Symantec™ Critical System Protection


Symantec™ Critical System Protection
See what Symantec™
Critical System
Protection can do for
your organization.
Symantec™ Critical System Protection
Use Case Catalog
Ensure maximum server security across physical and virtual environments.
Comprehensive protection for evolving data centers
“Traditional endpoint security
solutions are not able to meet
the varying confidentiality,
integrity, and availability
requirements unique to different
servers and their workloads.”
Ensuring security in the data center is an ongoing concern. With evolving threats,
rapid data center changes (including virtualization), and increasingly stringent
compliance requirements, organizations may find their traditional security
solutions inadequate.
Traditional endpoint security solutions may provide useful layers of defense
on individual computers, but are not able to meet the varying confidentiality,
integrity, and availability requirements unique to different servers and their
workloads. This is particularly challenging as organizations virtualize more of
their servers.
10 reasons why server security is imperative
67 percent of breaches
occur on servers1
we protect:
Target of
insider and
Require protection
activity as well
as configuration
change visibility
Core component of
IT network and
94 percent of
stolen data is
from servers1
75 percent of x86
servers will be
virtualized by 20132,
which will introduce
a new set of risks
Require custom
protection of
critical data
Need to support
business critical
workflow and/or
highly important
Why choose
Tried-and-trusted server
security solutions
Systems protected by
Symantec remained
uncompromised at the Black
Hat Conference 2011 and 2012
VMware® Ready™ Data
Protection Status
Broad range of platform
Comprehensive solutions
Policy-based protection
Secure platforms
spanning physical
and virtual
1: 2012 Data Breach Investigations Report, Verizon,
2: Forrester, The CISO’s Guide To Virtualization Security, January 2012
Symantec Critical System Protection strategic use cases
To address these challenges, Symantec™ Critical System Protection has been designed to safeguard dynamic virtual and
physical infrastructures – from single data centers to the most complex mixed private-public cloud environments. By
monitoring and protecting servers using granular, policy-based controls, your organization can proactively safeguard
heterogeneous server environments and the information they contain.
Use case 1:
Browse the strategic
uses of Critical System
Protection and identify
which ones can help your
organization reach its
business objectives.
Use case 2:
Harden and protect your
VMware® infrastructure
Protect your domain
Use case 3:
Use case 4:
Use case 5:
Address PCI compliance
Stop zero-day attacks and
reduce cost of support
Shield embedded systems
from targeted attacks
Use case 1: Harden and protect your VMware infrastructure
Are you meeting VMware hardening guideline
How do you restrict unauthorized access to your
virtual environment?
How do you protect the management server,
hypervisor, and guest VMs?
Why it matters
Piecemeal security technologies, such as antivirus and whitelisting, are unable to protect virtual servers sufficiently, due
to varying confidentiality, integrity and availability requirements. Without a way to protect each layer of the virtual fabric,
servers as well as the applications and information they contain, will be exposed, increasing the risks of data breach and
critical business downtime.
Symantec solution
Critical System Protection secures your VMware vSphere® environments through a combination of out of-the-box host
intrusion detection (HIDS) and intrusion prevention (HIPS) policies based on the latest VMware hardening guidelines.
Key benefits
Gain maximum protection across the VMware® vCenter™ management
server, ESXi hypervisor, and guest virtual machines
Sealed Air intends
to roll out Critical System
Protection in more than
1,000 physical and
virtualized data center
servers. The host–based
intrusion detection and
intrusion prevention
capabilities of Critical
System Protection, along
with more granular
policy-based controls,
will give us more robust
endpoint security for
our data center
Leverage out-of-box protection using both host-based intrusion detection
(HIDS) and intrusion prevention (HIPS)
Harden, protect, and monitor Microsoft® Windows®-based vCenter servers
against unauthorized access, zero-day, and targeted attacks
Monitor the hypervisor for unauthorized access
How it works
Harden vSphere by securing the vCenter Server and application stack with a
Critical System Protection agent installed on the Windows Server
Monitor all ESXi hypervisor hosts remotely through VMware vSphere
Command-Line Interface (vCLI)
Harden and protect each virtual server’s unique workload with Critical
System Protection agents in each guest virtual machine
Leverage out-of-box custom reports for your VMware environment
— Clay Boswell,
Director of Information Assurance,
Sealed Air Corp.
