Conference Call: 866-740-1260 Access Code: 6339392 Endpoint-Level Security at your Library or Nonprofit Introducing Symantec Endpoint Protection 12.

Slides:



Advertisements
Similar presentations
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Advertisements

8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
SiteLock Internet Security: Big Threats for Small Business.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Windows 8 for Nonprofits and Libraries With TechSoup’s Ginny Mies.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
Tech Donations for Libraries January 8, Using ReadyTalk Chat to ask questions All lines are muted If you lose your Internet connection, reconnect.
How to Get Microsoft Software Donations June 4, 2015.
Choose Your QuickBooks Adventure with QuickBooks 2015 October 24, 2014.
Windows 8.1 for Nonprofits and Libraries November 14, 2013.
Talks! Is FileMaker Right for Your Organization? November 18, 2010 Audio is only available by calling this number: Conference Call: ; Access.
Launch Your 2015 Grants Plan with GrantStation April 30, 2015.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
IS3220 Information Technology Infrastructure Security
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Microsoft OneNote: Capture Your Creativity May 30, 2013.
Your Windows 8 Questions Answered. Using ReadyTalk Chat and raise hand All lines are muted If you lose your internet connection, reconnect using the link.
Backup and Disaster Recovery In the Cloud. Using ReadyTalk Chat & raise hand All lines are muted If you lose your internet connection, reconnect using.
Mobile Impact 201: Digital Content Strategies for Mobile June 5, 2014.
TechSoup Tours December 19, Using ReadyTalk Chat and raise hand All lines are muted If you lose your Internet connection, reconnect using the link.
Making the Most Of Your Microsoft Software Donation.
Broadband Basics for Public Libraries January 15, 2013 Image courtesy of David Castillo Dominici on FreeDigitalPhotos.net.
Microsoft Publisher: Simple Desktop Publishing at Your Fingertips May 23, 2013.
Take a tour of the new Microsoft Office February 1, 2013.
QuickBooks 2014 for Nonprofits and Charities January 23, 2014.
Tech For Good Making the Most of Your Microsoft Software Donation.
Baby Steps: Video Post-Production and Promotion Jan. 16, 2013 With Anna Foote from the State Library of Kansas Aaron Bramley from Lights. Camera. Help.
Talks! Straight Talk About Telecommunications for Your Organization February 18, 2010 Audio is only available by calling this number: Conference Call:
QuickBooks Made Easy For Nonprofits and Charities.
Public Tech Instruction: Internet Safety March 26, 2014.
Spruce Up Your Website With Expertise from StoryCorps October 24, 2013.
How to Make Your Campaigns More Viral November 21, 2013.
Conference Call: Access Code: Microsoft Donation Program How does it work? Our webinar will begin at 10 a.m. Pacific time. To join.
Downloading Your Donated Microsoft Software June 6, 2013.
Talks! Managing IT Volunteers Audio is only available by calling this number: Conference Call: Access Code: Sponsored by.
Skype at the Office September 30, Using ReadyTalk Chat to ask questions All lines are muted If you lose your Internet connection, reconnect using.
Our webinar will begin at [Insert time]. To join the audio conference, please call [Insert Phone Number]. Access Code [Insert Access Code]. Create Dynamic.
TechSoup Tours January 30, 2013 With Ale Bezdikian and Thomas Netzband from TechSoup and chat support from Becky Wiegand.
TechSoup Tours July 18, Using ReadyTalk Chat and raise hand All lines are muted If you lose your Internet connection, reconnect using the link ed.
Downloading Transactions into QuickBooks For Nonprofits and Charities.
Our webinar will begin at 11 AM Pacific/2 PM Eastern. To join the audio conference, please call Access Code From Content Consumers.
Got Grants? Finding Funding with the Foundation Center Our webinar will begin at 11:00 Pacific time. To join the audio conference by phone, please call.
Talks! Successful Event Promotion with Social Media June 3, 2010 Audio is only available by calling this number: Conference Call: ; Access.
Conference Call: Access Code: Geocoding For Legislative Advocacy.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Talks! GrantStation: Your Fast Track to Funding August 11, 2010 Audio is only available by calling this number: Conference Call: ; Access Code:
Talks! Tour GrantStation: Your Fast Track to Funding Audio is only available by calling this number: Conference Call: ; Access Code:
Talks! The Many Uses for Adobe Acrobat December 16, 2010 Audio is only available by calling this number: Conference Call: ; Access Code:
Microsoft Office 2016 for Mac With Dave Ludwig, Microsoft October 22, 2015.
Talks! Social Media Decision Making September 21, 2010 Audio is only available by calling this number: Conference Call: ; Access Code:
Stop Spam Today! Conference Call: Access Code: December 9, 2008 Conference Call: Access Code: Stop Spam Today!
Our webinar will begin at 11:00am PST. Mapping Your Impact: A Case From Humanitarian Assistance.
Trend Micro Consumer 2010 Easy. Fast. Smart.
Tech Donations for Libraries
Making the Most Of TechSoup.org.
Getting Technology Donations Through TechSoup
Tech 101: Tactical Technology Planning
E-readers for Everyone:
Getting Technology Donations Through TechSoup
TechSoup Tours October 17, 2013.
Presentation transcript:

