SlideShare ist ein Scribd-Unternehmen logo
1 von 1
DO NOTHING:
Systems will still run, partner and user
communities will help, but systems will be
open to a significant security threat
HARDWARE REPLACEMENT:
Upgrade out of maintenance physical servers
CUSTOM SUPPORT:
For-fee custom support can be costly and time-consuming
VIRTUALIZATION/CLOUD:
To achieve cost, complexity and
management benefits
PROTECTION:
Use a 3rd party product to secure servers and data, removing the time-critical need to upgrade
THE REALISATION NOW IS THAT
AFTER 14 JULY 2015 MISSION AND BUSINESS
CRITICAL APPLICATIONS ARE AT RISK
Migration carries significant challenge on
resources and information protection
Expensive custom contracts to maintain
unsupported platforms and applications
NO Technical support NO Incident support
NO Security patches NO Product hot fixes
MICROSOFT WINDOWS 2003 SERVER MIGRATION
ARE YOU READY?
?? ?
THE QUESTION IS, HOW WILL YOU MANAGE YOUR COSTS
AND MITIGATE THE RISKS?
WHAT DOES THIS MEAN
FOR MY BUSINESS
JULY
2015
14 =
STANDARDISATION
THE SUPPORT OF BYOD
MOBILITY
PRIVATE, HYBRID AND PUBLIC CLOUD
BUSINESSES ARE DRIVING FOR...
RISK
COST
Regulated industries may be fined or risk being
cut off from key trading partners who want to
protect their own compliance status
Increased vulnerability to cyber attacks and
data breach
SECURITY
COMPLIANCE
?? ?WHAT SHOULD I DO
WITH THE CHANGE IN THE
TECHNOLOGY LANDSCAPE
THE PRESSURES ON IT HAVE
BECOME MORE DEMANDING!
MICROSOFT’S EXTENDED SUPPORT OF WINDOWS 2003 SERVER ENDS IN JULY 2015. Posing potential
problems for some 10M instances of Windows that exist and the business critical systems that depend on it.
Although this doesn’t mean everything will stop working, it does mean that systems are open to potential security
risks and not conforming to regulatory compliance demands.
JULY
2015
14
2015
WHAT ARE MY
OPTIONS?
PROTECT AND
SECURE
INCREASE
APPLICATION
AVAILABILITY
MITIGATE
TRANSFORMATIONAL
RISK
DATA IS #1 PRIORITY
GUARANTEE VISIBILITY
ACROSS NEW AND
EXISTING PLATFORMS
LOWER THE SUPPORT
AND OPERATIONAL
COSTS
SYMANTEC PROTECT MORE
SYSTEMS IN THE SECURITY
SOFTWARE SPACE
THAN ANY OTHER
COMPANY
SYMANTEC BACK-UP OVER
50%
OF THE WORLDS
INFORMATION
SYMANTEC PROTECT
200 MILLION
END POINT DEVICES
THE SYMANTEC GLOBAL
INTELLIGENCE NETWORK
PROVIDES THE VERY BEST IN
SECURITY UPDATES, INSIGHT
AND GUIDANCE
CRITICAL SYSTEMS ARE SO IMPORTANT THAT YOU CANNOT
AFFORD DOWNTIME OR PERFORMANCE ISSUES. The clock is
ticking to migrate from Windows Server 2003 but it is still a key platform
that underpins your many business critical services.
DEVELOP A STRATEGY for mitigating the risk of
vulnerability, while establishing a plan for migration
DISCOVER:
Understand what applications
and workloads are being
supported
ASSESS:
Create inventory categorised
by type, importance and
complexity
TARGET:
Choose an outcome for
each application
MAP:
Match the inventory against
business risk/criticality
4.6 BILLION
CONNECTED THINGS
GIN
WHY SYMANTEC?
www.symantec.co.ukCopyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks
of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 01/15.
FIND OUT MORE
Symantec can offer a unique alternative that will extend the life of your Windows 2003
systems that is cost effective and increases your security profile.
PLATFORM LAUNCH
First camera phone
iTunes
Xbox Live/online gaming
2003
Google Apps
20102006
Amazon web
services
A
2004
Facebook Google Glass
20132007
iPhone iPad
2009
SINCE THE LAUNCH OF WINDOWS 2003 TECHNOLOGY HAS ADVANCED
REGISTER for the webinar to find out how, visit know.symantec.com/WindowsServer2003

Weitere ähnliche Inhalte

Was ist angesagt?