Use case 2: Protect your domain controllers
How do you secure your Active Directory (AD)
environment, specifically the domain controllers that
are the gatekeepers of your organization’s critical
Can your organization afford a domain
controller attack?
How can you prevent your domain controller user
database file from getting in the wrong hands?
Why it matters
Many cyber criminals attempt to access user credentials through AD environments. Hence, AD domain controllers are
popular targets of attack. The number of threats against AD continues to rise and a breach can yield potentially
devastating consequences.
Symantec solution
Critical System Protection secures and hardens your domain controller using policy-based prevention and
real-time detection.
Key benefits
Customer success story
After a devastating security
breach, an aerospace
company leveraged Critical
System Protection to
successfully lock down
their domain controller
environment, preventing
unauthorized access to
confidential database
files. With Critical System
Protection, they have been
able to prevent zero-day
attacks and other malicious
activities because only
trusted sources are allowed
to run on domain controllers.
Stop internal and external attacks on domain controllers
Reduce risk by blocking unauthorized access
Protect your critical infrastructure by locking down the AD database files
How it works
Leverage out-of-box “strict” HIPS policy to lock down the Windows server
and protect it from zero-day and targeted attacks
Prevent malware from accessing resources on the domain controller
through Least Privilege Access Control/Sandboxing technologies
Control inbound and outbound network traffic to and from the AD
domain controllers through Host Firewall
Restrict application and user access to AD database files
Continuously monitor, control, and report on changes to key configuration
files with Real-time File Integrity Monitoring (FIM)
Use case 3: Address PCI compliance requirements
How do you meet and maintain Payment Card
Industry Data Security Standard (PCI DSS) compliance
on your servers?
How do you protect valuable cardholder data and
maintain PCI DSS compliance?
How do you detect configuration changes and prevent
configuration drift?
Why it matters
To meet PCI DSS compliance, organizations need to constantly monitor their environment for policy violations, while
implementing compensating controls for any exceptions to PCI DSS mandates.
Symantec solution
Critical System Protection performs real-time monitoring, consolidates event logs for reporting and analysis, prevents policy
violations and tampering to configurations, and also provides compensating controls to meet specific PCI DSS compliance
requirements – all in a single solution.
Key benefits
Customer success story
A large financial institution
wanted a behavior-based
security solution and
policy-based protection
to address FIM, PCI and
SOX requirements. With
Critical System Protection,
they are able to get FIM
capabilities out-of-the-box,
and can deploy policies
quickly to meet their growing
requirements. They have
increased their security
posture in their DMZ,
maintained ongoing PCI
DSS compliance, identified
problems with misconfigured
applications, and gained
visibility into configuration
management challenges they
didn’t even know existed.
Protect PCI data and servers from compromise
Meet ongoing PCI DSS requirements
(specifically requirements 1.3, 5, 7, 10, 11)
Reduce risk through real-time detection of unauthorized behavior
Get faster insight into problems that could impact security
Undertake forensic investigation quickly to determine
the best course of action
How it works
Continuously monitor, control, and report on changes
with File Integrity Monitoring
Detect changes from desired configuration
with out-of-the-box detection policies
Restrict user, applications and network access to PCI devices assets using
policy-based least privilege access control
Leverage real-time dashboards, automated reporting,
and alerts identifying weaknesses in security
Track security status and quickly investigate incidents
with consolidated event logging
Lock down configuration, settings and files
with File and System Tamper Prevention
Use case 4: Stop zero-day attacks and reduce cost of support
How do you protect your servers from unknown
vulnerability exploits (zero-day attacks)?
How do you protect your legacy operating systems
without paying for costly extended support?
Cybercriminals are taking aim at your systems
between patch cycles; is your security
up to the challenge?
Why it matters
Legacy operating systems require costly software security patches to maintain their security posture. Applying patches
can cause system downtime, and cybercriminals can attack these systems between patch cycles by exploiting
zero-day vulnerabilities.