Conference Call: Access Code: Endpoint-Level Security at your Library or Nonprofit Introducing Symantec Endpoint Protection 12

Using ReadyTalk Chat & raise hand All lines are muted If you lose your internet connection, reconnect using the link ed to you. If you lose your phone connection, re-dial the phone number and re-join. ReadyTalk support: Conference Call: Access Code: Introducing Symantec Endpoint Protection 12

This seminar will be available on the TechSoup website along with past webinar presentations: You will receive a link to this presentation, material and links. After the webinar, you can ask follow-up questions in our Community Forum: Twitter hashtag: #techsoup You are being recorded… Conference Call: Access Code: Introducing Symantec Endpoint Protection 12

Conference Call: Access Code: Endpoint-Level Security at your Library or Nonprofit Conference Call: Access Code: Introducing Symantec Endpoint Protection 12

Presenters Kyla Hunt Facilitator Andy Singer Presenter Assisting with chat: Kevin Lo and Rachel Holmen Conference Call: Access Code: Introducing Symantec Endpoint Protection 12

Who is TechSoup? Security Threats Overview Endpoint Products for Libraries and Nonprofits Endpoint Product Updates Demo Q&A from Participants Agenda Conference Call: Access Code: Introducing Symantec Endpoint Protection 12

Who is TechSoup? TechSoup is a 501(c)(3) nonprofit organization. As of June 2010, TechSoup served more than 127,000 organizations, distributed more than 6.3 million technology donations, and enabled nonprofit recipients to save more than $1.8 billion in IT expenses in 33 countries around the world. Conference Call: Access Code: Introducing Symantec Endpoint Protection 12

TechSoup is part of TechSoup Global, is working towards the day when every nonprofit, library, and social benefit organization on the planet has the technology, knowledge, and resources they need to operate at their full potential. Who is TechSoup? Conference Call: Access Code: Introducing Symantec Endpoint Protection 12

Mid-sized Business 100 users 250 users 10 users Small Business SOHO 9 Symantec Endpoint Protection Portfolio Symantec™ Endpoint Protection Small Business Edition Symantec™ Endpoint Protection Client and Server Security Symantec™ Protection Suite Small Business Edition Symantec™ Protection Suite Enterprise Edition Client and Server Security, Mail and Backup Hosted Security for Clients Symantec Endpoint Protection.cloud™ Symantec Endpoint Protection.cloud™ Un-managed Client Security Norton™ from Symantec Conference Call: Access Code: Introducing Symantec Endpoint Protection 12