Securing Your Network
Securing Your NetworkSecuring Your Network
Securing Your NetworkePlus
 
Thinking of choosing Sophos?
Thinking of choosing Sophos?Thinking of choosing Sophos?
Thinking of choosing Sophos?Symantec
 
I.T. Geeks Can't Talk to Management
I.T. Geeks Can't Talk to ManagementI.T. Geeks Can't Talk to Management
I.T. Geeks Can't Talk to ManagementTripwire
 
Dedicated Servers Cheap
Dedicated Servers CheapDedicated Servers Cheap
Dedicated Servers CheapMedha Hosting
 
Broadening Your Cybersecurity Mindset
Broadening Your Cybersecurity MindsetBroadening Your Cybersecurity Mindset
Broadening Your Cybersecurity MindsetCSI Solutions
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operationsPiyush Jain
 
Tripwire enterprise 87_datasheet
Tripwire enterprise 87_datasheetTripwire enterprise 87_datasheet
Tripwire enterprise 87_datasheetDevaraj Sl
 
Addressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeAddressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeePlus
 
Vidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solutionVidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solutionVidSys, Inc.
 
Physical Security Information Management Solution for the Enterprise
Physical Security Information Management Solution for the EnterprisePhysical Security Information Management Solution for the Enterprise
Physical Security Information Management Solution for the EnterpriseVidSys, Inc.
 
Endpoint and mobile security
Endpoint and mobile securityEndpoint and mobile security
Endpoint and mobile securityKen Van Hasselt
 
Open Source and Security: Engineering Security by Design - Prague, December 2011
Open Source and Security: Engineering Security by Design - Prague, December 2011Open Source and Security: Engineering Security by Design - Prague, December 2011
Open Source and Security: Engineering Security by Design - Prague, December 2011Jeremy Brown
 
collateral_datasheet_sungard
collateral_datasheet_sungardcollateral_datasheet_sungard
collateral_datasheet_sungardCheryl Goldberg
 
Qualys Brochure for CISOs
Qualys Brochure for CISOsQualys Brochure for CISOs
Qualys Brochure for CISOsQualys
 
Level Up to a Seamless End-User Experience
Level Up to a Seamless End-User ExperienceLevel Up to a Seamless End-User Experience
Level Up to a Seamless End-User ExperienceVMware
 
[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and Endpoints[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and EndpointsSymantec
 
Voyss Cloud-Based Managed Services Webinar 9-14-12
 Voyss Cloud-Based Managed Services Webinar 9-14-12 Voyss Cloud-Based Managed Services Webinar 9-14-12
Voyss Cloud-Based Managed Services Webinar 9-14-12mjamesvoyss
 
Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.Ignyte Assurance Platform
 

Was ist angesagt? (20)

Securing Your Network
Securing Your NetworkSecuring Your Network
Securing Your Network
 
Thinking of choosing Sophos?
Thinking of choosing Sophos?Thinking of choosing Sophos?
Thinking of choosing Sophos?
 
I.T. Geeks Can't Talk to Management
I.T. Geeks Can't Talk to ManagementI.T. Geeks Can't Talk to Management
I.T. Geeks Can't Talk to Management
 
SanerNow platform-datasheet
SanerNow platform-datasheetSanerNow platform-datasheet
SanerNow platform-datasheet
 
Dedicated Servers Cheap
Dedicated Servers CheapDedicated Servers Cheap
Dedicated Servers Cheap
 
Broadening Your Cybersecurity Mindset
Broadening Your Cybersecurity MindsetBroadening Your Cybersecurity Mindset
Broadening Your Cybersecurity Mindset
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
 
Tripwire enterprise 87_datasheet
Tripwire enterprise 87_datasheetTripwire enterprise 87_datasheet
Tripwire enterprise 87_datasheet
 
Addressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeAddressing the Cyber-Security Landscape
Addressing the Cyber-Security Landscape
 
Vidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solutionVidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solution
 
Physical Security Information Management Solution for the Enterprise
Physical Security Information Management Solution for the EnterprisePhysical Security Information Management Solution for the Enterprise
Physical Security Information Management Solution for the Enterprise
 
Endpoint and mobile security
Endpoint and mobile securityEndpoint and mobile security
Endpoint and mobile security
 
Open Source and Security: Engineering Security by Design - Prague, December 2011
Open Source and Security: Engineering Security by Design - Prague, December 2011Open Source and Security: Engineering Security by Design - Prague, December 2011
Open Source and Security: Engineering Security by Design - Prague, December 2011
 
collateral_datasheet_sungard
collateral_datasheet_sungardcollateral_datasheet_sungard
collateral_datasheet_sungard
 
