Application Virtualization – The UAC Panacea?

2017-07-27T00:01:08+00:00 January 18th, 2012|Uncategorized|

…with contributions from Aaron Gierak, Voltaire Toledo, and Jeremy Pavlov.

The User Account Control (UAC) Challenge

It is commonly known that in XP you have to give end users Administrator privileges in order to do even the most simple routine tasks; like changing the system clock, plugging in a USB drive, running a defrag, updating software, or even running security products.  Of course you can use the RunAs command, but that still requires having an Administrator password – which defeats the security purpose of a limited user account.  And just when we thought moving to Windows 7 would eliminate this security privilege nightmare, enter UAC…

User Account Control (UAC) is a technology aimed to improve the security of Microsoft Windows by limiting application software to standard user privileges until an administrator authorizes an increase or elevation.  In this way, only applications trusted by the user may receive administrative privileges, and malware should be kept from compromising the operating system.  In other words, a user account may have Administrator privileges assigned to it, but the applications that the user runs do not inherit those privileges unless they are approved beforehand, or the user explicitly authorizes it.

It is possible to turn off UAC while installing software, and re-enable it at a later time.  However, this is not recommended since File & Registry Virtualization is only active when UAC is turned on – and if UAC is switched off, user settings and configuration files may be installed to an unintended location (i.e. a system directory rather than a user-specific directory).  Also Internet Explorer 7’s “Protected Mode” – whereby the browser runs in a sandbox with lower privileges than the standard user – relies on UAC; and will not function if UAC is disabled.

The Application Virtualization Question

So is application virtualization the solution?  If a virtualized package runs at the kernel level, does it eliminate having to give an XP user Administrator rights?  When you repackage an application that you have been running in XP – in order to port to Win7 – does the app skate by UAC in a way that allows you to keep UAC turned on?

By default, UAC virtualizes requests for protected resources to provide compatibility with applications not developed for UAC.  This is important because many applications written for Windows XP and earlier operating systems assume that the user has administrative privileges and attempt to write to protected resources such as the Program Files or System folders.  The first time an application makes a change to a virtualized resource, Windows copies the folder or registry key to the location within the user’s profile.  Then, the change is made to the user’s copy of that resource.  UAC virtualization is designed to allow already-installed applications to run successfully with standard user privileges, even if they store temporary files or logs in a protected folder.

Installs, Upgrades, and Updates

Many of the problems with UAC come from application installs or upgrades/updates where a new driver or an action that requires UAC acceptance is needed.  With application virtualization – especially a tool like Symantec’s Workspace Streaming where you package from the kernel level – you can bundle the drivers *inside* the virtual app.  As a result, nothing would ever be required of the end-user since nothing is ever “installed”. 

Secondary Executions

However, another issue that bumps against UAC is what we commonly call the “Secondary Execution Event”, where a loaded executable decides to make a call on its own (outside of the one that the app designer intended).  For instance, if a permitted/intended executable launched, and then it calls out to the manufacturer for an updated version, or the latest driver, that is not pre-bundled in the package.  Examples of this are the Juniper VPN agent or the MS Security Center executable.

Panacea or Pariah?

The good news is that application virtualization absolutely does address UAC and elevation features by isolating areas that normally prevent non-elevated users from writing to them by creating a virtual HKLM registry hive, Windows and Program Files.  Virtualizing applications also mitigates potential conflicts in a shared session environment like Remote Desktop Servers or XenApp.

However, is application virtualization the silver bullet to fix all elevation and UAC issues?  The answer is “it depends”.  If the application explicitly requires elevated privileges within its manifest, then it will always present a UAC prompt.  In addition, if the application attempts to make a system change like a driver installation or some kind of self-updating feature, it will force Windows 7 to prompt you for elevation.  These challenges can be further addressed with tools such as AppSense Application Manager, or Viewfinity Privilege Management (which elevate a user’s privilege on a per-executable basis), or SystemGuard (which can elevate privileges to write to the registry).

The bottom line is that application virtualization brings many advantages.  In addition to extending the life of legacy applications, reducing deployment costs, and reducing user downtime caused by install/uninstall issues and application conflicts, many UAC issues can be mitigated with application virtualization, especially when coupled with effective use of user virtualization tools.

 

Next installment – Application Streaming…

 

Recognition From Symantec

2017-07-27T00:01:08+00:00 November 2nd, 2011|Uncategorized|

Symantec recently posted an item to their Endpoint Virtualization Community Blog, calling attention to a couple very nicely-done instructional videos done by fellow Coretek team member, Jeff Blakely (a.k.a. on YouTube).

Of course, we couldn’t be more proud of this recognition of Jeff’s talent by such a valued partner as Symantec; but we knew it all along.

😉

 Check out the Symantec blog item here:

http://www.symantec.com/connect/blogs/symantec-workspace-virtualization-youtube-videos?om_ext_cid=biz_con_email_2011_oct_26_news_youtube_videos

Thanks Symantec, and thanks Jeff!

Symantec Workspace Streaming / Virtualization Overview

2017-07-27T00:01:08+00:00 May 24th, 2011|Uncategorized|

Understanding Workspace Streaming (SWS)

Symantec Workspace Streaming

Symantec Workspace Streaming is an application streaming solution that enables on-demand application provisioning, offline cache, license recovery and instant application upgrades. Symantec Workspace Streaming increases end user productivity with controlled, guaranteed access to any Windows based applications from any location at any time, including remote and mobile users.

