Agenda
Symantec At A Glance (50 foot view)
    STRATEGIC
    PRIORITIES:

                   Enterprise Security &                 Data Center
                       Management                        Optimization


SOLUTIONS:


  Security         Endpoint                   IT            Storage        Disaster
Management        Management               Compliance     Management       Recovery

  Endpoint         IT Service              Discovery &                      High
                                            Retention         Archiving
  Security        Management                                              Availability
                                           Management
 Messaging          Endpoint                                  Data        Virtualization
  Security                                  Data Loss       Protection    Management
                  Virtualization
                                            Prevention
   Web                                                                      Green IT
  Security
Agenda
Symantec solutions working together to Protect
Sensitive Information

                                          Symantec Control Compliance Suite,
        Develop and Enforce IT Policies     Symantec Data Loss Prevention,
                                           Symantec Network Access Control




        Authenticate Identities              VeriSign® User Authentication




                                          PGP Encryption, Data Loss Prevention,
                                              NetBackup™ / Backup Exec™,
        Protect the information            Enterprise Vault™, Veritas™ Volume
                                                        Replicator



                                           Altiris™ IT Management Suite from
         Manage the Infrastructure                      Symantec


                                          Symantec Protection Suite, Symantec
                                           Web Gateway, Symantec Message
        Protect the Infrastructure            Gateway, Symantec Security
                                            Information Manager, Symantec
                                               Critical Systems Protection
Managing the Infrastructure
Symantec Management Platform

                                                       Symantec Solutions



                                    INFORMATION RISK                          INFRASTRUCTURE      BUSINESS
                    SECURITY          & COMPLIANCE             STORAGE           OPERATIONS      CONTINUITY



       Dell Management
            Console
                                                                                         Third-Party Solutions
      Dell Client Manager


         vProTM enabled
                                                   Management Platform 7.1
            computer
          management



           HP Client
           Manager




Mobile Security        Business Process        Application                 Power            HelpDesk          Patch and System
 Management               Automation          Virtualization             Management        Management           Management
                           (Workflow
                            Modules)
Agenda
Extending SMP/DS 7.1 OSD with
DeployExpert (DX)




   Stephen Holcomb
   President




                                Government Technology
                                Summit
Agenda


• The Goal of Hardware Independent Imaging
• The Power of Under-the-Hood Analytics
• Healing Resource Gaps Inherent to HWI
• Consequences to Resource Gaps
• Real Zero Touch Windows OSD Automation
• DX Product Demonstration
•Q&A
at if software made all systems, regardless of make and model, effectively the sam
A computer is not a make or model, but a collection of unique parts…
The consequences of resource gaps
Symantec Solutions Working Together
Symantec Solutions Working Together
Incomplete
     image
deployments
    are an
  expensive
   hassle for
      your
 organization
  forcing the
       I.T.
Administrator
   to be the
“human glue”
 holding it all
   together.
Symantec Solutions Working Together
Symantec Solutions Working Together
Email: sholcomb@altrinsicsolutions.com


Product Website: www.altrinsicsolutions.com

More Related Content

PDF
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
PPTX
Sådan undgår du misbrug af kundedata og fortrolig information
PDF
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
PDF
Solutions for PCI DSS Compliance
PDF
Trend micro deep security
PDF
Symantec Brightmail Gateway 9
PDF
HyTrust and VMware-Providing a Secure Virtual Infrastructure
PDF
SMB Information Protection Portfolio
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Sådan undgår du misbrug af kundedata og fortrolig information
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Solutions for PCI DSS Compliance
Trend micro deep security
Symantec Brightmail Gateway 9
HyTrust and VMware-Providing a Secure Virtual Infrastructure
SMB Information Protection Portfolio

What's hot (20)

