Symantec 2004 Annual Report Download - page 7

Download and view the complete annual report

Please find page 7 of the 2004 Symantec annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 80

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80

SYMANTEC CORPORATION «5»
2004 Annual Report
To Secure It,You Must Manage It
TODAY’S COMPUTING INFRASTRUCTURE CAN BE TRULY SECURE ONLY IF IT IS WELL
MANAGED. CENTRALIZED MANAGEMENT OF ALL GATEWAYS, SERVERS, AND CLIENTS
WITHIN AN ENVIRONMENT IS ESSENTIAL TO MAINTAINING THE SECURITY AND
AVAILABILITY OF INFORMATION ASSETS.
Information integrity is not only about security,
but also availability. Information that is secure but
not available is virtually worthless. Individuals
and enterprises must manage the balance between
making their systems and information available
and keeping them secure.
To maintain the security and availability of a
computing environment, users need critical
information about that environment.
In the enterprise, administrators must know
which systems are connecting to the network
and whether or not they meet the company’s
security policies. They must know which appli-
cations are deployed throughout the network
and whether or not they have patched critical
new vulnerabilities.They must know that system
and data backup procedures are being per-
formed when required so the environment can
be recovered from an attack or technical failure
if necessary.
Symantec is building scalable infrastructure
management solutions to help administrators
keep their systems up and running. Starting with
provisioning tools, administrators can distribute,
configure, and update systems and applications,
ensuring the network is current and consistent.
With asset management tools, administrators
can discover and track hardware and software
assets to understand where systems are installed
and what’s installed on them. This knowledge
is critical so that systems can be updated as
vulnerabilities are discovered.
Automated backup and recovery tools allow
both individual and enterprise users to quickly
and systematically bring systems online after the
occurrence of potentially disastrous events, such
as an attack, accidental misconfiguration, file
corruption, or installation of faulty software.
Underlying each of these elements are tools that
allow the creation and consistent enforcement
of policies to ensure enterprise-wide security
and business continuity.
Security isn’t simply another aspect of system,
storage, or network managementrather,
management is a critical aspect of maintaining
the security and availability of the infrastructure.