Symantec 2002 Annual Report Download - page 26

Download and view the complete annual report

Please find page 26 of the 2002 Symantec annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 109

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109

monitor systems for patterns of misuse and abuse and can warn organizations before systems are misused or
information is stolen.
Symantec Intruder Alert
TM
is a host-based, real-time intrusion detection system that detects security
breaches and automatically responds according to pre-established security policies. By alerting administrators
of potential problems, it enables enterprises to develop precautionary security policies that prevent hackers or
authorized users with malicious intent from misusing systems, applications, and data.
Symantec NetProwler
TM
complements existing security countermeasures and fortiÑes a company's
e-business initiatives by oÅering dynamic network intrusion detection that transparently examines network
traÇc. It is designed to instantly identify, log, and terminate unauthorized use, misuse and abuse of computer
systems by internal saboteurs and external hackers.
Vulnerability Management
At the gateway and server level, our vulnerability management products Ñnd system vulnerabilities and
help to ensure security policy compliance to proactively reduce business risk. The initial step to reduce
corporate risk is to eÅectively measure compliance to a business security policy and detect vulnerabilities
where critical information resides. It is important to understand the eÅectiveness of a security policy in order
to properly deÑne, manage and enforce business policies and assess possible threats.
Symantec Enterprise Security Manager
TM
gives enterprises the ability to automate the discovery of
security vulnerabilities and deviations of the security policy in mission critical e-business applications and
servers across the enterprise from a single location. Symantec Enterprise Security Manager provides
intelligent tools that allow administrators to create a pre-deÑned security baseline for every system on the
network and measure performance against that baseline.
Symantec NetRecon
TM
provides network vulnerability assessment with progressive scanning technology.
Its root-cause analysis engine illustrates the exact sequence of steps taken to uncover vulnerabilities. Symantec
NetRecon displays vulnerability data as it scans, then provides the appropriate reports so administrators do not
have to search through volumes of data.
Enterprise Administration
Our Enterprise Administration segment oÅers products that enable companies to be more eÅective and
eÇcient within their information technology departments. Remote management solutions help professionals
remain productive while away from the oÇce, while also providing companies access to information,
applications and data from any location.
Symantec pcAnywhere
TM
oÅers secure, reliable, fast and Öexible point-to-point remote computing via a
multitude of communications media including Internet, serial, LAN, ISDN, DSL, cable modems and
infrared. Symantec pcAnywhere enables a remote PC user to control and transfer data to and from a host PC.
In addition, the remote PC, laptop or PC terminal controls the operation of the often-distant host PC and
allows users at the host machine to view the operations being conducted from the remote site.
Symantec Ghost
TM
Corporate Edition is a tool for PC deployment, recovery, cloning and migration. It
reduces information technology costs by streamlining the conÑguration of networked workstations. Adminis-
trators can deploy or restore an operating system image or application onto a PC in minutes and migrate user
settings and proÑles to customize the PC.
Consumer Products
Our Consumer Products segment focuses on delivering our security and problem-solving products to
individual users, home oÇces and small businesses. The segment's charter is to ensure that consumers and
their information are secure and protected in a connected world. Most of the products that we are currently
marketing or developing feature LiveUpdate
TM
. This feature enables users to subscribe to easily downloadable
content updates including virus deÑnitions, Ñrewall rules, URL databases and uninstall scripts. Our consumer
4