Upload
hoangnhu
View
222
Download
0
Embed Size (px)
Citation preview
Symantec™ Endpoint Protection Sales Script
Question: How are you currently protecting your endpoint systems (laptops, desktops, and servers)?
Answer 1: Symantec AntiVirus™
Is your maintenance contract current?*• Current maintenance—Customersthatarecurrentwithmaintenance
orsupportcontractsforpreviousversionsoftheirlicensedSymantecAntiVirussoftwarecanupgradetotheappropriateSymantecEndpointProtectionlicensesatnoadditionalcharge.Thesecustomerswillreceiveanemail,oraletterifwedonothaveanemailaddress,fromSymantecdirectingthemtohttps://fileconnect.symantec.com/licensing,wheretheycanselectalanguage,entertheirexistingserialnumber,andthendownloadtheproductdirectly.TheycanalsorequestthataCDbemailedtothem.
• Expired maintenance—Existingcustomersthatdonothavecurrentmaintenance/supportmaypurchaseversionupgradesatspeciallydiscountedprices(20percentofftheMSRPoffulllicenses).SymantecEndpointProtection11.0isthecomprehensive,next-generationversionofSymantecAntiVirusthathelpsprovideadvancedthreatprotectionforlaptops,desktops,andservers.Itisatremendousvalue,offeringunmatchedmanagementandfunctionality.Letmegiveyouafewreasonstoupgrade.
Reasons to upgrade to Symantec Endpoint Protection• Single agent install and management—Allofthistechnologyis
integratedintoasingleagentandmanagedfromasingleconsole.
• Smaller footprint—Thefootprintisnowonly24MB,whichismuchsmallerthanthatofthecompetition’slesscompletepackagesaswellasSymantec’scoresecurityproducts.
• More security—SymantecEndpointProtectionoffersmorethanjustantivirustechnology;italsoincludesbest-of-breedantispyware,desktopfirewall,intrusionprevention,anddevicecontrol.
• TruScan™—Behavior-blockingtechnologygivesyoutruezero-dayprotectionfromzero-dayattacks.Unlikeleadingantivirusproductsonthemarket,ithasidentifiedover1,000newthreatspermonth—withthelowestfalsepositiverateof0.004percent.Thatequatestofewerthan40falsepositivesforevery1millionPCsscanned!
• Generic exploit blocking—Vulnerability-basedprotectionrequiresonlyonesignaturetoprotectthevulnerabilityfromanattackandallofitsvariantsincludingunknownthreats.
• Device control—DevicecontrolhelpspreventdatalossfrominsidertheftandallowscontrolovervulnerableUSBports(i.e.,MP3players,USBdrives,etc.)
• Network access control as an easy add-on—Addingnetworkaccesscontroltoattaincompleteendpointsecurityisaseasyasturningonthelicense.SymantecNetworkAccessControlisincludedintheinitialinstallofSymantecEndpointProtectionandwillappearinthemanagementconsoleonceitisactivated.
• Completely customizable—Whileallofthisfunctionalityisavailable,youcanchoosetoturnononlythetechnologyyouwanttousetoday,withtheoptiontotakeadvantageoftheremainderatalatertime.
Do you have employees or contractors who log on to other networks at hotels, airports, or cafés and then log in to your network?Ifso,SymantecNetworkAccessControlwillgiveyoutheabilitytolimitaccesstoyournetworkifthedeviceisnotuptodateorcompliantwithsecuritypolicy.Networkaccesscontroloffersyoutwobenefits:(1)Itgreatlyreducesthechancesofathreatbeingcarriedintoyournetworkbytravelingemployees,contractors,ortelecommuters.(2)Ithelpsensurethatanymanagedendpointdeviceenteringthenetworkmeetstherequirementsofyoursecuritypolicy.Thiseliminatestheweakestlinkandconfirmsthateveryoneisuptodate.
Migration
* For additional support, call our reseller hotline at (888) 780-7962.