Key Features

  • On-demand application streaming – simplifies OS image management by reducing the number and size of images
  • Dynamic license management – proactively insures license compliance by avoiding over-deployment and optimize software costs by re-harvesting licenses when they expire or after a period of disuse
  • Single-click application upgrades – upgrade and patch applications quickly and painlessly, or roll back applications to the previous version if required
  • Disconnected Usage Capability

Key Benefits

  • Reduce software license costs
  • Simplify Application delivery
  • Reduce application support costs/disruption
  • Improve utilization of existing hardware and software resources

 

Symantec Workspace Virtualization

Symantec Workspace Virtualization provides application virtualization that helps reduce application conflicts, testing requirements and support calls. Symantec Workspace Virtualization helps IT organizations improve management and control over endpoints to reduce the total cost of ownership of laptops and desktops.

Key Features

  • Virtual application layers – patented filter driver technology enables virtual layers that are transparent to the base operating system and other applications
  • Selective isolation – provides a solution for incompatible Windows 7 apps and insures system and application compatibility under any circumstance
  • Endpoint Management integration – Workspace Virtualization is a standard component of Symantec’s Client Management Suite (CMS), Total Management Suite (TMS), Symantec Workspace Streaming (SWS), Software Management Solution

Key Benefits

  • Eliminate conflicts between applications and base operating system, such as incompatible Windows 7 applications
  • Reduce application pre-deployment testing requirements
  • Provide instant reset for broken applications

Symantec Positioned as a Leader in the Endpoint Protection Platforms Magic Quadrant

2017-07-27T00:01:08+00:00 March 13th, 2011|Uncategorized|

Symantec Corp.  announced that it has been positioned by Gartner Inc. in the Leaders Quadrant of the 2010 Magic Quadrant for Endpoint Protection Platforms (EPP).

“Attention to better software management and maintenance is the key to reducing the attack surface and protecting users from social engineering attacks,” notes the Magic Quadrant report, which positions vendors based on their ability to execute and completeness of vision. “Application control, configuration management, and vulnerability detection and remediation are the most effective proactive forms of malware defense. These methods reduce the overall attack surface and neuter the vast majority of threats.”

“As the security landscape rapidly changes, the traditional approaches to security fail to protect against the new sophisticated attacks,” said Art Gilliland, vice president for Symantec Enterprise Security Group. “We believe our position in the Gartner Magic Quadrant for Endpoint Protection confirms Symantec’s leadership in the execution and vision for our comprehensive and integrated security solution which delivers the protection and tools required to effectively stop the latest malware attacks.”

Symantec Endpoint Protection integrates antivirus, antispyware, desktop firewall, intrusion prevention, device and application control and optional network access control to deliver unmatched defense against malware for laptops, desktops and servers. It seamlessly integrates essential security technologies in a single agent and management console, increasing protection and helping lower total cost of ownership.

To address the challenges of endpoint security as a result of complex IT infrastructures, virtualized environments and consumerization of IT, Symantec has consistently augmented its endpoint security offering from a technology, efficacy and performance perspective. In a recent series of tests measuring the performance of enterprise and small business endpoint security solutions conducted by PassMark Software, Symantec Endpoint Protection outperformed all competitive products.

About Business Solutions from Symantec
Symantec helps organizations secure and manage their information-driven world with endpoint security, messaging security, web security, data protection and security management solutions.

About the Magic Quadrant
The Magic Quadrants are copyrighted 2010 by Gartner, Inc. and are reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner’s analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the “Leaders” quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Symantec
Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com.

Source: Symantec

Data Backup 101

2017-07-27T00:01:09+00:00 October 3rd, 2010|Uncategorized|

Backup 101

Mad Media, a San Diego based marketing agency, experienced a major data disaster during the 2007 California wildfires. Their hard drives were damaged by multiple power surges, rendering all their files, including crucial client files, inaccessible.
 
In another incident, IT consultant Howard Sherman related the story of a client who went out of business when their hard drive failed and they lost their data.  These kinds of stories repeat themselves every day in businesses around the world. Disgruntled employees, human error, hardware failures, software corruption, viruses and theft are some of the things that contribute to the loss of business data. While ensuring your network is safe from hackers, viruses, etc. is critical, once your data is actually lost or corrupted only a well implemented backup strategy will get it back.
 
According to the Open Security Foundation’s DataLossDB data braches are broken down as follows: Stolen Laptop’s make up 21% (traditional security won’t help you hear – only a backup will help); Hack attacks represent 16%; data loss via insecure web sites make up another 13%. The remaining percentages are comprised of a variety of other types of breaches.  Based on these numbers, the chance of you losing data (by accidental human error, hardware/software failure, or malicious human intervention) is high.

Protection = Security Plus Backup

Many business owners and IT managers focus on only one half of security. They think that by having an anti-virus solution on each computer and reducing spam that they are doing well. However, true protection is security plus backup.