Symantec solution
Critical System Protection can block unauthorized applications on servers, protect against zero-day attacks, reduce the
maintenance costs associated with legacy system support, and protect systems between patch cycles.
Key benefits
Customer success story
A large retailer needed to
support and protect old
Windows NT and 2000
machines. Instead of paying
Microsoft for extended
support, Critical System
Protection was used to
lock the systems down and
prevent misuse, resulting in
a significantly lower cost and
lower risk.
Prevent exploit of known and unknown vulnerabilities to stop
zero-day attacks
Protect legacy Windows NT® and Windows® 2000 systems
Get immediate protection with out-of-the-box policies
Gain greater security visibility and mitigation during patch cycles
Shield software vulnerabilities from being exploited until patches
can be developed and deployed
Eliminate costly downtime and emergency patching
Reduce risk of breach for unknown and unpatched vulnerabilities
How it works
Harden the operating system and prevent known vulnerabilities from
exploit with out-of-the-box IPS policies that are specifically tuned to
the particular operating platform
Restrict behavior of applications and operating systems using granular
policy based controls and sandboxing
Delay patch deployment until your regular patch cycle with a default-deny
security posture for any unknown/new executable
Prevent applications from being exploited via memory buffer overflow
attacks on Windows 32- and 64-bit systems
Leverage broad physical and virtual platform support across all 5 major
platforms, i.e., Windows, Linux®, AIX®, Solaris™ and HP-UX®
Use case 5: Shield embedded systems from targeted attacks
How do you stop advanced attacks on point-of-sale
(POS) machines, kiosks, automated teller machines
(ATMs) and Industrial Control System (ICS) servers
without the need for continuous signature updates?
How are you controlling unauthorized applications
from being installed on embedded systems?
How do you ensure your ICS or shop floor IT system is
secure from targeted attacks?
Why it matters
POS systems, kiosks, ATMs and ICS servers are mission-critical equipment for many organizations. However, these systems
often have little protection against today’s multiple threats, such as targeted attacks, running of unauthorized applications
and credit card theft. Traditional antivirus software can be employed by organizations, but they can negatively impact
system performance through continuous signature updates.
Symantec solution
Critical System Protection can lock down and secure these embedded systems against unauthorized applications and
malware with a lightweight but comprehensive security solution that is based on security policies and behavior lock-down,
not continuous antivirus signature scans.
Key benefits
Stop malware from infecting embedded systems through advanced
threat protection
With Symantec
Critical System Protection,
Symantec supplies the
best basis for Intrusion
Protection on the market
today. The collaboration
with a strong partner
like Symantec enables
Wincor Nixdorf to further
strengthen its successful
security solution portfolio
in the long term,
— Bernd Redecker,
Head of Security Solutions Banking,
Wincor Nixdorf.
Reduce costs associated with patching cycles and signature updates
Leverage a low footprint security solution that runs transparently,
without the heavy resource utilization, and constant signature updates
of traditional solutions
Meet compliance requirements
Monitor and maintain globally dispersed embedded systems easily
How it works
Lock down configuration settings, systems and use of removable media
with application and system control
Continuously monitor, control, and report on changes
to configuration files with File Integrity Monitoring
Leverage a lightweight Critical System Protection agent
to minimize performance impact
Restrict applications and network access to systems using
policy-based least privilege access control/sandboxing
More information
Visit the website
To speak with a Product Specialist in the U.S.
Call +1 800 745 6054
To speak with a Product Specialist outside the U.S.
For specific country offices and contact numbers, please visit the Symantec website.
About Symantec
Symantec protects the world’s information and is the global leader in security,
backup, and availability solutions. Our innovative products and services protect
people and information in any environment – from the smallest mobile device, to
the enterprise data center, to cloud-based systems. Our industry-leading expertise
in protecting data, identities, and interactions gives our customers confidence
in a connected world. More information is available at or by
connecting with Symantec at
Copyright © 2012 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries.

Benzer belgeler

Acronis® vmProtect™ 8

Acronis® vmProtect™ 8 backup, and availability solutions. Our innovative products and services protect people and information in any environment – from the smallest mobile device, to the enterprise data center, to cloud...