Management
Azure Security and ManagementAllen Brokken
 
Power of the cloud - Introduction to azure security
Power of the cloud - Introduction to azure securityPower of the cloud - Introduction to azure security
Power of the cloud - Introduction to azure securityBruno Capuano
 
Azure for beginners series session 4
Azure for beginners series session 4Azure for beginners series session 4
Azure for beginners series session 4Lalit Rawat
 
040711 webcast securing vmachine
040711 webcast securing vmachine 040711 webcast securing vmachine
040711 webcast securing vmachine Erin Banks
 
Sql server 2008 r2 security overviewfor admins
Sql server 2008 r2 security   overviewfor adminsSql server 2008 r2 security   overviewfor admins
Sql server 2008 r2 security overviewfor adminsKlaudiia Jacome
 
Trust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataTrust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataAidan Finn
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide Array Networks
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Serviceguest536dd0e
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and ComplianceKarina Matos
 
Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud SecurityAlert Logic
 
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...David kankam
 
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Architecting Data Services for the Cloud: Security Considerations and Best Pr...Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Architecting Data Services for the Cloud: Security Considerations and Best Pr...Adnene Guabtni
 
Case Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private CloudCase Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private CloudVMware
 

What's hot (20)

Issa 042711
Issa 042711Issa 042711
Issa 042711
 
Azure Security and Management
Azure Security and ManagementAzure Security and Management
Azure Security and Management
 
Power of the cloud - Introduction to azure security
Power of the cloud - Introduction to azure securityPower of the cloud - Introduction to azure security
Power of the cloud - Introduction to azure security
 
Azure for beginners series session 4
Azure for beginners series session 4Azure for beginners series session 4
Azure for beginners series session 4
 
040711 webcast securing vmachine
040711 webcast securing vmachine 040711 webcast securing vmachine
040711 webcast securing vmachine
 
move-anti-virus
move-anti-virusmove-anti-virus
move-anti-virus
 
Azure security
Azure  securityAzure  security
Azure security
 
Sql server 2008 r2 security overviewfor admins
Sql server 2008 r2 security   overviewfor adminsSql server 2008 r2 security   overviewfor admins
Sql server 2008 r2 security overviewfor admins
 
Trust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataTrust No-One Architecture For Services And Data
Trust No-One Architecture For Services And Data
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and Compliance
 
Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud Security
 
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
 
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Architecting Data Services for the Cloud: Security Considerations and Best Pr...Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
 
Case Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private CloudCase Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private Cloud
 
Tekvizyon acronis cyber cloud
Tekvizyon acronis cyber cloudTekvizyon acronis cyber cloud
Tekvizyon acronis cyber cloud
 
Citrix Application Management Framework
Citrix Application Management FrameworkCitrix Application Management Framework
Citrix Application Management Framework
 
SECURE ACCESS GATEWAYS
SECURE ACCESS GATEWAYSSECURE ACCESS GATEWAYS
SECURE ACCESS GATEWAYS
 
Palo Alto Networks VM-Series firewall now available on NetScaler SDX Platform
Palo Alto Networks VM-Series firewall now available on NetScaler SDX PlatformPalo Alto Networks VM-Series firewall now available on NetScaler SDX Platform
Palo Alto Networks VM-Series firewall now available on NetScaler SDX Platform
 

Similar to Symantec Data Center Security Server 6.5

University Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical DataUniversity Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical DataNasser Hassan
 
Nsx security deep dive
Nsx security deep diveNsx security deep dive
Nsx security deep divesolarisyougood
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
ANS Solution Portfolio
ANS Solution PortfolioANS Solution Portfolio
ANS Solution Portfoliojclauer
 
Benefits of VMware Monitoring Tools
Benefits of VMware Monitoring ToolsBenefits of VMware Monitoring Tools
Benefits of VMware Monitoring Toolstiresomerat7000
 
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPraktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPrimend
 
VAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudVAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudSwapna Shetye
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server securityxband
 
VMworld 2015: Introducing Application Self service with Networking and Security
VMworld 2015: Introducing Application Self service with Networking and SecurityVMworld 2015: Introducing Application Self service with Networking and Security
VMworld 2015: Introducing Application Self service with Networking and SecurityVMworld
 
