Symantec 2001 Annual Report Download - page 17

Download and view the complete annual report

Please find page 17 of the 2001 Symantec annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 58

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58

Symantec Enterprise Firewallprovides an advanced perimeter security
solution without compromising network performance. It protects
against unwanted intrusion, while allowing approved business trafc
to traverse the enterprise network.
VelociRaptor Firewallappliance is an integrated hardware/software
solution that ensures the security of vital information. With VelociRaptor
Firewall, one simply plugs and protectsto provide a robust, secure
connection to the Internet, regardless of the organization size.
PowerVPN Server is designed to reduce the cost of managing remote
access to enterprise networks while enabling improved integration
with valuable supply-chain partners. Its technology ensures that
corporations know and can control trafc passing at the application
and network levels.
Intrusion Detection
Organizations must protect information from unwanted users and
hackers and control access to information to maintain business integrity.
At the gateway and server level, our intrusion detection products will
monitor systems for such patterns of misuse and abuse and can warn
organizations before systems are misused or information is stolen.
Intruder Alert detects unauthorized and malicious activity, keeping
systems, applications and data secure from misuse and abuse. If these
systems are threatened, Intruder Alert can notify the user and take
action to prevent information theft or loss.
NetProwlercomplements existing security countermeasures and forties
a companys e-business initiatives by offering dynamic network intrusion
detection that transparently examines network trafc. It instantly
identies, logs, and terminates unauthorized use, misuse and abuse
of computer systems by internal saboteurs and external hackers.
Vulnerability Management
At the gateway and server level, our vulnerability management products
nd system vulnerabilities and ensure security policy compliance to
proactively reduce business risk. The initial step to reduce corporate
risk is to effectively measure compliance to a business security policy
and detect vulnerabilities where critical information resides. It is
important to understand the effectiveness of a security policy in order
to properly dene, manage and enforce business policies and assess
possible threats.
Enterprise Security Manager gives companies the ability to automate
the planning, management and control of security policies from a single
location, thereby saving time and money. Enterprise Security Manager
provides an efcient means of managing and controlling the policy while
providing reports that enable companies to prove tangible evidence of
progress across the enterprise, from their own workstations.
NetRecon is a network vulnerability management tool that discovers,
analyzes and reports holes in network security. NetRecon achieves
this by conducting an external review of network security by scanning
and probing systems on the network. NetRecon reenacts common
intrusion or attack scenarios to identify and report network vulnera-
bilities, while suggesting corrective actions.
Web Access Management
Our Web Access Management solutions enable customers, partners,
suppliers and employees to connect to a network safely, reducing
operational costs and enabling new business opportunities.
Webthoritysadvanced product architecture provides sophisticated and
secure control of valuable e-business data by handling user
identication, authorization and access control through the combina-
tion of a proxy server, authentication agents and central management
server.
Enterprise Administration Our Enterprise Administration segment
offers products that enable companies to be more effective and efcient
within their IT departments. Remote management solutions help
remote professionals to remain productive while providing companies
access to information, applications and data from any location.
pcAnywhere offers secure, reliable, fast and flexible point-to-point
remote computing via a multitude of communications media
including Internet, serial, LAN, ISDN, DSL, cable modems and
infrared. pcAnywhere enables a remote PC user to control and
transfer data to and from a host PC. In addition, the remote PC,
laptop or PC terminal controls the operation of the often-distant
host PC and allows users at the host machine to view the operations
being conducted from the remote site.
Ghost Corporate Editionis a PC cloning solution that allows fast disk
image management, rollout and ongoing PC conguration. Ghost
Corporate Edition provides technology for fast, reliable PC imaging and
management that serves to reduce IT costs by providing a means to
restore and congure machines that have been cloned. The centralized
management console enables IT personnel to initiate, congure and
manage the cloning of workstations across the network from a single
location, saving valuable time and resources.
Services Symantec Security Services provides information security
solutions that incorporate best-of-breed technology, security best
practices and expertise and global resources to help enable e-business
success. Through its comprehensive offerings, Symantec Security
Services delivers holistic security assessments, planning and imple-
mentation, proactive solutions for security management and response,
and knowledge transfer to develop internal security skills.
Consulting Services enables organizations to implement best-practices
security measures across the enterprise through comprehensive security
assessments and holistic planning and design. Consulting Services
develops strategies for managing and reducing risks to help organizations
protect business-critical assets.
Implementation Services provides the expertise that enables rapid
technology implementations and maximizes the value of security
investments. Through hands-on deployments of advanced security
systems and technologies, Implementation Services allows organizations
to leverage the best-practices security experience of industry experts in
order to gain maximum enterprise protection.
symantec 2001__15