Symantec™ Consulting Services

GET MORE FROM YOUR SECURITY SOLUTIONS
Symantec™ Consulting Services
©2015 Symantec Corporation. All rights reserved.
Access outstanding talent and expertise with
Symantec Consulting Services
Symantec’s Security Consultants have an average of 15 years’ experience in implementing and
managing Symantec Solutions in large, complex environments. Symantec Consultants possess
industry standard certification in security (CISSP, GCIH, Security+) and IT methodology
(ITIL, COBIT), bringing together formal knowledge and best practices to ensure successful
engagements and maximize the return on your security investments.
Symantec Consulting delivers:
• Expert consultants with advanced product knowledge and vast
industry experience
• A proven framework and approach based on best practices derived from direct
enablement experience and customer feedback
Take advantage of services
in Threat Protection and
Information Protection
Advisory Services
Design Services
Implementation Services
Optimization Services
Residency Services
• In-depth training and real-world expertise to enhance customer experience and success
• Broad experience with customers from small businesses to
FORTUNE 500 companies
©2015 Symantec Corporation. All rights reserved.
2
SYMANTEC CONSULTING
THREAT PROTECTION – Data Center
PROTECT YOUR DATA CENTER BY HARDENING
YOUR ENVIRONMENT AND ADDRESSING IT RISK
AND COMPLIANCE CHALLENGES.
Designing and implementing a properly scaled infrastructure to support
your business needs is imperative to protecting your critical systems both
inside and outside of your data center. Creating and tuning of policies to
monitor, log, and block system activity as appropriate for your business
needs requires in-depth knowledge of how operating system components,
network communications and third-party software interact. Symantec
Consultants design, implement, optimize and manage your Symantec™
Data Center Security: Server and Symantec™ Data Center Security
Server Advanced environments using Symantec best practices.
Through the modules of Symantec™ Control Compliance Suite, Symantec
Consultants can help you communicate IT risk in business-relevant terms,
prioritize remediation efforts based on a composite view of risk, and
automate assessment processes to improve overall security and compliance
posture. With carefully considered design, implementation, maintenance
and optimization of the tool and content, Symantec Consulting
can help your organization to assess compliance against
internal and external controls leveraging common industry
standards as well as customized requirements.
Symantec Consultants implement Symantec™ Protection
Engine, a carrier-class content and URL scanning engine
that protects both Network Attached Storage and Cloud
Services. Properly deployed, Symantec Protection Engine
provides content scanning and URL filtering capabilities to any
application on an IP network, thus protecting your data and
storage systems against the ever-growing malware
threat landscape.
©2015 Symantec Corporation. All rights reserved.
3
SYMANTEC CONSULTING
THREAT PROTECTION – Endpoint Protection
SYMANTEC CONSULTANTS FINE TUNE A SUITE OF
POWERFUL TOOLS TO CREATE A SOLUTION THAT FITS
YOUR ENDPOINT PROTECTION NEEDS.
SYMANTEC™ ENDPOINT PROTECTION – Whether installing,
upgrading or migrating, Consultants secure your endpoints
from malware and other threats, providing protection to
enhance gateway and LAN-based security solutions, and
enabling centralized endpoint administration.
SYMANTEC™ ADVANCED THREAT PROTECTION – Our
Consultants will effectively design and implement our
Symantec™ Advanced Threat Protection solutions to gain
visibility and manage risks to your organization. Leveraging
one or more of the three ATP solutions, our consultants can
add e-mail, network, or endpoint ATP to your risk strategy.
SYMANTEC™ IT MANAGEMENT SUITE – Building on the value of
the suite, including the Symantec™ Service Desk, Symantec™
Workplace Virtualization and Symantec™ Workflow,
Symantec Consultants provide services designed to reduce
the cost of managing endpoints throughout the IT lifecycle by
automating and simplifying business and security processes.
SYMANTEC MAIL AND WEB GATEWAY PRODUCTS – Our
Consultants design, implement and tune the gateway products
to provide accurate real-time anti-spam and anti-malware
protection, targeted attack protection, advanced content
filtering, data loss prevention, email encryption and protection
from web-borne malware. Deployments occur as either a
virtual appliance or on physical hardware.
©2015 Symantec Corporation. All rights reserved.
4
SYMANTEC CONSULTING
INFORMATION PROTECTION – Data Loss Prevention
LOCATE, MONITOR AND PROTECT YOUR DATA.
The DLP Consulting Services Team includes a mix of resource
types that align with the problems you are trying to solve.
• DLP Technical Architects provide strategic planning and
deployment of large scale implementations as well as
upgrade and customization services
• DLP Program Architects bridge the gap between
successful technical implementations and end-to-end
business process integration
Throughout the process, our consultants will design and
implement a mature DLP program which will:
Deployed by over half of the Fortune 100 companies Symantec™ Data
Loss Prevention (DLP) discovers where data is stored across your cloud,
mobile, and on-premises environments, as well as monitors how it is being
used on and off your corporate network.
• Utilize Symantec best practices to understand your
With a proven implementation methodology that integrates people and
process with technology, our DLP Consultants install, upgrade, optimize
and provide strategic support to deliver sustainable and effective solutions
for enterprise risk reduction.
• Be scalable and operationally efficient and effective
organization’s unique business challenges and help you
achieve your security goals
• Reduce your overall risk profile
• Help improve security awareness and remediate “broken
business processes”
©2015 Symantec Corporation. All rights reserved.
5
SYMANTEC CONSULTING
INFORMATION PROTECTION – Authentication and Encryption
EFFECTIVE IMPLEMENTATION ENSURES THAT THE RIGHT PEOPLE ACCESS
THE RIGHT DATA.
Expert implementation of our solutions can:
• Reduce cost and complexity
• Simplify administration and end-user experience
• Facilitate tighter integration with business partners
• Protect data on managed and unmanaged devices
• Ensure business continuity
• Maintain compliance with government and
corporate regulations
Symantec gives IT organizations tools that enable deep visibility and the
ability to control how individual users access data, with our authentication
and encryption solutions.
Whether you are implementing Symantec™ Managed PKI (MPKI) Service
or Symantec™ Validation and ID Protection (VIP) Service or need
assistance with migrating third party tokens or web services integration,
our Consultants can provide the expertise your company and security
team needs.
Because Symantec’s Encryption portfolio includes endpoint,
file, folder, and email encryption, it can integrate with Data
Loss Prevention to automatically encrypt sensitive data being
moved onto removable media devices or residing in emails
and files. Robust management features include individual and
group key management, automated policy controls, and out-ofthe-box compliance-based reporting.
Symantec’s Consulting Services will help ensure you get
the right solution installed and operational as quickly and
efficiently as possible.
©2015 Symantec Corporation. All rights reserved.
6
Get more from your Symantec solutions
with Symantec Consulting Services.
Advisory
Services
Design
Services
INCREASE PROTECTION
Implementation
Services
MINIMIZE RISK
Optimization
Services
Residency
Services
IDENTIFY THREATS
TO LEARN MORE, EMAIL:
Americas email: ask_consulting@symantec.com
APJ email: ask_consulting_asiapacificjapan@symantec.com
EMEA email: ask_consulting_emea@symantec.com
©2015 Symantec Corporation. All rights reserved.
7