Qualys Brochure for CISOs
Qualys Brochure for CISOsQualys Brochure for CISOs
Qualys Brochure for CISOs
 
Level Up to a Seamless End-User Experience
Level Up to a Seamless End-User ExperienceLevel Up to a Seamless End-User Experience
Level Up to a Seamless End-User Experience
 
[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and Endpoints[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and Endpoints
 
Voyss Cloud-Based Managed Services Webinar 9-14-12
 Voyss Cloud-Based Managed Services Webinar 9-14-12 Voyss Cloud-Based Managed Services Webinar 9-14-12
Voyss Cloud-Based Managed Services Webinar 9-14-12
 
CyberObserver
CyberObserverCyberObserver
CyberObserver
 
Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.
 

Andere mochten auch

Garrick Programme Dec 2016
Garrick Programme Dec 2016Garrick Programme Dec 2016
Garrick Programme Dec 2016BHD Creative Ltd
 
Berwick partners practice covers
Berwick partners practice coversBerwick partners practice covers
Berwick partners practice coversBHD Creative Ltd
 
Wolverhampton Grand Season Programme 16/17
Wolverhampton Grand Season Programme 16/17Wolverhampton Grand Season Programme 16/17
Wolverhampton Grand Season Programme 16/17BHD Creative Ltd
 
Arch i programme 01-17 issue 5
Arch i programme 01-17 issue 5Arch i programme 01-17 issue 5
Arch i programme 01-17 issue 5CosminCH
 
Sudut patriotik
Sudut patriotikSudut patriotik
Sudut patriotikwas_4411
 
Arch i programme 02-17 issue 3
Arch i programme 02-17 issue 3Arch i programme 02-17 issue 3
Arch i programme 02-17 issue 3CosminCH
 
GPS Protecta Line 2016_cpd
GPS Protecta Line 2016_cpdGPS Protecta Line 2016_cpd
GPS Protecta Line 2016_cpdBHD Creative Ltd
 
Menu rancangan makanan tambahan
Menu rancangan makanan tambahanMenu rancangan makanan tambahan
Menu rancangan makanan tambahanwas_4411
 
BHD Creative ENGAGE: Public Consultation Services
BHD Creative ENGAGE: Public Consultation ServicesBHD Creative ENGAGE: Public Consultation Services
BHD Creative ENGAGE: Public Consultation ServicesBHD Creative Ltd
 
Agility works big companies ebook web
Agility works big companies ebook webAgility works big companies ebook web
Agility works big companies ebook webBHD Creative Ltd
 
Alutec Durable Eaves Solutions CPD 2016
Alutec Durable Eaves Solutions CPD 2016Alutec Durable Eaves Solutions CPD 2016
Alutec Durable Eaves Solutions CPD 2016BHD Creative Ltd
 
Lichfield Garrick Season Brochure Sept 2016
Lichfield Garrick Season Brochure Sept 2016Lichfield Garrick Season Brochure Sept 2016
Lichfield Garrick Season Brochure Sept 2016BHD Creative Ltd
 
Veritas velocity infographic_reduce costs
Veritas velocity infographic_reduce costsVeritas velocity infographic_reduce costs
Veritas velocity infographic_reduce costsBHD Creative Ltd
 
Đề tài thực tập - chương trình quản lý in ấn
Đề tài thực tập - chương trình quản lý in ấnĐề tài thực tập - chương trình quản lý in ấn
Đề tài thực tập - chương trình quản lý in ấntam tran
 

Andere mochten auch (18)

Garrick Programme Dec 2016
Garrick Programme Dec 2016Garrick Programme Dec 2016
Garrick Programme Dec 2016
 
Berwick partners practice covers
Berwick partners practice coversBerwick partners practice covers
Berwick partners practice covers
 
Sixteen25 leaflet final
Sixteen25 leaflet finalSixteen25 leaflet final
Sixteen25 leaflet final
 
Blob tweet il manifesto
Blob tweet   il manifestoBlob tweet   il manifesto
Blob tweet il manifesto
 
Wolverhampton Grand Season Programme 16/17
Wolverhampton Grand Season Programme 16/17Wolverhampton Grand Season Programme 16/17
Wolverhampton Grand Season Programme 16/17
 
Social Media
Social MediaSocial Media
Social Media
 
Arch i programme 01-17 issue 5
Arch i programme 01-17 issue 5Arch i programme 01-17 issue 5
Arch i programme 01-17 issue 5
 