More than Files: Applications and Operating System Too

Maybe you do have a backup solution in place for files and data you and/or your employees create. Maybe your file server is backed up, for example. But what if your file server hard disk fails? What if an employee’s computer fails? Restoring the files is only one part of the equation. You need to ensure the applications and operating system can also be quickly restored. For example, most business professionals use Microsoft Outlook. You might be able to reinstall Outlook on your computer, but if your data is not backed up, you won’t have your email, your calendar, your task list or anything. Work with a technology professional to ensure that files, applications and operating systems are backed up as well. Discuss with them about creating an “image” of your servers and client computers.

Don’t Forget Mobile Workers

We live in an increasingly mobile society where business data no longer only resides on local servers in a dusty filing closet. It doesn’t only reside on desktop computers on cubicles or a CEO’s oak executive desk. Today’s professionals create their data and store their data on a variety of mobile devices – smartphones, netbooks, notebooks and USB keys.

 
The $100,000 client contract might have originally been created in the corporate office. But maybe the remote sales staff did the final and most critical edits on a smart phone at the airport.
 
It is important that your backup strategy include ALL of your corporate data – whether it is in the office our outside of the office.

Where Will You Back Up Your Data

You have several choices in deciding where to back up your data. In fact you don’t have to have one option, but you might decide to implement two solutions.
Backing up your data to another hard disk, server or removable media such as a DVD is great option, especially when you want to ensure quick access to the data. The backed up data should not be stored in your office, but should be taken offsite (like to an employee’s home). In the event something happens to your office (fire, flood, earthquake, theft) your data is safe and easily recoverable.
 
Online backup is a great option if you want a hassle-free way to ensure your data is automatically backed up, remotely archived and accessible through the internet for recovery. The challenge with this solution, however, is that recovery of your data must be done by downloading your files through the Internet (unless the online backup company can send you DVDs of your data). Although recovering files you created is not hard using an online backup solution, recovering your programs, operating systems and data files can be a challenge.

Verify Your Backup

It is absolutely critical that you ensure your data is being properly backed up.  Imagine depositing your money into an ATM machine, only to realize that when you went to make a withdrawal, the money you were depositing was not applied to your bank account. To ensure your bank account is properly credited you get a receipt and check your bank balances after a few days to ensure the money has been properly deposited.  When backing up your data, it is absolutely critical to ensure that the data has been actually backed up.
 
Backing up 6 months of data is great. But if disaster strikes in 6 months plus one day and only then do you realize that your data has not been properly backed up – is too late. 
 
Technology can fail and human error is common place. Maybe you thought your three servers and 20 computers were backed up every night, but instead only 2 servers were backed up. Double check and verify that what you want to back up is indeed being backed up. Look at the backup logs or alerts on failed jobs but also spot check the actual backed up data.

Data Recovery

Data recovery is something that no business wants to have to do. However, knowing how to do it is essential. The data recovery process will differ from system to system, but overall the principle is the same. In fact, I encourage you to do practice “data recovery drills” to measure the effectiveness of your data recovery process.

 
If you need to recover files, and your computer is operational, simply access your backup software, access the recovery feature and select which files you need to recover.
 
If your entire computer or server goes down, this is where your “image” comes in to play.
 
Start up your computer from an external drive, like a USB drive or DVD drive. Start up the software that manages your backup and/or image. Select the backed up image you would like to restore to the new computer hard disk. Once the recovery process is done, you’ll have a computer identical to your “old” or crashed computer. All you have to do now is install any programs or files that were newly installed since the image was created.

Disaster Continuity

As you put together a backup plan it’s important to consider disaster continuity. This means that in the event of a disaster your business can continue running as effectively as possible. Here are a few things to consider including in your plan:

  • Telephone numbers: Do you have complete contact details of all your key employees and ALL staff? And maybe your IT partner or consultant?
  • Customer information: Can you easily find complete contact information for all of your customers?
  • Central communication: Does everyone in the company have a central telephone number, web site and/or point of contact for sharing information.
  • Remote office: In the event you are unable to access your office, can you and your employees remotely access company information?
While you can’t control whether disaster will strike, you can control whether the impact it has on your business will be devastating or merely inconvenient. Make sure that you are implementing a system of protection that includes regular backup of files (local and remote) and operating systems, a sensible backup location, regular verification that it’s actually backing up, recovery “practice” sessions, and a continuity plan that all key employees know about. It can mean the difference between staying in business or not.
 
 
Source:  Ramon Ray, Technology Evangelist and Editor, Smallbiztechnology.com

Symantec Enables Customers to Virtualize Business Critical Applications with Confidence

2017-07-27T00:01:09+00:00 August 27th, 2010|Uncategorized|

ApplicationHA and VirtualStore to protect systems from downtime and optimize storage in VMware environments

 

Symantec Corp. (Nasdaq: SYMC) today announced that it will offer Symantec ApplicationHA and Symantec VirtualStore, two solutions that will provide customers the ability to confidently virtualize their business critical applications and minimize storage costs on the VMware platform. ApplicationHA and VirtualStore are the result of extensive collaboration between Symantec and VMware, as the companies work closely to help customers accelerate the adoption of virtualization to mainstream applications.

Symantec ApplicationHA, based on industry-leading Veritas Cluster Server technology, will provide high availability for business critical applications through application level visibility and control in VMware environments. Symantec VirtualStore, based on Veritas Storage Foundation technology, is a software-based storage management solution for VMware virtual machines that will provide rapid provisioning of servers and virtual desktops, efficient cloning and accelerated boot up of virtual machines. Both ApplicationHA and VirtualStore are seamlessly integrated with VMware management tools such as VMware vCenter Server, enabling customers to deploy these tools without impact to their operational model.