PDF
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
PDF
Symantec Enterprise Mobility - Mobile World Congress February 2012
PPTX
Trend micro v2
PPTX
Best Practices for Cloud Security
PDF
Come gestire l'encryption dei dati con SKLM
PDF
Session 1: Windows 8 with Gerry Tessier
PPT
Guardium value proposition for fss pn 12 02-10
PPTX
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
PDF
RSA 2010 Kevin Rowney
PDF
TrendMicro
PDF
Defense Foundation Product Brief
PDF
IBM InfoSphere Guardium overview
PDF
SYMCAnnual
PPTX
Security for QuickBooks and QuickBooks Enterprise
PDF
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
PPTX
Best practices for Vblock Monitoring with FusionStorm and Nimsoft
PPTX
Symantec Advances Enterprise Mobility Strategy
PDF
Symantec Virtualization Launch VMworld 2012
PDF
Ultima - Mobile Data Security
PDF
Security in the cloud planning guide
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Symantec Enterprise Mobility - Mobile World Congress February 2012
Trend micro v2
Best Practices for Cloud Security
Come gestire l'encryption dei dati con SKLM
Session 1: Windows 8 with Gerry Tessier
Guardium value proposition for fss pn 12 02-10
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
RSA 2010 Kevin Rowney
TrendMicro
Defense Foundation Product Brief
IBM InfoSphere Guardium overview
SYMCAnnual
Security for QuickBooks and QuickBooks Enterprise
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Best practices for Vblock Monitoring with FusionStorm and Nimsoft
Symantec Advances Enterprise Mobility Strategy
Symantec Virtualization Launch VMworld 2012
Ultima - Mobile Data Security
Security in the cloud planning guide
Ad

Viewers also liked (20)

PPT
Mod2 wfbs new starter
PPT
Opening Keynote and Welcome
PDF
Learn more about ESET and our soulutions for mobile platforms
PPTX
ESET: #DoMore With Our Comprehensive Range of Business Products
PDF
Report on JGSY-II Abhishek Singh 2001-2003
PPTX
Data protection & government schemes
PPTX
ESET: Delivering Benefits to Medium and Large Businesses
PPT
Symantec I3 Presentation
PPTX
Presentation on Cyber Security
PDF
Symantec Endpoint Protection - Product Positioning
PPTX
Adobe Government Technology Livestream Agenda
PDF
Symantec Endpoint Protection
PDF
Symantec investor presentation august 2016
PDF
How Endpoint Security works ?
PPTX
Cyber Security in the market place: HP CTO Day
PPTX
Cyber Security Presentation "It Will Never Happen To Me"
PDF
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
PDF
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
PPTX
Managed Security Services from Symantec
PDF
Symantec Investor Presentation November 2016
Mod2 wfbs new starter
Opening Keynote and Welcome
Learn more about ESET and our soulutions for mobile platforms
ESET: #DoMore With Our Comprehensive Range of Business Products
Report on JGSY-II Abhishek Singh 2001-2003
Data protection & government schemes
ESET: Delivering Benefits to Medium and Large Businesses
Symantec I3 Presentation
Presentation on Cyber Security
Symantec Endpoint Protection - Product Positioning
Adobe Government Technology Livestream Agenda
Symantec Endpoint Protection
Symantec investor presentation august 2016
How Endpoint Security works ?
Cyber Security in the market place: HP CTO Day
Cyber Security Presentation "It Will Never Happen To Me"
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Managed Security Services from Symantec
Symantec Investor Presentation November 2016
Ad

Similar to Symantec Solutions Working Together (20)

PDF
VSD Infotech
PDF
Dataplex Company Overview
PDF
NGN Company Profile November08
PDF
Gateway RIMS (Remote Infrastructure Management Services)
PDF
“8th National Biennial Conference on Medical Informatics 2012”
PDF
Sccm 2012 overview - chris_estonina
PDF
Introduction to Kaspersky Endpoint Security for Businesss
PDF
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
PDF
Novell Virtual Desktop Infrastructure
PPTX
Trend micro data protection
PDF
RSA 2012 Virtualization Security February 2012
PDF
Day 3 p3 - xs and ec
PDF
Day 3 p3 - xs and ec
PDF
Momentum Infocare Corporate Presentation
PDF
Intel Cloud Summit: Greg Brown McAfee
PPTX
Retail IT 2013: Data Security & PCI Compliance Briefing
PDF
Symantec Enterprise Mobility Vision May 2012
PPTX
TruWest
PPT
Microsoft Forefront - Secure Endpoint Solution Presentation
PDF
Symantec control compliance suite
VSD Infotech
Dataplex Company Overview
NGN Company Profile November08
Gateway RIMS (Remote Infrastructure Management Services)
“8th National Biennial Conference on Medical Informatics 2012”
Sccm 2012 overview - chris_estonina
Introduction to Kaspersky Endpoint Security for Businesss
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Novell Virtual Desktop Infrastructure
Trend micro data protection
RSA 2012 Virtualization Security February 2012
Day 3 p3 - xs and ec
Day 3 p3 - xs and ec
Momentum Infocare Corporate Presentation
Intel Cloud Summit: Greg Brown McAfee
Retail IT 2013: Data Security & PCI Compliance Briefing
Symantec Enterprise Mobility Vision May 2012
TruWest
Microsoft Forefront - Secure Endpoint Solution Presentation
Symantec control compliance suite

