DLT partners with Symantec to provide your agency with data protection, cybersecurity, and threat protection software solutions. We work with our customers to help them better correlate all gathered security data and to more efficiently prioritize and focus business efforts. Understand the trends, pinpoint where they may be vulnerable, know when they are being attacked, and determine how to prioritize their remediation efforts. Symantec helps its Federal customers understand and manage the latest threats to better identify, protect, detect, respond to, and recover from advanced attacks. Symantec’s tools and comprehensive solutions makes it easy for government agencies to discover what is in their network and to continuously access and manage their security posture.
Symantec Endpoint Protection SBE brings unrivaled security, blazing performance, and smarter management across both physical and virtual environments. By leveraging the world’s largest global intelligence network, Symantec can proactively identify at-risk files and stop zero-day threats without slowing down your performance. Targeted attacks and Advanced Persistent Threats cannot be stopped by antivirus alone. These distinct threats require layered protection and intelligent security at the endpoint. Symantec Endpoint Protection SBE brings unrivaled security, blazing performance, and smarter management across both physical and virtual environments. By leveraging the world’s largest global intelligence network, Symantec can proactively identify at-risk files and stop zero-day threats without slowing down your performance. Key benefits:
- Available as a cloud-managed service or as an on-premise management application
- Easy setup and web-based management
- Strong core security technologies from a world-leader in security technologies
DATA LOSS PROTECTION (DLP)
Keeping sensitive corporate information safe and compliant has never been easy. But today, you’re faced with a totally new set of data protection challenges. Sensitive information is leaving the safety of your corporate network as more employees share files over consumer cloud storage services and access those files on their own mobile devices. The number of targeted cyber-attacks continues to grow, as cybercriminals develop effective new methods for defeating traditional security measures and stealing corporate information. And as all of these factors converge, it becomes increasingly difficult to manage agency information and protect it against loss and theft. So how do you manage and protect your information in this challenging environment? And what does a complete, successful data protection strategy look like in the face of eroding security perimeters, increasing targeted attacks, and evolving user habits and expectations? Symantec Data Loss Prevention (DLP) answers these questions with a comprehensive approach to information protection that embraces today’s cloud- and mobile-centered realities. Key benefits of DLP:
- Discover where data is stored across all of your cloud, mobile, network, endpoint, and storage systems
- Monitor how data is being used, whether your employees are on or off the network
- Protect data from being leaked or stolen—no matter where it’s stored or how it’s used
DATA CENTER SECURITY
Symantec Data Center Security: Server provides the forward-looking architecture to support our customers’ journey to the Software-defined Data Center (SDDC). Server v6 addresses key challenges in providing anti-virus protection to virtual machines by deploying single-instance threat protection that is immediately adaptive to elasticity and motion, as well as security events. These capabilities are the foundation for Symantec's Data Center Security solutions for virtual environments, and include:
- Virtual Machine protection via agentless threat protection services deployed as security virtual appliances (SVA),
- Security as a Service provisioning via VMware NSX Service Composer, which supports service registration and deployment across the VMware infrastructure,
- Automated service orchestration where Symantec protection and associated security policies dynamically follow server workloads across hosts, virtual networks and security groups,
- Cooperative and extensible security ecosystem workflows that are responsive to security events supported via Service Composer.
By implementing single instance anti-virus security controls from the hypervisor on behalf of every guest virtual machine, Data Center Security: Server provides more predictable resource utilization and greater consolidation rates versus managing anti-virus security in-guest, i.e. AV agent and signature files in each virtual machine. The key benefits include:
- Reduce resource impact associated with file scanning and AV definition file updates (i.e. scan and update storms),
- Reduce security-provisioning time by facilitating deployment from within the VMware vCenter™ console,
- Increase operational effectiveness by providing a single-instance security service per host that protects all virtual machines, and integration with the security ecosystem to further automate security response.
VALIDATION AND ID PROTECTION SERVICE
Sophisticated network attacks have rendered simple password authentication insufficient to protect an organization against unauthorized access to its network and applications. The ramifications of unauthorized access to confidential information are dire: non-compliance, financial penalties, and theft of intellectual property. Symantec™ Validation and ID Protection Service (VIP) is a leading cloud-based strong authentication service that enables enterprises to secure access to networks and applications while preventing access by malicious unauthorized attackers. Key feature include:
- Cloud-based infrastructure—Secure, reliable, and scalable service delivers authentication without requiring dedicated on-premise server hardware.
- Transparent risk-based token-less authentication— Leverage device and behavior profiling to block risky logon attempts without changing the legitimate user's logon experience
- Multiple two-factor credential options—Deploy one-time password credentials in a variety of hardware, software, or mobile form factors
- Free mobile and desktop device credentials—Support for over 900 Android™, iOS®, Blackberry™, Windows® Phone, or J2ME™ or BREW devices
- Out-of-band support—Authenticate users via SMS text messages. voice phone calls, or email
- Self-service credential provisioning—Deploy strong authentication to end users without requiring IT helpdesk or administrator configuration or intervention
- Enterprise infrastructure support—Integrates with popular enterprise VPNs, webmail, SSO applications, and corporate directories
- Web-based application integration—Add strong authentication using the VIP web services API in your preferred programming language Future-proof - easy delivery of new capabilities, in additional to integration with Symantec™ Global Intelligence Network, Symantec™ Endpoint Protection, Norton™, and Intel® Identity Protection Technology (IPT)- enabled computers; allowing you to stay ahead of emerging threats.
