Title: Symantec OnDemand Protection
1Symantec On-Demand Protection
- Patrick Duffey and Dave McCulley
- Q3 DoD/Civilian Team Meeting
- October 25, 2007
2Agenda
3The Problem
4Corporate Network Is Continually Exposed
5Outlook Web Access Security Challenges
- Data Loss/Exposure
- Emails and attachments exposed in browser Cache
- Malware captures confidential data and
credentials - Malware can infect mail cause virus outbreaks
- Regulatory Compliance Violation
- Security for non-corporate assets
- No control over endpoint
Enterprise Security Group, 2007
6Web Applications Security Challenges
- Data Loss/Exposure
- Data exposes when accessed remotely via web
browser - Malware captures confidential data and
credentials - Regulatory Compliance Violation
- Security for non-corporate assets
- No control over endpoint
-
7The SolutionSymantecOn-Demand Protection
8Symantec Network Access ControlSolution Elements
Symantec Endpoint Protection Manager
Management
Remediation Server
Enforcement
Endpoint
9Symantec On-Demand ProtectionUse Cases
- SSL VPN
- Guest Access
- Wireless Networks
- Wired Networks
- Enterprise Web Apps (ERP/CRM)
- Terminal Services
- Webmail
Thin Client/Server Applications
Web-based Applications
TraditionalClient/ServerApplications
File Share
Guest User
Traveling Executives
Partner Extranet
Public Kiosk
10Overview
- On-Demand Security
- Automatic Delivery
- Self-Activation
- Cleanup
- Small Footprint for Quick Delivery
- Works in Guest Privileges
Symantec On- Demand Protection
11Key Features and Benefits
Blocks malware
Ensuresendpoint compliance
Preventsdata loss
Host Integrity Ensures basic security protection
helps with regulatory compliance
Virtual Desktop Protects email with
encryption Prevents data leakage with secure
deletion
Malicious Code Protection Blocks key loggers
other malware
Connection ControlPrevents information slurping
12Who to Target On-Demand Protection for Outlook
Web Access
- Who should buy
- Primary Small/Medium/Large Enterprise (50-5000
employees) - Key qualifying questions
- Do you allow your end users to connect to email
via MS Outlook Web Access? - Do you have a way to ensure that MS OWA users are
not leaving behind data on unmanaged devices? - Do you have a way to ensure that MS OWA users are
not introducing malicious code into your network?
13Who to Target On-Demand Protection for Web
Applications
- Who should buy
- Primary Medium (1001-5000) / Large Enterprise
(5000 employees) - Key qualifying questions
- Do you allow your end users to connect to
corporate data via web enabled applications? - Do you have a way to ensure that web application
users are not leaving behind data on unmanaged
devices? - Do you have a way to ensure that web application
users are not introducing malicious code into
your network?
14Symantec On-Demand Protection
5. Symantec On-Demand Agent analyzes the system
to determine if the device is a trusted asset and
downloads a virtual desktop depending on the
results
1. Administrator creates Symantec On-Demand Agent
3. USAF WEB Server SYNCS with WEB Servers
2. Administrator uploads On-Demand Agent to USAF
WEB Server
4. User connects to the Cyber Security Page and
Selects Load Virtual Desktop
15Demomysite.verizon.net/symlab