SMBs are serious about information protection Data loss and cyber attacks rank as the top business risks Two thirds of IT time is spent on information protection related activities Top IT projects are security, backup, recovery, disaster recovery Median spend is $51K on information protection 2,152 SMBs participated from 28 countries 50% of respondents had between 10 and 99 employees 50% of respondents had between 100 and 499 employees Cross-industry Owners, managers, IT staff, consultants SMB Information Protection Survey Results Global Symantec Sponsored Research Conference Call: Access Code: Introducing Symantec Endpoint Protection 12

Cyber attacks and loss of crucial business information 73% saw cyber attacks in past year – 30% of attacks were either somewhat or extremely effective 100% experienced disruption – Downtime, theft of corporate data, personally identifiable information 100% experienced financial impact – Loss of productivity, revenue Annual cost of cyber attacks: $188,242 74% were either somewhat or extremely concerned 42% lost confidential or proprietary information in the past 100% experienced a loss of revenue or business disruption Lost devices a big problem: – 62% lost devices within past 12 months – 100% have some devices that are not password protected 100% have devices that couldn’t be remotely wiped of data Cyber AttacksLoss of Business Information Conference Call: Access Code: Introducing Symantec Endpoint Protection 12

ISTR XVI - Threat Landscape 2010 Overarching Themes      Conference Call: Access Code: Introducing Symantec Endpoint Protection 12

January 2007: 250,000 viruses December 2010: 286 million Conference Call: Access Code: Introducing Symantec Endpoint Protection 12

Malware Authors Have Switched Tactics From: A mass distribution – one worm hits millions of PCs  Storm made its way onto millions of machines across the globe To: A micro distribution model.  Hacked web site builds a trojan for each visiter  The average Harakit variant is distributed to 1.6 users! 75% of malware infect less than 50 machines Conference Call: Access Code: Introducing Symantec Endpoint Protection 12

Threat Activity Trends Attacks Blocked/Technology - Endpoint Protection IPS DetectionsAV Detections Conference Call: Access Code: Introducing Symantec Endpoint Protection 12

SYMANTEC ENDPOINT PROTECTION 12.1 Conference Call: Access Code: Introducing Symantec Endpoint Protection 12

What is SEP 12? Antivirus Anti- spyware Firewall Intrusion Prevention Device Control Application Control Network Access Control (add-on) Single Agent, Single Console Windows, Mac & Linux Conference Call: Access Code: Introducing Symantec Endpoint Protection 12

Up to 70% reduction in scan overhead Smarter Updates Faster Management Powered by Insight Real Time Behavior Monitoring with SONAR Tested and optimized for virtual environments High VM densities Security Built for Virtual Environments Performance What’s New in SEP 12 Conference Call: Access Code: Introducing Symantec Endpoint Protection 12

Powered by Insight Proactive protection against new, mutating threats Puts files in context, using their age, frequency, location and more to expose threats otherwise missed Using community-based security ratings Derived from Symantec's more than 175 million endpoints Insight stopped Stuxnet Conference Call: Access Code: Introducing Symantec Endpoint Protection 12

Why Insight? Neither technique works well for the tens of millions of files with low prevalence. (But this is precisely where the majority of today’s malware falls) Neither technique works well for the tens of millions of files with low prevalence. (But this is precisely where the majority of today’s malware falls) Bad Files Good Files Prevalence White listing can identify common good files “Long Tail” files are harder to classify Blacklisting works well for common malicious files No existing protection addresses the “Long Tail” Conference Call: Access Code: Introducing Symantec Endpoint Protection 12

2 Prevalence Age Source Behavior 3 4 Look for associations Check the DB during scans Rate nearly every file on the internet5 Provide actionable data1 Associations Is it new? Bad reputation? 175 million PCs 2.5 billion files How Insight Works Conference Call: Access Code: Introducing Symantec Endpoint Protection 12

Symantec Protection Model Defense in Depth File-based Protection  Reputation-based Protection Behavioral-based Protection Network-based Protection Looks for and eradicates malware that has already taken up residence on a system Establishes information about entities e.g. websites, files, IP addresses to be used in effective security Looks at processes as they execute and uses malicious behaviors to indicate the presence of malware Stops malware as it travels over the network and tries to take up residence on a system  Insight  Domain Reputation  File Reputation  SONAR  Behavioral Signatures  Protocol aware IPS  Browser Protection Network FileReputationBehavioral Website/ Domain/ IP address File  Antivirus Engine  Auto Protect  Malheur Conference Call: Access Code: Introducing Symantec Endpoint Protection 12