Symantec Endpoint Encryption, provides organizations with strong full-disk and removable media encryption and the ability to integrate with Symantec Data Loss Prevention. Intuitive management enables enterprise scale deployments and features compliance-based, out-of-the-box reporting plus customizable reports. Management capabilities include support for native OS encryption (FileVault2) and Opal compliant self-encrypting drives. With this transparent drive encryption for laptops, desktops and removable media, users are able to:
- Encrypt data against unauthorized access
- Secure sensitive information
- Centralize management and simplifies deployments
Symantec Asset Management Suite
Symantec Asset Management Suite enables organizations to take control, uncover savings, and ensure compliance of IT assets. With an accurate picture of assets throughout their lifecycle, IT can optimize investments, eliminate the purchase of unnecessary software, and avoid penalties and fines due to non-compliance.
Asset Management Suite discovers, inventories, and tracks all the hardware and software assets in your IT infrastructure through a CMDB. The CMDB manages assets’ hierarchical relationships to other configuration items, users, locations, departments, cost centers, and associated contracts. This information gives you credible information on the location and license status of every important OS, virtualization platform, or application instance. With this detailed, up-to-date information, your team can quickly identify problems, apply solutions, and document compliance.
Exponentially growing threats, complex government IT environments, and proliferation of endpoints all make it difficult for government organizations to control and secure information. Symantec works with its Federal customers to create a comprehensive and resilient cybersecurity strategy – with full visibility from the cloud to the network edge to the endpoints – to secure information and the infrastructure in which it lives. Our cybersecurity solutions provide needed reinforcements by extending your team with our cyber experts. We follow hundreds of thousands of adversaries a day and correlate our global threat intelligence with your own environment to prioritize and alert you when critical events need action. We keep your security operations and executives informed of threats before an attack so countermeasures can be implemented; reduce operational and response costs; and prepare your teams to combat the latest attacker tools, techniques, and procedures.
Even as individuals and organizations realize the potential agility and cost savings benefits of cloud computing, concerns about security and availability of clouds persist. Gain confidence in your cloud with protection from the world’s leader in security and availability. Whether you want to consume services directly, build your own cloud for internal operations or external reach, or extend into third-party clouds safely and efficiently, Symantec delivers the path to a protected cloud. Symantec’s cloud email security service filters unwanted messages and protects your mailboxes from targeted attacks. The service has self-learning capabilities and Symantec intelligence to deliver highly effective and accurate email security. Encryption and data loss prevention help you control sensitive data. Supports Microsoft Office 365, Google Apps, on premises or hosted Microsoft Exchange, and other mailbox services.
Advanced Threat Protection
Attackers are exploiting vulnerabilities more rapidly than companies can defend against them. Today’s hackers build evasive malware to infiltrate networks and servers, and then hijack a company’s own infrastructure to infect more machines. They use stolen email accounts from one corporate victim to spear-phish the next corporate victim. And they have the resources and skill to carry out their attack campaigns over a period of months—or even years. Symantec gives you comprehensive protection to help protect against the most complex cyber threats across your endpoints, email, and data center with precision, by leveraging one of the largest civilian source security intelligence networks in the world, the Symantec Global Intelligence Network (GIN). The Symantec Global Intelligence Network is made up of more than 57.6 million attack sensors; monitors threat activity in over 157 countries and territories; and records thousands of events per second.
Symantec Cyber Security Services provides needed reinforcements by extending your team with our cyber experts. Backed by over 500 security professionals around the world, Cyber Security Services provide 24x7x365 global threat monitoring and analysis; real-time adversary and threat intelligence; and incident response so you can quickly detect, assess, and respond to advanced threats. We follow hundreds of thousands of adversaries a day and correlate our global threat intelligence with your own environment to prioritize and alert you when critical events need action. We keep your security operations and executives informed of threats before an attack so countermeasures can be implemented; reduce operational and response costs; and prepare your teams to combat the latest attacker tools, techniques, and procedures.
Symantec gives IT organizations tools that enable deep visibility and the ability to control how individual users access data, with our Validation and ID Protection (VIP) single sign-on solutions. Symantec can help your organization connect identity as the control point to seamlessly set policies and define how data moves. Our real-time analytics technologies, with our Global Intelligence Network (GIN), increase your ability to identify risk by recognizing unusual behavior during authentication. We believe that data, identity, encryption, and authentication policies must come together to seamlessly set compliance policies and ensure protection of critical data.
DLT’s systems engineering expertise cover the information technology lifecycle. They move projects from concept to planning to development, implementation, and support. Our approach to systems engineering centers on understanding and defining customer needs and utilizing structured methodologies to provide efficient and successful results. Our team looks for ways to optimize existing infrastructures, find new efficiencies, and maximize return on investment for your agency. Our data management engineers and solutions architects develop and deliver Symantec product systems. With this DLT/Symantec partnership, we have been able to serve over 500+ satisfied customers with their service requests. Our systems engineers are experts in:
- Architectural Assessments
- Implementations and Migrations
- Staff Augmentation
- Education and Training
- Project Management
|Contract Name||Contract Number||Sector||State|
|Federal Deposit Insurance Corp. Symantec & Veritas IDIQ||CORHQ-15-G-0757||Federal|
|GSA IT Schedule 70||GS-35F-267DA||Federal, State|
|National Cooperative Purchasing Alliance (NCPA) - Systems and Information Management Software||01-74 / 01-81 / 01-87||State||Texas|
|SEWP V||Group A: NNG15SC07B; Group D: NNG15SC98B||Federal|
|State of California Multiple Award Schedule (CMAS)||3-16-70-1047B||State||California|
|State of Maryland Multi-Vendor COTS IDIQ||06B02490021||State||Maryland|
|State of Ohio Multi-Vendor IDIQ||534042||State||Ohio|
|State of Texas DIR Multi-Vendor Software IDIQ||DIR-TSO-3400||State||Texas|