Sudut patriotik
Sudut patriotikSudut patriotik
Sudut patriotik
 
Arch i programme 02-17 issue 3
Arch i programme 02-17 issue 3Arch i programme 02-17 issue 3
Arch i programme 02-17 issue 3
 
La vocale di Babbo Natale
La vocale di Babbo NataleLa vocale di Babbo Natale
La vocale di Babbo Natale
 
GPS Protecta Line 2016_cpd
GPS Protecta Line 2016_cpdGPS Protecta Line 2016_cpd
GPS Protecta Line 2016_cpd
 
Menu rancangan makanan tambahan
Menu rancangan makanan tambahanMenu rancangan makanan tambahan
Menu rancangan makanan tambahan
 
BHD Creative ENGAGE: Public Consultation Services
BHD Creative ENGAGE: Public Consultation ServicesBHD Creative ENGAGE: Public Consultation Services
BHD Creative ENGAGE: Public Consultation Services
 
Agility works big companies ebook web
Agility works big companies ebook webAgility works big companies ebook web
Agility works big companies ebook web
 
Alutec Durable Eaves Solutions CPD 2016
Alutec Durable Eaves Solutions CPD 2016Alutec Durable Eaves Solutions CPD 2016
Alutec Durable Eaves Solutions CPD 2016
 
Lichfield Garrick Season Brochure Sept 2016
Lichfield Garrick Season Brochure Sept 2016Lichfield Garrick Season Brochure Sept 2016
Lichfield Garrick Season Brochure Sept 2016
 
Veritas velocity infographic_reduce costs
Veritas velocity infographic_reduce costsVeritas velocity infographic_reduce costs
Veritas velocity infographic_reduce costs
 
Đề tài thực tập - chương trình quản lý in ấn
Đề tài thực tập - chương trình quản lý in ấnĐề tài thực tập - chương trình quản lý in ấn
Đề tài thực tập - chương trình quản lý in ấn
 

Ähnlich wie Symantec Migration infographic

How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesSymantec
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the MassesIRJET Journal
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2jeffirby
 
Cybersecurity Presentation at WVONGA spring meeting 2018
Cybersecurity Presentation at WVONGA spring meeting 2018Cybersecurity Presentation at WVONGA spring meeting 2018
Cybersecurity Presentation at WVONGA spring meeting 2018Jack Shaffer
 
2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital SecurityShawn Wells
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!Dell EMC World
 
V mware business trend brief - crash insurance - protect your business with...
V mware   business trend brief - crash insurance - protect your business with...V mware   business trend brief - crash insurance - protect your business with...
V mware business trend brief - crash insurance - protect your business with...VMware_EMEA
 
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...Symantec
 
Iaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd Iaetsd
 
Panda Security Corporate Presentation
Panda Security Corporate PresentationPanda Security Corporate Presentation
Panda Security Corporate PresentationPanda Security
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterVMUG IT
 
Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360Panda Security
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksSkycure
 
V mware quick start guide to disaster recovery
V mware   quick start guide to disaster recoveryV mware   quick start guide to disaster recovery
V mware quick start guide to disaster recoveryVMware_EMEA
 
Vmware’s move to a digital workspace
Vmware’s move to a digital workspaceVmware’s move to a digital workspace
Vmware’s move to a digital workspacesporta72
 

Ähnlich wie Symantec Migration infographic (20)

How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
 
Cybersecurity Presentation at WVONGA spring meeting 2018
Cybersecurity Presentation at WVONGA spring meeting 2018Cybersecurity Presentation at WVONGA spring meeting 2018
Cybersecurity Presentation at WVONGA spring meeting 2018
 
2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
V mware business trend brief - crash insurance - protect your business with...
V mware   business trend brief - crash insurance - protect your business with...V mware   business trend brief - crash insurance - protect your business with...
V mware business trend brief - crash insurance - protect your business with...
 