Customers have been aggressively virtualizing non-critical applications, and now that they are starting to move business critical applications like SAP and MS SQL Server databases to virtual platforms, they require high availability of the applications inside VMware virtual machines. Symantec ApplicationHA, for the first time, will ensure application high availability by providing visibility, control and integration with VMware vCenter Server and VMware High Availability (HA).

Symantec ApplicationHA:

  • Monitors applications’ health status and detects failures in the virtual machine
  • Restarts failed applications
  • Coordinates with VMware HA to restart the virtual machine, if needed

 

Administrators can fully manage all operations of Symantec ApplicationHA through VMware vCenter Server, avoiding the need for additional tools and associated training. Deep discovery and auto-configuration allows administrators to easily install, configure and administer Symantec ApplicationHA with a few clicks.

Built on the industry-leading Veritas Cluster Server technology, ApplicationHA supports a wide range of applications including MS SQL Server, Exchange, IIS, Oracle and SAP. It provides consistent functionality and usability across both Windows and Linux operating systems and is fully compatible with VMware vMotion and VMware Distributed Resource Scheduler (DRS).

Symantec VirtualStore: Address Storage Challenges in Virtual Infrastructures

As organizations scale their virtual environments, they find themselves challenged by the ever increasing storage requirements and performance bottlenecks that are associated with retaining hundreds or even thousands of virtual machine images on traditional hardware filers. VirtualStore will enable administrators to fully benefit from their virtualization investments with a software-based NAS solution that scales servers and storage independently, efficiently provisions virtual machines, and delivers advanced storage optimization capabilities for VMware environments.

Like ApplicationHA, VirtualStore fully integrates with VMware vCenter Server. Based on Symantec’s industry leading Veritas Storage Foundation technology, VirtualStore can:

  • Help customers reduce storage costs associated with virtual machine sprawl and improve the performance of virtual infrastructures
  • Enable administrators to dramatically reduce the cost per virtual machine by repurposing existing storage investments or using inexpensive or commodity storage
  • Help IT organizations reduce their storage footprint by storing only the differences between the parent virtual machine image and each clone
  • Significantly drive down total cost of ownership by taking advantage of the benefits of thin provisioning

 

Virtual Desktop Infrastructure (VDI) environments can also be managed more efficiently. VirtualStore’s ‘FileSnap’ feature lets administrators easily and rapidly clone and provision thousands of virtual machines in minutes through its VMware vCenter Server integration. Through innovative page caching, VirtualStore also eliminates the performance bottlenecks created when multiple users boot up their virtual machines (‘Bootstorm’).

Source: Symantec.com

Symantec Backup Exec 2010: Reliable Backup and Recovery Designed for Your Growing Business

2017-07-27T00:01:09+00:00 August 25th, 2010|Uncategorized|

Overview

Symantec Backup Exec™ 2010 delivers market leading backup and recovery protection from server to desktop. Easily protect more data while you reduce storage costs and improve backup performance through integrated deduplication and archiving technology. Reduce business downtime with unmatched technology that recovers critical Microsoft applications and VMware or Microsoft Hyper-V virtual environments in seconds. Meet your recovery point objectives with continuous data protection to ensure reliable recovery of an entire application and efficiently restore a granular email or individual file/folder.

Symantec Backup Exec also delivers centralized management to easily extend your backup infrastructure across a distributed environment and remote offices so your server and desktop data protection is easily managed from a central office as your business grows. Efficiently manage both Windows and non-Windows systems through a single console including UNIX, Linux, MAC, and NetWare, including remote media server support for Linux servers. Overall, Backup Exec 2010 is designed to readily optimize any Windows data protection strategy – helping you protect more data while utilizing less storage – overall saving you time and money.

Key Benefits

Delivers market-leading Windows data protection with

more than 1.5 million customers globally

• Reduce storage costs while optimizing network utilization through integrated deduplication and archiving   technology.

• First-to-market granular recovery for Exchange, SQL and Active Directory environments running in a VMware and Microsoft Hyper-V environment.

• Microsoft certified backup and recovery for the latest Windows environment, including Windows 2008 R2, Exchange 2010 SP1, and Windows 7.

• Comprehensive disk and tape storage for the latest physical and virtual server systems though one console  including VMware and Microsoft Hyper-V virtual systems.

• Reduce storage requirements and recovery times with patent-pending granular data recovery of leading Microsoft applications, including Exchange, SharePoint and Active Directory.

• Protect non-Windows servers and maximize performance of supported NDMP filers and SAN environments through scalable remote agents and options.

• Easily update and manage a growing Backup Exec infrastructure throughout a Windows datacenter, distributed throughout the network or at remote offices from one console.

• Eliminate the backup window and ensure recovery point objectives are easily met for Exchange, File Servers and desktop data with Continuous Data Protection.