IBM Storwize V7000 Unified: Safeguarding your critical data
IBM Storwize V7000 Unified: Safeguarding your critical dataIBM Storwize V7000 Unified: Safeguarding your critical data
IBM Storwize V7000 Unified: Safeguarding your critical dataIBM India Smarter Computing
 
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent PolicyTECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent PolicySymantec
 
Check Point Software Technologies: Secure Your AWS Workloads
 Check Point Software Technologies: Secure Your AWS Workloads Check Point Software Technologies: Secure Your AWS Workloads
Check Point Software Technologies: Secure Your AWS WorkloadsAmazon Web Services
 
Microsoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son VuMicrosoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son Vuvncson
 
Securing Virtual and Cloud Environments
Securing Virtual and Cloud Environments Securing Virtual and Cloud Environments
Securing Virtual and Cloud Environments Bunmi Sowande
 

Similar to Symantec Data Center Security Server 6.5 (20)

University Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical DataUniversity Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical Data
 
Nsx security deep dive
Nsx security deep diveNsx security deep dive
Nsx security deep dive
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
ANS Solution Portfolio
ANS Solution PortfolioANS Solution Portfolio
ANS Solution Portfolio
 
Benefits of VMware Monitoring Tools
Benefits of VMware Monitoring ToolsBenefits of VMware Monitoring Tools
Benefits of VMware Monitoring Tools
 
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPraktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
 
IKare Vulnerability Scanner - Datasheet EN
IKare Vulnerability Scanner - Datasheet ENIKare Vulnerability Scanner - Datasheet EN
IKare Vulnerability Scanner - Datasheet EN
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
VAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudVAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus Cloud
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
VMworld 2015: Introducing Application Self service with Networking and Security
VMworld 2015: Introducing Application Self service with Networking and SecurityVMworld 2015: Introducing Application Self service with Networking and Security
VMworld 2015: Introducing Application Self service with Networking and Security
 
Cloud Security Solution Overview
Cloud Security Solution OverviewCloud Security Solution Overview
Cloud Security Solution Overview
 
IBM Storwize V7000 Unified: Safeguarding your critical data
IBM Storwize V7000 Unified: Safeguarding your critical dataIBM Storwize V7000 Unified: Safeguarding your critical data
IBM Storwize V7000 Unified: Safeguarding your critical data
 
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent PolicyTECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
 
OneCloud-VMwareNSX
OneCloud-VMwareNSXOneCloud-VMwareNSX
OneCloud-VMwareNSX
 
VersaStack brochure
VersaStack brochureVersaStack brochure
VersaStack brochure
 
Check Point Software Technologies: Secure Your AWS Workloads
 Check Point Software Technologies: Secure Your AWS Workloads Check Point Software Technologies: Secure Your AWS Workloads
Check Point Software Technologies: Secure Your AWS Workloads
 
Microsoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son VuMicrosoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son Vu
 
Securing Virtual and Cloud Environments
Securing Virtual and Cloud Environments Securing Virtual and Cloud Environments
Securing Virtual and Cloud Environments
 

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slidesvaideheekore1
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxRTS corp
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorTier1 app
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonApplitools
 
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingOpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingShane Coughlan
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptxVinzoCenzo
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLionel Briand
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogueitservices996
 
VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024VictoriaMetrics
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsJean Silva
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shardsChristopher Curtin
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfkalichargn70th171
 

Recently uploaded (20)

Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slides
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryError
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
 
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingOpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptx
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and Repair
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogue
 
VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero results
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
 