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
 
Iaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems using
 
Panda Security Corporate Presentation
Panda Security Corporate PresentationPanda Security Corporate Presentation
Panda Security Corporate Presentation
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
 
Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber Attacks
 
Cyberlink Deck
Cyberlink DeckCyberlink Deck
Cyberlink Deck
 
V mware quick start guide to disaster recovery
V mware   quick start guide to disaster recoveryV mware   quick start guide to disaster recovery
V mware quick start guide to disaster recovery
 
Vmware’s move to a digital workspace
Vmware’s move to a digital workspaceVmware’s move to a digital workspace
Vmware’s move to a digital workspace
 
MultiValue Security
MultiValue SecurityMultiValue Security
MultiValue Security
 

Mehr von BHD Creative Ltd

Sample GPS Application Guide Gas
Sample GPS Application Guide Gas Sample GPS Application Guide Gas
Sample GPS Application Guide Gas BHD Creative Ltd
 
Wolverhampton Grand A0 Panto Boards
Wolverhampton Grand A0 Panto BoardsWolverhampton Grand A0 Panto Boards
Wolverhampton Grand A0 Panto BoardsBHD Creative Ltd
 
BE15 infographic transform
BE15 infographic transformBE15 infographic transform
BE15 infographic transformBHD Creative Ltd
 
Durapipe CPD Industrial Services Presentation
Durapipe CPD Industrial Services PresentationDurapipe CPD Industrial Services Presentation
Durapipe CPD Industrial Services PresentationBHD Creative Ltd
 
GPS : NELLY : internal launch
GPS : NELLY : internal launchGPS : NELLY : internal launch
GPS : NELLY : internal launchBHD Creative Ltd
 
Lichfield Garrick 'Visitors Guide' advert
Lichfield Garrick 'Visitors Guide' advertLichfield Garrick 'Visitors Guide' advert
Lichfield Garrick 'Visitors Guide' advertBHD Creative Ltd
 
Lichfield Garrick Sleeping Beauty 2016
Lichfield Garrick Sleeping Beauty 2016Lichfield Garrick Sleeping Beauty 2016
Lichfield Garrick Sleeping Beauty 2016BHD Creative Ltd
 
Lichfield Garrick Theatre Jack and the Beanstalk Christmas 2015
Lichfield Garrick Theatre Jack and the Beanstalk Christmas 2015Lichfield Garrick Theatre Jack and the Beanstalk Christmas 2015
Lichfield Garrick Theatre Jack and the Beanstalk Christmas 2015BHD Creative Ltd
 
Lichfield Garrick : Hired Man
Lichfield Garrick : Hired Man Lichfield Garrick : Hired Man
Lichfield Garrick : Hired Man BHD Creative Ltd
 
Creative Learning Brochure 12pp_oct16
Creative Learning Brochure 12pp_oct16Creative Learning Brochure 12pp_oct16
Creative Learning Brochure 12pp_oct16BHD Creative Ltd
 

Mehr von BHD Creative Ltd (14)

Evcloud infographic
Evcloud infographicEvcloud infographic
Evcloud infographic
 
Sample GPS Application Guide Gas
Sample GPS Application Guide Gas Sample GPS Application Guide Gas
Sample GPS Application Guide Gas
 
Wolverhampton Grand A0 Panto Boards
Wolverhampton Grand A0 Panto BoardsWolverhampton Grand A0 Panto Boards
Wolverhampton Grand A0 Panto Boards
 
BE15 infographic transform
BE15 infographic transformBE15 infographic transform
BE15 infographic transform
 
Integrc Infographic
Integrc Infographic Integrc Infographic
Integrc Infographic
 
Durapipe CPD Industrial Services Presentation
Durapipe CPD Industrial Services PresentationDurapipe CPD Industrial Services Presentation
Durapipe CPD Industrial Services Presentation
 
GPS : CPD Advert
GPS : CPD AdvertGPS : CPD Advert
GPS : CPD Advert
 
GPS CSS PPT 2016
GPS CSS PPT 2016GPS CSS PPT 2016
GPS CSS PPT 2016
 
GPS : NELLY : internal launch
GPS : NELLY : internal launchGPS : NELLY : internal launch
GPS : NELLY : internal launch
 
Lichfield Garrick 'Visitors Guide' advert
Lichfield Garrick 'Visitors Guide' advertLichfield Garrick 'Visitors Guide' advert
Lichfield Garrick 'Visitors Guide' advert
 
Lichfield Garrick Sleeping Beauty 2016
Lichfield Garrick Sleeping Beauty 2016Lichfield Garrick Sleeping Beauty 2016
Lichfield Garrick Sleeping Beauty 2016
 
Lichfield Garrick Theatre Jack and the Beanstalk Christmas 2015
Lichfield Garrick Theatre Jack and the Beanstalk Christmas 2015Lichfield Garrick Theatre Jack and the Beanstalk Christmas 2015
Lichfield Garrick Theatre Jack and the Beanstalk Christmas 2015
 