Comprehensive Backup and Recovery

Symantec Backup Exec 2010 offers a comprehensive backup and recovery solution in one product suite, which reduces the complexity of protecting your company’s most valuable asset—its data. Whether that data resides on a Windows file server; on a desktop; virtual server; or on a critical application server like Exchange, SQL, or SharePoint, Symantec Backup Exec 2010 provides full protection and recovery for both data and systems. Designed to meet the growing needs of today’s businesses, Symantec Backup Exec 2010 delivers comprehensive disk or tape data protection and recovery for Windows environments. Backup Exec provides integrated deduplication and archiving, plus, continuous data protection—eliminating backup windows altogether, speeding up data recovery, and enabling end users to recover their own files without IT intervention. Symantec Backup Exec 2010 also delivers patent-pending Granular Recovery Technology allowing businesses to recover data in seconds, including business-critical information such as individual email messages, folders, and documents, from a single backup. An optional centralized administration console provides scalable management of distributed backup servers. New infrastructure management is also available for simplified inventory, deployment and upgrades of Backup Exec licenses and software patches though a single console.

Overall, sophisticated database and groupware agents and storage options easily expand data protection to protect to critical applications and provide added flexibility for virtually any storage environments.

New Product Highlights

 

• NEW integrated deduplication option (using Symantec NetBackup PureDisk technology) reduces backup times and storage costs.

• NEW unified archiving (powered by Symantec Enterprise Vault) efficiently consolidates growing Exchange and File server data volumes and automates efficient data lifecycle management practices.

• NEW virtual server application support including with first-to-market Exchange, SQL and Active Directory backup and recovery for virtual environments and enhanced VMware vSphere 4.1 and Microsoft Hyper-V R2.

• Windows 7, Exchange 2010 SP1, SharePoint 2010, SQL 2008 R2, MAC OSX 10.6 and Windows Server 2008 R2 support provides comprehensive protection for the latest Windows and MAC environments.

• Enhanced Agent for Enterprise Vault automates backup and recovery of both Enterprise Vault 8 and 9 with theability to easily recover an Enterprise Vault site or individual indexes.

• NEW Lotus Domino 8.5.x support with simplified backup and recovery of the Domino Attachment and Object Service (DAOS) store and associated NLO files.

• Enhanced Virtual Tape Library (VTL) support and licensing, easily protect a VTL storage environment as a unique device and view valid VTL functions with new licensing per VTL environment.

• Enhanced installation and backup wizards reduce the time and complexity of setting up your backup environment.

• NEW Backup recommendation tool identifies potential gaps in your Windows backup strategy and provides recommendations on the agent(s) required to ensure complete data protection.

Proven and Reliable

Symantec Backup Exec is based on over two decades of proven, Microsoft certified engineering. The innovative architecture fully incorporates Microsoft design standards, helping to ensure 100 percent compatibility with the latest Microsoft Windows Server. Backup Exec also provides added security with flexible 128-bit or 265-bit AES encryption across the network or off to storage devices so critical data is secure whether in transit or at rest. Symantec Backup Exec 2010 delivers an easy to mange interface and calendar view to quickly track and monitor backup and recovery jobs. In addition, Backup Exec simplifies installation and backups with its Pre-Install Environment Checker, which highlights any potential issues before the software is installed. With its Job Test Run, Symantec Backup Exec 2010 will identify potential problems that cause job failures, and then notify the administrator so that corrective action can be taken. Realize further benefits with automatic discovery of new resources, which enables administrators to create a job for detecting new, unprotected resources that are at risk and in need of backup. All of these tools reduce the time and resources needed to install and run Backup Exec, while improving overall backup performance.

Support Services

No matter the size of your company, a service interruption can mean significant loss to your business. Symantec recommends Essential Support Services as the service level of protection for most businesses.

• Reassurance of knowing your Backup Exec products are up to date with the latest updates and version releases

• Cost savings that come with selecting a value-priced service plan

• 24×7 expert problem resolutions through Symantec’s global support and delivery team

Available Products, Agents and Options

Symantec Backup Exec 2010 provides scalable easy-to manage backup and recovery protection for Windows based environments. Symantec Backup Exec agents and options easily expand any Backup Exec environment to support critical applications, databases, and storage configurations:

Core Licenses

• Symantec Backup Exec 2010

• Symantec Backup Exec 2010 for Windows Small Business Server (view Small Business Server data sheet)

Symantec Backup Exec Suites

• NEW Symantec Backup Exec 2010 Deduplication Suite

• NEW Symantec Backup Exec 2010 Deduplication and Archiving Suite

• NEW Symantec Backup Exec 2010 VMware Suite

• NEW Symantec Backup Exec 2010 Hyper-V Suite

Symantec Backup Exec Agents

• Enhanced Agent for VMware Virtual Infrastructures

• Enhanced Agent for Microsoft Hyper-V

• Enhanced Agent for Enterprise Vault™

• Enhanced Agent for Lotus Domino Server

• Enhanced Agent for Microsoft Exchange Server

• Agent for Active Directory

• Agent for DB2 on Windows Servers

• Agent for Microsoft SQL Server

• Agent for Microsoft SharePoint

• Agent for Oracle on Windows and Linux Servers

• Agent for SAP Applications

• Agent for Windows Systems

• Remote Agent for Linux or UNIX Servers

• Remote Media Agent for Linux Servers

• Remote Agent for Macintosh Servers

• Remote Agent for NetWare Servers

Symantec Backup Exec Options

• NEW Deduplication Option

• NEW Exchange Mailbox Archiving Option

• NEW File System Archiving Option

• NEW Virtual Tape Library Unlimited Drive Option

• Advanced Disk-Based Backup Option

• Central Admin Server Option

• Desktop and Laptop Option

• Library Expansion Option

• NDMP Option

• SAN Shared Storage Option

• Open File for Netware Option

Coretek Services is a Michigan based Systems Integration and IT consulting company that works with virtualization infrastructure, and is also a Symantec Gold Partner specializing in Symantec Enterprise Vault (SEV), Symantec Backup Exec (SBE), and Symantec Endpoint Protection (SEP).  Please contact us today for any virtualization requirements, or Symantec Product requirements.