Symantec Data Center Security Server 6.5

  • 1. DATA SHEET SYMANTEC DATA CENTER SECURITY: SERVER 6.5 Agentless antimalware and network IPS for your VMware environments. Data Sheet: Security Management Symantec Data Center Security: Server Solution Overview Symantec™ Data Center Security (DCS): Server 6.5 delivers agentless antimalware protection, agentless network IPS, and file reputation services for VMware environments. It enhances operational effectiveness in the data center by providing a single-instance security service per host, protecting all virtual machines within that host. Symantec™ DCS: Server 6.5 introduces Operations Director, a new feature that enables customers to automate and orchestrate security provisioning of anti-malware and network IPS services at the application-level across VMware NSX environments. This capability enables organizations to transition from traditional perimeter-centric security models that mimic physical security infrastructures into dynamic, software-defined security models. By leveraging its out-of-the-box integration with VMware vCenter and VMware NSX, Symantec™ Data Center Security: Server extends the ability to automate and orchestrate application-centric security across third-party security tools that are registered with VMware NSX Service Composer, starting with Palo Alto Networks. 1
  • 2. Symantec™ DCS: Server 6.5 also features Unified Management Console (UMC), a new web-based console appliance that delivers a consistent management experience across the Data Center Security products. Customers will use UMC to register and configure features, reports, and products in Symantec™ Data Center Security (DCS). Operations Director and Unified Management Console are the new software-defined security capabilities that are being rolled out across the Symantec™ Data Center Security Product family. These enhanced capabilities are based on the core tenets of embedding security into the platform, integrating and simplifying point technologies, and automating and orchestrating security across the data center. These enhanced capabilities enhance operational efficiencies and mitigate the dreaded security tax by enabling security to keep up with the speed of the business and IT operations. WhWhyy SSymantec™ymantec™ Data Center SecuritData Center Security: Sery: Server?ver? Symantec™ Data Center Security: Server is a good fit for your organization if your team is asking any of the questions below: • How do I dynamically provision application-level security for newly created virtual workloads? • How do I deliver dynamic and operationally efficient antimalware and network IPS protection without taxing network resources and application performance? • How can I provision security so that it is able to keep up with the speed of business and IT? • How can I scale out security as I scale my infrastructure and applications? • How can I leverage my planned and current investment in VMware NSX to enhance security in my software-defined data center? • How can I reduce the resource impact associated with scanning and definition file updates, such as scan and update storms? What’s New in Symantec™ Data Center Security: Server 6.5? • Agentless netAgentless networkwork-based threat detection and pro-based threat detection and protection (Nettection (Network IPS).work IPS). DCS: Server 6.5 leverages network introspection for data packet inspection to detect threats. Security admins will have several options for defining security policies that can be applied to workloads. Customers can optimize network performance and reduce disk IOPS by creating application-specific Network IPS policies. • Operations DirectorOperations Director.. This new feature delivers out-of-the-box security intelligence and automates policy-based security orchestration within the Symantec Data Center Security product family. Operations Director automates the security provisioning workflow, enables application-centric security services, and seamlessly integrates with VMware NSX. Operations Director leverages its out of the box integration with Vmware vCenter and NSX Service Composer to extend these capabilities into partner products like Palo Alto Networks NextGen Firewall. • Unified Management Console (UMCUnified Management Console (UMC).). UMC is new web-based console appliance that delivers a consistent management experience across Data Center Security products. Customers will use UMC to register and configure features, reports, and products in the Symantec™ Data Center Security (DCS) product family. • In-guesIn-guest file quarantine.t file quarantine. This feature enables admin to set rules on the number of days for files to age and purge, as well as rules to purge folders based on count of files or on the size of the folder and generate alerts. This feature supports regulatory mandates and internal data retention policies. • Enhanced scan caching.Enhanced scan caching. This feature improves the performance of agentless malware detection. • Support for NSX 6.1.2 and vSphere 5.5 U2. Data Sheet: Security Management DATA SHEET SYMANTEC DATA CENTER SECURITY: SERVER 6.5 2