Answer 2: No Protection at the Endpoint
EvenifyouonlyhavedesktopsandnoconnectiontotheInternet,youstillneedtoprotectyourendpointsystems.EndpointsarevulnerabletoattackviaaUSBdrive,CD/DVD,orotherinputdevice.Threatscancomefrommultiplesources,notonlytheInternet,andeverydeviceneedsitsownprotection.Also,protectionwithonlyantivirussoftwareisinadequate.Today,threatsarequicker,sneakier,andcarryadevastatingpayload.Youneedcompleteprotectionthatincludesthefollowingtechnologies:
• Antivirustoprotectyoursystemsfromvirusesandstopthemfromspreading
• Antispywaretostopspiesfromstealingconfidentialinformation
• Desktopfirewalltokeepthievesfromaccessingendpointsandusingthemasapointofattack
• Intrusionpreventiontoblockdevastatingzero-dayattacksandvariantsofattacks
• DevicecontroltopreventknowingandunknowingusersfromusingUSB,CD/DVD,orevenMP3playersonthenetworktoeitherloadmaliciouscodeor“slurp”confidentialinformation
SymantecEndpointProtection11.0includesallofthesetechnologiestogiveyouthemostcompleteendpointprotectionavailableinasingleagentandmanagedfromasingleconsole.
Former Product New Product
SymantecAntiVirusCorporateEditionSymantecClientSecurityConfidenceOnline™forCorporatePCs(WholeSecurity)
SymantecSygate™EnterpriseProtection
} }} Symantec Endpoint Protection
SymantecAntiVirusEnterpriseEdition } }} Symantec Multi-tier Protection
SymantecAntiViruswithGroupwareProtectionSymantecClientSecuritywithGroupwareProtection } }}
Symantec Endpoint Protection Small Business Edition
SymantecNetworkAccessControl(LANand/orDHCP) } }} Symantec Network Access Control
SymantecNetworkAccessControl(Gatewayand/orCNAC) } }} Symantec Network Access Control
Starter Edition
SymantecSygateEnterpriseProtection(withSelf-Enforcement) } }}
Symantec Endpoint Protection and Symantec Network Access Control Starter Edition
Copyright©2007SymantecCorporation.Allrightsreserved.Symantec,theSymantecLogo,ConfidenceOnline,Sygate,SymantecAntiVirus,andVeritasaretrademarksorregisteredtrademarksofSymantecCorporationoritsaffiliatesintheU.S.andothercountries.Microsoft,Windows,andWindowsVistaareeitherregisteredtrademarksortrademarksofMicrosoftCorporationintheUnitedStatesand/orothercountries.Othernamesmaybetrademarksoftheirrespectiveowners.PrintedintheU.S.A.11/07 13517677
1. What functionality is included in that product?• SymantecEndpointProtection11.0isacomprehensive,next-
generationversionofSymantecAntiVirusthathelpsprovideproactivethreatprotectionforlaptops,desktops,andservers.Itincludesantivirus,antispyware,desktopfirewall,intrusionprevention,anddevicecontroltechnologiesinasingleagentandmanagedfromasinglemanagementconsole.
• ThisintegratedtechnologyusesuniqueVxMStechnologyfromVeritas™,allowingdeeperintegrationwiththeoperatingsystemtodetectandremovethestealthiestspywareandrootkits.(Source:ThompsonCyberSecurityLabs)
• Symantechasconsistentlybeatenthecompetitioninprotectionagainstpolymorphicthreatsandwastheonlyvendortodetect100percentintheFebruary2007AVComparativesreview.[Source:AVComparatives,Anti-ViruscomparativeNo.13(February2007)]
2. What is the footprint of your combined endpoint solution? TheSymantecEndpointProtectionfootprintisonly24MBforall
ofthesetechnologies,dramaticallylessthanthatoflesscompletecompetitiveproducts.Thisrepresentsan80percentreductionfrompreviousversions,freeingupvaluablediskspaceforotherimportantapplicationsandimprovingendpointperformance.
3. How many management agents do you use for your endpoint security solution?
Howwouldyouliketouseonlyoneconsoleandoneagenttomanageyourantivirus,antispyware,desktopfirewall,intrusionprevention,devicecontrol,andnetworkaccesscontroltechnologies?ThatisexactlywhatSymantecEndpointProtection11.0letsyoudo.Inaddition,networkaccesscontrolcapabilityisintegratedintotheagentforSymantecEndpointProtectionandonlyneedstobelicensedtobeupandrunning,withnoadditionalagentstodeploy.Howisthatforvalue?
4. Do you have employees or contractors who log on to other networks at hotels, airports, or cafés and then log in to your network?
Ifso,SymantecNetworkAccessControlwillgiveyoutheabilitytolimitaccesstoyournetworkiftheendpointdeviceisnotuptodateorcompliantwithsecuritypolicy.Networkaccesscontroloffersyoutwobenefits:(1)Itgreatlyreducesthechancesofathreatbeingcarriedintoyournetworkbytravelingemployees,contractors,ortelecommuters.(2)Ithelpsensurethatanymanagedendpointdeviceenteringthenetworkmeetstherequirementsofyoursecuritypolicy.Thiseliminatestheweakestlinkandconfirmsthateveryoneisuptodate.
