Data Sheet

Data Sheet: Endpoint Management
Symantec Ghost™ Solution Suite
Confidence in a connected world.
Page 2 of 4
Features
Industry leading hardware independent imaging
DeployAnywhere™ technology inserts hardware drivers
at the appropriate time during imaging to support a
large variety of hardware configurations
Creates file-based images of any FAT, NTFS, EXT2, and
EXT3 file systems
Supports logical volumes on Windows and Linux
Facilitates easy image exploration and extraction of
individual files in file-based images, while also allowing
the addition, deletion, or modification of any file within
any FAT-based image
Enables sector-based imaging with SmartSector
Technology for creating an exact and efficient image of a
system that can be used for rapid OS deployment or
system recovery
Hot imaging creates base images from a live system to
ensure that the most up-to-date image is deployed every
time
Image compression saves valuable disk and network
space, while significantly reducing the time required to
create and restore images over a network
Support for additional image files, such as VMware
VMDK, Symantec Backup Exec System Recovery V2I, and
PowerQuest PQI images
Windows and PC migration
Symantec™ AutoInstall reduces the time and cost of
managing software distribution across a network by
providing an efficient means of installing application
packages and updates
Custom templates expedite the overall migration process
Access rights and transport encryption prevent
unauthorized access, providing secure transfer and
storage of user data
Web-based self-service tool for user migrations
simplifies implementation, maintenance, and user-based
operations
Client staging area minimizes network storage and
bandwidth issues
Systems management
Hardware and software inventory capabilities provide
administrators with client machine details that allow
them to more effectively manage their image and
software deployment, including the ability to design
provisioning tasks based on specific client attributes
Client staging area preserves contents during a cloning
or restore to ensure an original state “onboard” recovery
solution for every PC, thereby helping to minimize
disruption of user productivity
Multicast file transfers allow administrators to send and
execute critical security-related “hot fixes” to multiple
recipients simultaneously