Source: Symantec.com

Symantec Endpoint Protection: The next generation of antivirus technology from Symantec

2017-07-27T00:01:09+00:00 August 24th, 2010|Uncategorized|

Overview

Advanced threat protection

Symantec™ Endpoint Protection combines Symantec AntiVirus™ with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops, and servers. It provides protection against even the most sophisticated attacks that evade traditional security measures, such as rootkits, zero-day attacks, and mutating spyware. Symantec Endpoint Protection delivers more than world-class, industry-leading antivirus and antispyware signature-based protection. It also provides advanced threat

prevention that protects endpoints from targeted attacks and attacks not seen before. It includes turnkey, proactive technologies that automatically analyze application behaviors and network communications to detect and block suspicious activities, as well as administrative control features that allow you to deny specific device and application activities deemed as high risk for your organization. You can even block specific actions based on the location of the user.

 This multilayered approach significantly lowers risks and gives you the confidence that your business assets are protected. It is a comprehensive product that gives you the capabilities you need now, along with the ability to enable the pieces you need, as you need them. Whether the attack is coming from a malicious insider or is externally motivated, endpoints will be protected. Symantec Endpoint Protection increases protection and helps lower your total cost of ownership by reducing administrative overhead as well as the costs associated with managing multiple endpoint security products. It provides a single agent that is administered by a single management console. This simplifies endpoint security administration and provides operational efficiencies such as single software updates and policy updates, unified and central reporting, and a single licensing and maintenance program. Symantec Endpoint Protection is easy to implement and deploy. Symantec provides a range of consulting, technical education, and support services that guide organizations through the migration, deployment, and management of the solution and help them realize the full value of their investment. For organizations that want to outsource security monitoring and management, Symantec also offers Managed Security Services to deliver real-time security protection.

 

Key benefits

Secure

Comprehensive protection—Symantec Endpoint Protection integrates best-of-breed technologies to stop security threats—even from the most devious new and unknown attackers—before they penetrate the network. It detects and blocks malicious software in real time, including viruses, worms, Trojan horses, spyware, adware, and rootkits.

Proactive protection—TruScan™ Proactive Threat Scan is a unique Symantec technology used to score both good and bad behaviors of unknown applications, enhancing detection and reducing false positives without the need to create rule based configurations.

Industry-best threat landscape intelligence—Symantec protection mechanisms leverage the industry-leading Global Intelligence Network to deliver an unparalleled view of the entire Internet threat landscape. This intelligence results in actionable protection and peace of mind against evolving attacks.

Simple

Single agent, single console—A full range of security technologies are integrated into a single agent and a centralized management console, with an intuitive user interface and Web-based graphical reporting. You are able to set and enforce security policies across the enterprise to protect your critical assets. Symantec Endpoint Protection simplifies management, reduces system resource usage, and requires no additional agents when adding Symantec Network Access Control support. Symantec Network Access Control features are automatically enabled on the agent and management console with the purchase of a license.

Easy to deploy—Because it requires only a single agent and management console and it operates with an organization’s existing security and IT investments, Symantec Endpoint Protection is easy to implement and deploy. For organizations that want to outsource security monitoring and management, Symantec offers Managed Security Services to deliver real-time security protection.

Lower cost of ownership—Symantec Endpoint Protection delivers a lower total cost of ownership by reducing administrative overhead as well as the costs associated with managing multiple endpoint security products. This unified approach to endpoint security simplifies administration and

provides operational efficiencies such as single software updates and policy updates, unified and central reporting, and a single licensing and maintenance program.

Seamless

Easy to install, configure, and manage—Symantec Endpoint Protection makes it easy to enable/disable and configure desired technologies to fit into your environment.

Symantec Network Access Control ready—Each endpoint becomes “Symantec Network Access Control ready,” eliminating the need to deploy additional network access control endpoint agent software.

Leverages existing security technologies and IT

investments—Symantec Endpoint Protection works with other leading antivirus products, firewalls, IPS technologies, and network access control infrastructures. It also works with leading software deployment tools, patch management tools, and security information management tools.

Integration with Altiris endpoint management

solutions—Distributing software packages, migrating older Symantec AntiVirus™ or other antivirus deployments, and viewing new agent rollout status and activity is easier.

Key features

 

More than antivirus

Antivirus and antispyware—Provides unmatched, best of- breed malware protection, including market-leading antivirus protection, enhanced spyware protection, new rootkit protection, reduced memory footprint, and new dynamic performance adjustments to keep users productive.

Network threat protection—A rules-based firewall engine and Generic Exploit Blocking (GEB) block malware before it can enter a system.

