Tactical Advice

End Your Crippling Support Nightmare

Counter security threats with solid endpoint security.
This story appears in the March 2009 issue of BizTech Magazine.

 


For purchase information,
click here »

In the good old days, IT departments could easily point to a malevolent e-mail attachment or macro as the delivery mechanism for malware.

Today, end-user interaction isn’t required to wreak havoc on unsuspecting clients. Malware can jump from machine to machine in seconds, creating botnets that scour the Internet for open ports in order to infiltrate and infect new computers.

To combat such autonomous threats, a multitiered security tool is an absolute necessity. Symantec’s Endpoint Protection 11.0 strikes a balance between threat-bashing functionality and manageability.

End-User Advantages

Disaster recovery is a top priority for most IT departments. Similar concern should apply to disaster prevention. Symantec goes the distance, including antispyware, intrusion prevention and device and application control, along with antivirus and firewall protection. Endpoint Protection is also Network Access Control–ready, helping you make the most of the built-in security on Vista clients. The net result is effective layered protection in a single program.

Why It Works for IT

Endpoint Protection’s improved interface fuses its management tools into one intuitive console, giving help-desk staff a one-stop shop for verifying system integrity. Its Management Server offers both simple and advanced setup options. Using simple setup, you can configure a server in a few mouse clicks. To manage more than 100 clients, the advanced option lets you configure either embedded databases, which will support up to 5,000 clients, or SQL databases, which will support well beyond that mark.

A migration and deployment tool lets administrators upgrade existing Symantec Antivirus or Client Security clients and perform a clean install on machines that don’t carry earlier versions of the software. Because help-desk staff do not have to touch every machine, deployment is exponentially faster. And you won’t have to disrupt end users to upgrade their security.

In our test environment, the Symantec Management Server was very stable and did not appear to be taxed. The test clients had no trouble updating from the server, and notebooks stayed up to date, even though they were not always connected to the network. Such proven performance is critical, especially in enterprise environments in which trust (or the lack of it) can yield hundreds of successes (or failures) at a time.

Disadvantages

One drawback to this product is overhead: Symantec Endpoint Protection 11.0 runs three processes on client machines, each of which uses 20 megabytes of RAM at idle. That 60MB may not seem like a lot, but it could place a burden on slower computers.

Finally, no matter how good your security software is, it’s not going to catch everything. No product is a panacea for all malware-related threats.

Jason Holbert is a Tier II desktop support technician at Harcros Chemicals, a chemical distributor in Kansas City, Kan.

Sign up for our e-newsletter

Security

Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...
Tools to Maintain Mobile Sec... |
Far-flung devices pose serious challenges, but a variety of technologies can help protect...
Edward Snowden Personifies t... |
The NSA leak shows critical areas where organizations can better protect their data.

Storage

The New Backup Utility Proce... |
Just getting used to the Windows 8 workflow? Prepare for a change.
How to Perform Traditional W... |
With previous versions going unused, Microsoft radically reimagined the backup utility in...
5 Easy Ways to Build a Bette... |
While large enterprises have the resources of an entire IT department behind them, these...

Infrastructure Optimization

The Value of Converged Infra... |
Improvements in security, management and efficiency are just a few of the benefits CI can...
Curse Builds a Private Cloud... |
One of the top resources in online gaming builds out a robust infrastructure that can...
SDN at the Forefront of HP’s... |
Computing giant kicks off Interop 2014 with a series of announcements aimed at turning...

Networking

Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...
How to Maximize WAN Bandwidt... |
Understand six common problems that plague wide area networks — and how to address them.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Mobile & Wireless

Now that Office for iPad Is... |
After waiting awhile for Microsoft’s productivity suite to arrive, professionals who use...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Hardware & Software

Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.
The Tools That Power Busines... |
Ever-evolving analytic software can greatly improve financial institutions’ decision-...
XP-iration Date: Today Is th... |
It’s officially lights out for Windows XP as an operating system. Here’s how the world is...