Great Performance Powerful Protection Antivirus Antispyware Firewall Intrusion Prevention Symantec Endpoint Protection Small Business Edition 12.1 Conference Call: Access Code: Introducing Symantec Endpoint Protection 12

Unmatched accuracy 2 Quickly stops new Threats Eliminates risk Symantec Endpoint Protection Small Business Edition Delivers … Ranked FASTEST 1 Fewer, smarter scans Users won’t know it’s there Deploys in 20 minutes 3 One management console Reduced complexity FastSimple Effective Conference Call: Access Code: Introducing Symantec Endpoint Protection 12

25 Fast Scans - Powered by Symantec™ Insight Insight - Optimized Scanning Skips any file we are sure is good, leading to much faster scan times Traditional Scanning Has to scan every file On a typical system, 70 percent of active applications can be skipped! Conference Call: Access Code: Introducing Symantec Endpoint Protection 12

Stops stealth installs and drive-by downloads Monitors applications real time as they execute Threat Detection by Insight Unmatched effectiveness against mutating malware Conference Call: Access Code: Introducing Symantec Endpoint Protection 12

SMALL BUSINESS NEEDS AND CONCERNS Conference Call: Access Code: Introducing Symantec Endpoint Protection 12

Simple - Designed for Small Business 20-Minute deployment from start to finish for an entire network * Automated notifications and summary reports for easy management A single console to manage security for all computers and servers Fast Automated Easy to Manage * On average up to 50-user network Conference Call: Access Code: Introducing Symantec Endpoint Protection 12

Feature Norton Internet Security 2011 Symantec Endpoint Protection Small Business Edition 12.1 # of users Antivirus/Antispyware Desktop Firewall Intrusion Detection/Prevention Insight/SONAR Protection for Mac OS® X Protection for Linux® Device and Application Control Network Access Control Self- Enforcement Plug-in* Hosted Management Infrastructure Centrally Managed Built for Virtual Environments Consumer vs. Business Needs Conference Call: Access Code: Introducing Symantec Endpoint Protection 12

Product Demonstration Download Insight Introducing Symantec Endpoint Protection 12 Conference Call: Access Code:

Conference Call: Access Code: Monitor – Monitor for abuse or suspicious traffic patterns, receive new alerts for new vulnerabilities and threats Antivirus on endpoints is not enough – Deploy and use a comprehensive endpoint security product that includes additional layers of protection Restrict attachments – Configure mail servers to block or remove that contains file attachments that are commonly used to spread viruses Use an effective password policy – Ensure that passwords are a mix of letters and numbers, and change them often, do not use the same password for multiple applications or websites, use complex passwords Ensure that you have infection and incident response procedures in place – Ensure that you have your security vendors contact information, know who you will call, and what steps you will take if you have one or more infected systems Key Takeaways Introducing Symantec Endpoint Protection 12

What To Do Now! Try the product for FREE today – point-protection-small-business-edition point-protection-small-business-edition See the competitive comparison – Introducing Symantec Endpoint Protection 12 Conference Call: Access Code:

Symantec Donation Program To find out more about the Symantec Donation Program, go to To help determine your eligibility, check out TechSoup’s Eligibility Quiz at

QUESTIONS? Conference Call: Access Code: Introducing Symantec Endpoint Protection 12 Picture courtesy of Valerie Everett

Conference Call: Access Code: Thank you to our Webinar Sponsor! ReadyTalk offers dedicated product demos for TechSoup organizations 4 times per week. For more information: pages.readytalk.com/techsoup.html Introducing Symantec Endpoint Protection 12

PLEASE COMPLETE THE POST-EVENT SURVEY Thank You! Introducing Symantec Endpoint Protection 12