Data Sheet

Symantec Ghost™ Solution Suite
Powerful, versatile, and efficient PC and lifecycle management
Data Sheet: Endpoint Management
Confidence in a connected world.
Page 1 of 4
Overview
The Symantec Ghost™ Solution Suite is the industry’s most
widely used enterprise imaging and deployment solution
with ease-of-use for managing the entire PC lifecycle,
including OS deployment with hardware-independent
imaging, software distribution, easy migration of user
settings and profiles, and secure PC retirement.
Benefits
Reduces deployment costs, complexity, and time
Helps ensure that workstations remain consistent and
compliant with corporate standards from acquisition to
disposal
Simplifies image management and reduces the number
of images needed for deployment by using
DeployAnywhere™ technology to deploy hardware-
independent images
Fast and reliable deployment and migration of user data
and settings to the latest OS, including Windows 7
Enables administrators to keep images from becoming
“stale” by using hot imaging on a continually updated
base machine, and flexible image management options
Simultaneously deploys hundreds of Windows® or Linux®
client systems across the enterprise in minutes
Allows administrators to configure and schedule tasks
from a centralized console, including rolling out
software, upgrading operating systems, executing
commands remotely, and targeting computers based on
specific hardware and software attributes
Provides image multicasting to minimize bandwidth
usage and speed the deployment of new images
Enables the use of the Microsoft® Windows
Preinstallation Environment, and Linux to accelerate and
automate Windows and Linux deployments
Provides administrators with flexible image options by
the ability to deploy VMware (VMDK), Symantec Backup
Exec™ System Recovery (V2I), and PowerQuest (PQI)
hard disk images
Decreases downtime, risk, and cost of user migrations
Allows administrators to perform fully managed
client-driven migrations, simplifying implementation,
maintenance, and user-based operations, and reduces
the cost and risk associated with client migration
Preserves user data and personality settings, minimizing
post-migration support costs, disruptions, and end-user
downtime
Allows administrators to set policies that restrict users
from adding unauthorized files to the migration package
Facilitates secure PC retirement
Reduces the risk and liability associated with PC
retirement and data disposal by implementing best
practice strategies for PC retirement and data disposal
Ensures that confidential data cannot be recovered from
recycled, retired, or leased PCs
Meets the highest industry standards for secure data
disposal, including Department of Defense (DoD)
standards

Summary of content (4 pages)