Answer 3: Competitive Product
ManufacturerAntivirus
(signature-based)Antispyware
(signature-based)Firewall
Generic Exploit Blocking1
Behavior-based Intrusion
Prevention2Device Control
Single Console, Single Agent per
Client
Performance in VB100 Tests3
Symantec(SymantecEndpointProtection11.0,SymantecNetworkAccessControl11.0)
3 3 3 3 3 3 33
100%“Pass”inallteststakensince
1999
(McAfeeVirusScanEnterprise8.5i)
3 3
TCP/UDPportblockingonly;nolocationawarenessorrulesengine No
Rulesonly;nosignatures,
behavior,orproac-tivethreatscan
No
Singleconsole,multipleagentsperclientwhenusingePolicyOrchestrator
Failed13times,1999–2007,includingin2007on
WindowsVistaplatform
(McAfeeTotalProtectionforSmallBusiness)
Nologging,customrules,orlocationswitching
No 3
(McAfeeTotalProtectionforEnterprise)
3 3Rulesand
signaturesonly;nobehavior
1console,3separateproducts,Multipleagentsand
modules
Failedon64-bitWindowsXPandWindowsVistaplatforms,
December2006
Microsoft®(ForefrontClientSecurity)
3 33
IncludedwithWindows®XPandWindowsVista®
No No
RequiresGroupPolicyManagement
Console
ManagementrequiresWSUS,MOM,Active
Directory,andSQLServerReporting
services
FailedonWindowsVista,February2007
Trend Micro(TrendMicroOfficeScanCorporateEdition7.3)
3 3Lackscentral
loggingNo No No 3
Failedon64-bitWindowsXPandWindows
Vistaplatforms,December2006
Source:SymantecanalysisbasedonproductanddocumentationreviewofSymantecEndpointProtection11.0andSymantecNetworkAccessControl11.0,McAfeeVirusScanEnterprise8.5i,McAfeeTotalProtectionforSmallBusiness,McAfeeTotalProtectionforEnterprise,TrendMicroOfficeScanCorporateEdition7.3,andMicrosoftForefrontClientSecurity,May2007.Productdetailssubjecttochangewithoutnotice.1 GenericExploitBlockinganalyzesnetworktraffictargetingvulnerablesoftwareratherthanspecificexploits,sosecurityresearchersmaydeliverprotectionbeforeanexploithasbeenpostedorreleased:http://www.networkworld.com/news/tech/2004/083004techupdate.html.2 Host-basedintrusionpreventionsystemsmaya)limitapplicationactionsaccordingtorules(rule-based),b)comparenetworktraffictothatproducedbyknownmalware(signature-based),orc)applyascoringmechanismtodetectsuspiciousbehaviorby
applications(behavior-based).3 PerformancedatacompareSymantecandcompetitorantivirussolutionsonly,effectiveMay1,2007.DataarefromindependentcomparativetestsofproductsconductedbyVirusBulletin,availablewithfreeregistrationatwww.virusbtn.com.Symantecdatafrom
SymantecNortonAntiVirusproductsv5.02.04(11/99),SymantecNortonAntiVirusCorporateEditionv7.61.935(6/02),SymantecAntiVirus8.00.93744.1.0.15(2/03),andsuccessorversionsoftheseproducts.McAfeedatafromNAIVirusScanv4.0.3.4040(25/8/99)(11/99),NAINetShieldforNetWarev4.5.0(9/00),NetworkAssociatesMcAfeeNetShieldv4.50(9/01),McAfeeVirusScanv6.02.1019.1(6/02),NAIVirusScanEnterprise7.004..404261(6/03),McAfeeNetShield4.62(8/04),McAfeeLinuxShield1.1.0.665i686(4/05),McAfeeVirusScanEnterprise8.0.044004483(6/05),andsuccessors.TrendMicrodatafromTrendMicroTrendServerProtect5.21(11/01),TrendMicroPC-cillin20007.61.0.1437.195(2/02),TrendServerProtectLinux1.1(5/03),TrendInternetSecurity11.2013117.1001.885.00(6/04),TrendMicroOfficeScanCorporateEditionv.7.3(10/06),andsuccessors.MicrosoftdatafromMicrosoftOneCare(6/06)andMicrosoftWindowsLiveOneCare1.5(2/07).Productdetailssubjecttochangewithoutnotice.
McA
fee