Data Sheet
Symantec Ghost™ Solution Suite
Powerful, versatile, and efficient PC and lifecycle management
Data Sheet: Endpoint Management
Confidence in a connected world.
Page 1 of 4
Overview
The Symantec Ghost™ Solution Suite is the industry’s most
widely used enterprise imaging and deployment solution
with ease-of-use for managing the entire PC lifecycle,
including OS deployment with hardware-independent
imaging, software distribution, easy migration of user
settings and profiles, and secure PC retirement.
Benefits
Reduces deployment costs, complexity, and time
• Helps ensure that workstations remain consistent and
compliant with corporate standards from acquisition to
disposal
• Simplifies image management and reduces the number
of images needed for deployment by using
DeployAnywhere™ technology to deploy hardware-
independent images
• Fast and reliable deployment and migration of user data
and settings to the latest OS, including Windows 7
• Enables administrators to keep images from becoming
“stale” by using hot imaging on a continually updated
base machine, and flexible image management options
• Simultaneously deploys hundreds of Windows® or Linux®
client systems across the enterprise in minutes
• Allows administrators to configure and schedule tasks
from a centralized console, including rolling out
software, upgrading operating systems, executing
commands remotely, and targeting computers based on
specific hardware and software attributes
• Provides image multicasting to minimize bandwidth
usage and speed the deployment of new images
• Enables the use of the Microsoft® Windows
Preinstallation Environment, and Linux to accelerate and
automate Windows and Linux deployments
• Provides administrators with flexible image options by
the ability to deploy VMware (VMDK), Symantec Backup
Exec™ System Recovery (V2I), and PowerQuest (PQI)
hard disk images
Decreases downtime, risk, and cost of user migrations
• Allows administrators to perform fully managed
client-driven migrations, simplifying implementation,
maintenance, and user-based operations, and reduces
the cost and risk associated with client migration
• Preserves user data and personality settings, minimizing
post-migration support costs, disruptions, and end-user
downtime
• Allows administrators to set policies that restrict users
from adding unauthorized files to the migration package
Facilitates secure PC retirement
• Reduces the risk and liability associated with PC
retirement and data disposal by implementing best
practice strategies for PC retirement and data disposal
• Ensures that confidential data cannot be recovered from
recycled, retired, or leased PCs
• Meets the highest industry standards for secure data
disposal, including Department of Defense (DoD)
standards