Proactive threat protection—Providing protection against unseen threats (i.e., zero-day threats), it includes TruScan Proactive Threat Scan, which does not rely on a signature.

Single agent and single management console—Antivirus, antispyware, desktop firewall, IPS, device and application control, and network access control (with the purchase of a Symantec Network Access Control license) are provided on a single agent—all managed by a single console.

Coretek Services is a Michigan based Systems Integration and IT consulting company that works with virtualization infrastructure, and is also a Symantec Gold Partner specializing in Symantec Enterprise Vault (SEV), Symantec Backup Exec (SBE), and Symantec Endpoint Protection (SEP).  Please contact us today for any virtualization requirements, or Symantec Product requirements.

Source: Symantec.com

Symantec Enterprise Vault Archiving Framework Overview

2017-07-27T00:01:09+00:00 August 23rd, 2010|Uncategorized|

Over 5,000 global customers use Enterprise Vault as an archiving framework to reduce risk and increase operational efficiency

Business is drowning in data. As part of the normal daily operation large numbers of emails and documents are generated; buyers may negotiate purchasing contracts over email, financial analysts may share data via Microsoft SharePoint Portal Server, and product managers may publish pricing and competitive information via file shares. All of these activities are fundamental to the smooth operation of the business and all generate business records, which, at some point, may be required for regulatory, litigation, or knowledge purposes.

Today’s complex storage and server infrastructures are not designed to cope with the efficient long-term retention of large volumes of data. The backup/recovery process becomes impossible within a reasonable timeframe. Keeping up with and exploiting the latest software capabilities raises the huge challenge of migrating legacy data. With IT budgets and resources stretched to the limit, the temptation to purge historical data is strong. But the increasing legal and regulatory demands mean this is not an option.

 

Flexibility and adaptability
Delivering value today, meeting your future needs

Without a flexible approach to storage the operational risks are overwhelming.  Without an adaptable platform for information exploitation the risk of non-compliance could be catastrophic. Imposing complex document retention solutions on your users will result in overload. Enterprise Vault is designed to deliver long-term, archival storage of multiple types of data. The information and data lifecycles are managed and relevant content can be found on demand.  A complete solution is delivered without disruption to the user, avoiding the need to change business processes and retrain staff.  The heart of this solution is the Enterprise Vault archiving framework.  Designed to offer secure, scalable information retention that is nonintrusive for the user, the framework is a natural evolution of Symantec’s market-leading archiving solution deployed around the world.

The archiving framework

Every organization is different. You need a solution that meets your business and operational needs, taking into account your current and potential future requirements. The archiving framework delivers the exact solution you require today, giving you the platform to meet current and future information retention requirements and exploit advances in storage and server technology. The framework consists of services grouped into a number of modules. By providing such a modular solution Symantec maximizes the value of your investment.

Components of archiving

The solution of the archiving problem can be broken down into a number of areas; each of these is represented by a layer in the archiving framework.

Enterprise Vault Repository

Central to every organization is the creation and ongoing management of the archive and its contents. This capability is delivered by the Enterprise Vault Repository. This is designed to deliver the capability to securely retain archived data in such a way that it can be fully exploited, and disposed of when it is no longer required. The Repository is designed to:

• Store archived content on the most appropriate platform

 • Compress and single-instance for storage reduction

 • Index content for rapid and targeted retrieval

 • Render an HTML copy of all archived content, thereby

   securing future accessibility

 • Utilize user authentication security controls

 • Define and implement retention and deletion policies

  

Content sources

Enterprise Vault is designed to store content from multiple data sources. Movement of content from the application to the Repository is carried out transparently via policy control. This ensures that fundamental records can be retained without affecting normal daily operations.

Open storage layer

The Repository provides for retention of the archive on the initial storage platform. Depending on the size of the organization and the nature of the content, there may be a need to use other types of storage, or indeed consolidate and partition archives for maximum efficiency. Your storage infrastructure may contain SAN and NAS technology and increasingly may embrace newer technologies such as EMC Centera and Network Appliance NearStore. The timescale for retention of content may be a few years, or a few decades. Today’s storage media may be regarded as legacy in the future. Storage lifecycle management

therefore is paramount to the long-term usefulness of archived content. To facilitate true lifecycle management the Open Storage Layer allows policy-based migration of archived data across storage media through time. This allows you to take advantage of the storage media best suited to the content’s age and usage profile, and reduce the total cost of storing the archive.

Performance and scalability infrastructure

The Enterprise Vault Repository is architected to provide the optimal performance for single or distributed server solutions. As the deployment environment becomes more complex, so it becomes important to have the ability to deploy components of Enterprise Vault in a distributed manner. Symantec and its partners have tested Enterprise Vault to beyond 100,000 users. A building block approach allows different servers to be used for archiving, indexing, journaling, and many other activities.

Universal access layer

Due to the wide range of data sources that can be archived, and the many ways in which end users work, it is important to provide an adaptable user interface. One of the key premises of Enterprise Vault is that end users should not have to change the way they work as a result of the implementation of archiving. Email clients should still be able to access current and historical email; file system content should still be accessible, and when working offline, archived email should still be available. To this end, Enterprise Vault has available a wide variety of client options:

• Transparent shortcuts in Microsoft Outlook®

• Universal shortcuts for non-Outlook clients

• Full access from Microsoft Outlook Web Access

• Transparent placeholders for archived file system content

• Hierarchical “Explorer” view across all archived sources

• Offline access for mobile and remote users

• Simple and extended full text search capabilities from

Outlook and Web interfaces The implementation of archiving and keeping of business records need not be intrusive for end users. They use familiar tools and continue to work as before.