Lichfield Garrick : Hired Man
Lichfield Garrick : Hired Man Lichfield Garrick : Hired Man
Lichfield Garrick : Hired Man
 
Creative Learning Brochure 12pp_oct16
Creative Learning Brochure 12pp_oct16Creative Learning Brochure 12pp_oct16
Creative Learning Brochure 12pp_oct16
 

Kürzlich hochgeladen

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Kürzlich hochgeladen (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Symantec Migration infographic

  • 1. DO NOTHING: Systems will still run, partner and user communities will help, but systems will be open to a significant security threat HARDWARE REPLACEMENT: Upgrade out of maintenance physical servers CUSTOM SUPPORT: For-fee custom support can be costly and time-consuming VIRTUALIZATION/CLOUD: To achieve cost, complexity and management benefits PROTECTION: Use a 3rd party product to secure servers and data, removing the time-critical need to upgrade THE REALISATION NOW IS THAT AFTER 14 JULY 2015 MISSION AND BUSINESS CRITICAL APPLICATIONS ARE AT RISK Migration carries significant challenge on resources and information protection Expensive custom contracts to maintain unsupported platforms and applications NO Technical support NO Incident support NO Security patches NO Product hot fixes MICROSOFT WINDOWS 2003 SERVER MIGRATION ARE YOU READY? ?? ? THE QUESTION IS, HOW WILL YOU MANAGE YOUR COSTS AND MITIGATE THE RISKS? WHAT DOES THIS MEAN FOR MY BUSINESS JULY 2015 14 = STANDARDISATION THE SUPPORT OF BYOD MOBILITY PRIVATE, HYBRID AND PUBLIC CLOUD BUSINESSES ARE DRIVING FOR... RISK COST Regulated industries may be fined or risk being cut off from key trading partners who want to protect their own compliance status Increased vulnerability to cyber attacks and data breach SECURITY COMPLIANCE ?? ?WHAT SHOULD I DO WITH THE CHANGE IN THE TECHNOLOGY LANDSCAPE THE PRESSURES ON IT HAVE BECOME MORE DEMANDING! MICROSOFT’S EXTENDED SUPPORT OF WINDOWS 2003 SERVER ENDS IN JULY 2015. Posing potential problems for some 10M instances of Windows that exist and the business critical systems that depend on it. Although this doesn’t mean everything will stop working, it does mean that systems are open to potential security risks and not conforming to regulatory compliance demands. JULY 2015 14 2015 WHAT ARE MY OPTIONS? PROTECT AND SECURE INCREASE APPLICATION AVAILABILITY MITIGATE TRANSFORMATIONAL RISK DATA IS #1 PRIORITY GUARANTEE VISIBILITY ACROSS NEW AND EXISTING PLATFORMS LOWER THE SUPPORT AND OPERATIONAL COSTS SYMANTEC PROTECT MORE SYSTEMS IN THE SECURITY SOFTWARE SPACE THAN ANY OTHER COMPANY SYMANTEC BACK-UP OVER 50% OF THE WORLDS INFORMATION SYMANTEC PROTECT 200 MILLION END POINT DEVICES THE SYMANTEC GLOBAL INTELLIGENCE NETWORK PROVIDES THE VERY BEST IN SECURITY UPDATES, INSIGHT AND GUIDANCE CRITICAL SYSTEMS ARE SO IMPORTANT THAT YOU CANNOT AFFORD DOWNTIME OR PERFORMANCE ISSUES. The clock is ticking to migrate from Windows Server 2003 but it is still a key platform that underpins your many business critical services. DEVELOP A STRATEGY for mitigating the risk of vulnerability, while establishing a plan for migration DISCOVER: Understand what applications and workloads are being supported ASSESS: Create inventory categorised by type, importance and complexity TARGET: Choose an outcome for each application MAP: Match the inventory against business risk/criticality 4.6 BILLION CONNECTED THINGS GIN WHY SYMANTEC? www.symantec.co.ukCopyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 01/15. FIND OUT MORE Symantec can offer a unique alternative that will extend the life of your Windows 2003 systems that is cost effective and increases your security profile. PLATFORM LAUNCH First camera phone iTunes Xbox Live/online gaming 2003 Google Apps 20102006 Amazon web services A 2004 Facebook Google Glass 20132007 iPhone iPad 2009 SINCE THE LAUNCH OF WINDOWS 2003 TECHNOLOGY HAS ADVANCED REGISTER for the webinar to find out how, visit know.symantec.com/WindowsServer2003