Download Print this page

Symantec ALTIRIS SECURITY EXPRESSIONS Datasheet

Advertisement

Quick Links

Data Sheet: Compliance and Security Management
Altiris® SecurityExpressions™
Proactive Security Configuration Management
Overview
One of the leading causes of security breaches and loss
of data is improperly configured systems. Achieving and
maintaining conformity across multiple systems
challenges even the most technically adept and
process-focused organizations. Even more complex is
the ongoing validation that ensures that carefully-tuned
security controls remain unchanged. Symantec solutions
support an organization's security processes through
the implementation of sound security configuration
baselines, proactive evaluation, and comprehensive
reporting.
Benefits
• Establish baseline configurations from best practices
templates, including CIS, NIST, SANS, and others
• Evaluate IT controls against Sarbanes-Oxley, PCI DSS,
HIPAA, FISMA, ISO 27001, and their regulation
requirements
• Rapidly identify systems that deviate from established
baselines
• Quickly remediate issues within ITIL-compliant change
processes
• Assess security status through interactive reporting
• Monitor the entire enterprise with support for
Windows, Linux, and UNIX
Page 1 of 4
Problem Discovery Through Automation
Effective security configuration solutions empower IT
organizations to implement a comprehensive security
practice. As a result, organizations can implement
documented audit and change processes that discover
and correct lapses in standards and procedures.
Discovery of problems is achieved with automated
assessments that provide consistent analysis without
impacting staff productivity, while integrated workflow
processes ensure closed loop verification that standards
are upheld. The ability to continually manage security
configurations from definition, evaluation, remediation
through monitoring is what distinguishes Symantec
solutions from other solutions.
Build Effective Configuration Baselines
The first step to proactive security configuration
management is to define effective baseline policies.
However, developing these baselines can be a
time-consuming, difficult task that requires extensive
expertise in configuration management. Altiris solutions
from Symantec simplify the process with industry best
practices templates that can be implemented directly or
customized to meet your needs. Altiris®
SecurityExpressions™ software also supports
homegrown configuration policies. Both
methodologies accelerate deployment while ensuring
rigorous best practices protection. The resulting policies
can be tailored and published to document
administrative controls.
Confidence in a connected world.

Advertisement

loading

Summary of Contents for Symantec ALTIRIS SECURITY EXPRESSIONS

  • Page 1 • Rapidly identify systems that deviate from established expertise in configuration management. Altiris solutions baselines from Symantec simplify the process with industry best • Quickly remediate issues within ITIL-compliant change practices templates that can be implemented directly or processes customized to meet your needs.
  • Page 2 Altiris® SecurityExpressions™ Quickly Identify Non-compliant Systems Continually Monitor Security Status Symantec solutions allows IT and security personnel to Assessing system security postures requires the ability conduct real-time audits. Altiris technology from to not only evaluate the system, but also the ability to Symantec can accurately and quickly compare the easily visualize the results and assess progress.
  • Page 3 Data Sheet: Compliance and Security Management Altiris® SecurityExpressions™ Detect and Evaluate Mobile Systems Optional Server Requirements Mobile systems are infrequently connected to the local • Memory—512 MB RAM network; as a result they are often missed during routine • Minimum disk space—500 MB audits.
  • Page 4 Confidence in a connected world. Copyright © 2008 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.