  • 3. SSymantec™ymantec™ Data Center SecuritData Center Security: Sery: Server Standard Fver Standard Featureseatures • Agentless antimalware threat protection. • Integrates with Symantec DeepSight providing reputation security technology to files and URL’s. • Auto-deployment and provision of Security Virtual Appliance to ESX host in a cluster. • Integrates at the hypervisor, providing real-time detection and remediation of malware infection. • Always-on security with the best-of-breed security protection technology • Supports VMware vSphere 5.5 and NSX 6.1. CusCustomer Benefitstomer Benefits • Optimize network and application performance of guests and hosts via agentless antimalware and agentless network IPS. • Improve network performance by having single definition updates. • File and URL reputation services to complement the agentless malware protection service. • Auto-deployment of virtual appliances enables the workloads to scale while minimizing any additional OpEx cost. • Increase operational effectiveness by providing a single-instance security service per host. – Eliminate virus scanning on each virtual machine by providing security at the hypervisor – Centralized management of virus definitions eliminates the need for virus updates to each and every guest VM • Enable always-on security during new workload provisioning, thus reducing the security tax. Data Sheet: Security Management DATA SHEET SYMANTEC DATA CENTER SECURITY: SERVER 6.5 3
  • 4. SSymantec™ymantec™ Data Center SecuritData Center Security Solutionsy Solutions Symantec™ Data Center Security enables organizations to harden their physical and virtual servers, securely transition into software-defined data centers, and enable application-centric security across their public, private and private cloud environments. The Symantec™ Data Center Security Product family includes: SSymantec™ Data Center Securitymantec™ Data Center Security: Sery: Serverver delivers friction-less threat protection with agentless anti-malware, network based IPS and file reputation services for the VmWare environments. It supports in-guest quarantine feature to isolate suspected malware files and remediate based on policy. Symantec™ Data Center Security: Server auto-delivers Security Virtual Appliances (SVA) that scales out, resulting in huge savings in OpEx costs. SSymantec™ Data Center Securitymantec™ Data Center Security: Monitoring Ey: Monitoring Editiondition enables organizations to continuously monitor the security and compliance posture of its physical and virtual infrastructure, as well as its public (AWS) and private (OpenStack) clouds. It combines agent-less malicious code protection along with the IPS/IDS monitoring, file integrity monitoring, and configuration monitoring. This product is intended to enable customers automate and centralize their security operations and compliance monitoring and reporting objectives. SSymantec™ Data Center Securitymantec™ Data Center Security: Sery: Server Advver Advancedanced delivers security detection, monitoring, and prevention capabilities for both physical and virtual server infrastructures. In addition to delivering agentless antimalware protection and security monitoring for virtual and physical infrastructures and across the AWS and OpenStack clouds, Symantec™ Data Center Security: Server Advanced protects both physical and virtual servers by delivering application and protected whitelisting, fine-grained intrusion detection and prevention; file, system and admin lockdown; and file integrity and configuration monitoring. It also supports full hardening of OpenStack Keystone. SSymantec™ Control Compliance Suiteymantec™ Control Compliance Suite enables asset and network autodiscovery, automates security assessments and calculates and aggregates the CVSS/CIS risk scores. Customers use Control Compliance Suite to enable basic security hygiene, and gain visibility into their security, compliance, and risk postures. Customers use this intelligence to prioritize remediation and optimize security resource allocation. SSymantec™ymantec™ ProProtection Enginetection Engine delivers content scanning, antimalware, outbreak detection, anti-spam, insight and reputation services, and granular content filtering technologies for various types of data stores such as cloud storage, NAS, email, and AWS. Out-of-the-box support is available for NetApp NAS, Microsoft Exchange, and Sharepoint Data Stores, and a robust SDK enables custom integration for other data stores. More Information Visit our website http://enterprise.symantec.com To speak with a Product Specialist in the U.S. Call toll-free 1 (800) 745 6054 To speak with a Product Specialist outside the U.S. For specific country offices and contact numbers, please visit our website. About Symantec Symantec Corporation (NASDAQ: SYMC) is an information protection expert that helps people, businesses, and governments seeking the freedom to unlock the opportunities technology brings—anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company operating one of the largest global data intelligence networks, has provided Data Sheet: Security Management DATA SHEET SYMANTEC DATA CENTER SECURITY: SERVER 6.5 4
  • 5. leading security, backup, and availability solutions for where vital information is stored, accessed, and shared. The company's more than 20,000 employees reside in more than 50 countries. Ninety-nine percent of Fortune 500 companies are Symantec customers. In fiscal 2014, it recorded revenue of $6.7 billion. To learn more go to www.symantec.com or connect with Symantec at: go.symantec.com/socialmedia. Symantec World Headquarters 350 Ellis St. Mountain View, CA 94043 USA +1 (650) 527 8000 1 (800) 721 3934 www.symantec.com Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 21347665 02/15 Data Sheet: Security Management DATA SHEET SYMANTEC DATA CENTER SECURITY: SERVER 6.5 5