More from Carahsoft (11)

PPTX
Cyber V. Shark Facts
PPTX
Citizen Engagement Speakers
PPTX
inTTENSITY Federal Social Media Summit
PPTX
Symantec Government Technology Summit
PPTX
Electronic Data Discovery
PPTX
Endpoint Evolution
PPTX
Data Center Virtualization
PPTX
Risk Management and Remediation
PPTX
User Authentication for Government
PPTX
Mobile Management
PPTX
Symantec government technology summit abstract
Cyber V. Shark Facts
Citizen Engagement Speakers
inTTENSITY Federal Social Media Summit
Symantec Government Technology Summit
Electronic Data Discovery
Endpoint Evolution
Data Center Virtualization
Risk Management and Remediation
User Authentication for Government
Mobile Management
Symantec government technology summit abstract

Recently uploaded (20)

PPTX
Modernising the Digital Integration Hub
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PPTX
The various Industrial Revolutions .pptx
PDF
STKI Israel Market Study 2025 version august
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Five Habits of High-Impact Board Members
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PPTX
2018-HIPAA-Renewal-Training for executives
PDF
Architecture types and enterprise applications.pdf
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
Configure Apache Mutual Authentication
DOCX
search engine optimization ppt fir known well about this
PPTX
TEXTILE technology diploma scope and career opportunities
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Modernising the Digital Integration Hub
A contest of sentiment analysis: k-nearest neighbor versus neural network
Getting started with AI Agents and Multi-Agent Systems
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
The various Industrial Revolutions .pptx
STKI Israel Market Study 2025 version august
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Five Habits of High-Impact Board Members
sbt 2.0: go big (Scala Days 2025 edition)
2018-HIPAA-Renewal-Training for executives
Architecture types and enterprise applications.pdf
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Consumable AI The What, Why & How for Small Teams.pdf
A proposed approach for plagiarism detection in Myanmar Unicode text
1 - Historical Antecedents, Social Consideration.pdf
Configure Apache Mutual Authentication
search engine optimization ppt fir known well about this
TEXTILE technology diploma scope and career opportunities
Module 1.ppt Iot fundamentals and Architecture
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor

Symantec Solutions Working Together

  • 2. Symantec At A Glance (50 foot view) STRATEGIC PRIORITIES: Enterprise Security & Data Center Management Optimization SOLUTIONS: Security Endpoint IT Storage Disaster Management Management Compliance Management Recovery Endpoint IT Service Discovery & High Retention Archiving Security Management Availability Management Messaging Endpoint Data Virtualization Security Data Loss Protection Management Virtualization Prevention Web Green IT Security
  • 4. Symantec solutions working together to Protect Sensitive Information Symantec Control Compliance Suite, Develop and Enforce IT Policies Symantec Data Loss Prevention, Symantec Network Access Control Authenticate Identities VeriSign® User Authentication PGP Encryption, Data Loss Prevention, NetBackup™ / Backup Exec™, Protect the information Enterprise Vault™, Veritas™ Volume Replicator Altiris™ IT Management Suite from Manage the Infrastructure Symantec Symantec Protection Suite, Symantec Web Gateway, Symantec Message Protect the Infrastructure Gateway, Symantec Security Information Manager, Symantec Critical Systems Protection
  • 6. Symantec Management Platform Symantec Solutions INFORMATION RISK INFRASTRUCTURE BUSINESS SECURITY & COMPLIANCE STORAGE OPERATIONS CONTINUITY Dell Management Console Third-Party Solutions Dell Client Manager vProTM enabled Management Platform 7.1 computer management HP Client Manager Mobile Security Business Process Application Power HelpDesk Patch and System Management Automation Virtualization Management Management Management (Workflow Modules)
  • 8. Extending SMP/DS 7.1 OSD with DeployExpert (DX) Stephen Holcomb President Government Technology Summit
  • 9. Agenda • The Goal of Hardware Independent Imaging • The Power of Under-the-Hood Analytics • Healing Resource Gaps Inherent to HWI • Consequences to Resource Gaps • Real Zero Touch Windows OSD Automation • DX Product Demonstration •Q&A
  • 10. at if software made all systems, regardless of make and model, effectively the sam
  • 11. A computer is not a make or model, but a collection of unique parts…
  • 12. The consequences of resource gaps
  • 15. Incomplete image deployments are an expensive hassle for your organization forcing the I.T. Administrator to be the “human glue” holding it all together.