Archive exploitation

Reducing the overall cost of storage should be only part of the TCO addressed by an archiving solution. Content is being kept because at some point in the future you will need to access it; otherwise, why would you keep it? Typically business records need to be accessed as part of a regulatory action, or as part of a litigation action. In both of these circumstances it is paramount that the information can be found very quickly and that only relevant information is disclosed. The ability to search the archive is only one part of the requirement. Locating the right set of content in response to litigation (perhaps as part of a contractual dispute) will require multiple searches. Search sets will require review by people with different levels of experience. An audit will be required of how decisions were made on what material to disclose. There is a process to this and it requires workflow. Enterprise Vault business accelerators deliver this workflow and drive the discovery or compliance process. Initially there are two business accelerators available within the framework:

• Discovery of content in response to litigation or a similar

   event (Discovery Accelerator)

• Regulatory supervision in line with finance regulations

   (Compliance Accelerator)

Framework benefits


• Built upon proven solutions from the market leader
• Supports many different content sources, not just email
• Nonintrusive for the end user
• Flexible deployment options
• Complete exploitation of archived content
• Addresses operational efficiency and compliance
• Enables information and storage lifecycle management
• Adaptable for future needs
• Reduces cost, reduces risk

Both Accelerators use the inherent search capability of Enterprise Vault to gather records that may be relevant to a case. The records are then assigned to a reviewer who is responsible for deciding whether the records are relevant to the case in hand. If in doubt, the decision can be cascaded to more experienced reviewers. The end result is a set of business records of absolute relevance, which may then be packaged for disclosure. Throughout the process an audit trail is retained.

Archiving for compliance, records management and

operational efficiency

Reducing risk and increasing efficiency

Enterprise Vault provides a framework of solutions that will increase your operational efficiency and decrease your business risk. Compliance is not just about email retention. Reducing cost is not just about storage optimization. Symantec helps you move beyond simply archiving email. We work with you to deliver a solution that allows email and other critical content sources to be archived and exploited on demand. This approach brings operational benefit to the data sources and preserves records for future use. Today your organization is looking for an application to underpin your compliance initiatives and reduce the future TCO of your storage and information infrastructure. Enterprise Vault is the proven solution.

Coretek Services is a Michigan based Systems Integration and IT consulting company that works with virtualization infrastructure, and is also a Symantec Gold Partner specializing in Symantec Enterprise Vault (SEV), Symantec Backup Exec (SBE), and Symantec Endpoint Protection (SEP).  Please contact us today for any virtualization requirements, or Symantec Product requirements.

 

Source: Symantec.com

Symantec Health Image Share

2017-07-27T00:01:09+00:00 August 13th, 2010|Uncategorized|

     Symantec Health Image Share

Secure image sharing with any doctor in the country 

Solution Highlights

Management

  • Streamlines setup and account administration with data import and update functions
  • Eliminates the need for specialized software downloads, VPNs, or frustrating reboots
  • Enables clinicians to focus on patient care, not the technology

Usability

  • Allows a physician to easily locate a study and send it to another physician using intuitive search-and-send functionality
  • Provides interactive view functions such as scroll, zoom and pan, flip and rotate, image orientation, and motion view cine loops, to support efficient viewing
  • Enables simultaneous access and viewing of images and videos produced from different modalities, along with metadata and diagnostic reports, all from a single console
  • Allows easy image downloading and import into the PACS if needed

Security

  • Protects patient’s images from unauthorized access using dual authentication
  • Tracks and reports each share and view action using audit logs
  • Secures medical image data using proven practices and best-of-breed security and availability products

 

Load More Posts

Fatal error: Uncaught exception 'GuzzleHttp\Exception\ClientException' with message 'Client error: `POST https://dc.services.visualstudio.com/v2/track` resulted in a `400 Invalid instrumentation key` response: {"itemsReceived":1,"itemsAccepted":0,"errors":[{"index":0,"statusCode":400,"message":"Invalid instrumentation key"}]} ' in /home/coretek/public_html/wp-content/plugins/application-insights/vendor/guzzlehttp/guzzle/src/Exception/RequestException.php:113 Stack trace: #0 /home/coretek/public_html/wp-content/plugins/application-insights/vendor/guzzlehttp/guzzle/src/Middleware.php(66): GuzzleHttp\Exception\RequestException::create(Object(GuzzleHttp\Psr7\Request), Object(GuzzleHttp\Psr7\Response)) #1 /home/coretek/public_html/wp-content/plugins/application-insights/vendor/guzzlehttp/promises/src/Promise.php(203): GuzzleHttp\Middleware::GuzzleHttp\{closure}(Object(GuzzleHttp\Psr7\Response)) #2 /home/coretek/public_html/wp-content/plugins/application-insights/vendor/guzzlehttp/promises/src/Promise.php(156): GuzzleHttp\Promi in /home/coretek/public_html/wp-content/plugins/application-insights/vendor/guzzlehttp/guzzle/src/Exception/RequestException.php on line 113