Post on 13-Jan-2015
description
Protecting Critical Systems with Symantec
Chris Collier
Presales Specialist - Security
E: Chris.Collier@arrowecs.co.uk
Agenda• Introduction
• What is a Critical System?
• Symantec Critical System Protection
• Common Customer Requirements
• Use Case
• Summary
• Q&A
2
What is a Critical System?
What is a Critical System?
Databases Application
WebFile Legacy
CriticalSystems
Symantec Critical System Protection
Product Description
Symantec Critical System Protection secures physical and virtual servers.
Proactively safeguard server
environments
• Restrict application and OS behavior
• Protect against zero day threats
• Monitor approved applications
Granular, policy-based controls
Defends physical and virtual servers.
• Monitor and protect physical and virtual data centers
• Provide granular, policy-based controls
• Use host-based intrusion detection (HIDS), intrusion prevention (HIPS), and least-privilege access control
OS Support
– Microsoft Windows
– Sun Solaris®
– Red Hat® Linux
– SUSE Linux
– HP-UX®
– IBM AIX®
– VMware ESX Console OS
7
http://www.symantec.com/connect/blogs/symantec-critical-system-protection-hack-proof-black-hat
8
Black Hat Conference 2012
- A “Capture the flag” event
- Unpatched Windows 2003 server
- Running several vulnerable applications,
- Protected by Symantec solutions. – SEP & CSP
- More than 50 skilled hackers
- The Symantec protected systems remained hack-proof
The Result?
Customer Requirements
Customer Requirements
Use Case
Use Case: VMware Customer
• Target Segments: Financial Services, technology. public sector, manufacturing, healthcare
• Business driver: Moving business onto the cloud to lower capital and operating expenses.
• Potential Background: Building cloud infrastructure using vSphere.
• Feature: Symantec Critical System Protection completely protects vSphere. It is a single solution that protects the ESX and ESXi Hypervisors and vCenter as well as Windows and non-Windows guest virtual machines.
• Outcome: Physical and virtual servers are hardened and secured from attack.
• Key Question: “What are you doing to protect the Hypervisor?”
Summary
Summary
– Critical systems need extra security
– There are multiple opportunities for this product to be positioned.
– Physical Security
– Virtualisation Security
– Legacy & Non-Legacy System Security
– Broad Platform Support
– Proven Technology from Market Leading Security Vendor
Questions?