Symantec Ghost Solution Suite 1.0 10303565-IN Ficha De Dados

Códigos do produto
10303565-IN
Página de 4
Data Sheet: Systems Administration
Symantec Ghost™ Solution Suite
Powerful, versatile, and efficient PC and lifecycle management
Page 1 of 4 
Overview
The industry’s most widely used enterprise imaging and
deployment solution with ease-of-use for managing the
entire PC lifecycle, including OS deployment with both 
file-based and sector-based imaging, software distribution,
easy migration of user settings and profiles, and secure 
PC retirement.
Benefits
Reduces deployment costs, complexity, and time 
• Helps ensure that workstations remain consistent and
compliant with corporate standards from acquisition 
to disposal
• Administrators can easily create standard images of
client workstations utilizing either file- or sector-based
imaging technology
• Simultaneously deploy hundreds of Windows® or Linux®
operating systems across the enterprise in a matter 
of minutes
• Provides image multicasting to minimize bandwidth
usage and speed the deployment of new images
• Administrators can configure and schedule tasks from a
centralized console, including rolling out software,
deploying patches, upgrading operating systems, 
executing commands remotely, and targeting computers
based on specific hardware and software attributes 
• Simplifies image management and reduces the number
of image files needed to be maintained by allowing
organizations to leverage a single image file for multiple
hardware platforms
• Enables the use of the Microsoft® Windows Pre-installa-
tion Environment (Windows PE) to accelerate and 
automate Windows deployments to reduce the cost,
complexity, and time required to deploy the Windows XP
operating system
Decreases downtime, risk and cost of user migrations 
• Allows administrators to perform fully managed 
client-driven migrations, simplifying implementation,
maintenance, and user-based operations, as well 
as reducing the cost and risk associated with 
client migration
• Preserves user data and personality settings, minimizing
post-migration support costs, disruptions, and end-user
downtime
• Administrators can set policies that restrict users from
adding unauthorized files to the migration package
Facilitates secure PC retirement
• Reduces the risk and liability associated with PC 
retirement and data disposal by implementing best 
practice strategies for PC retirement and data disposal
• Ensures that confidential data cannot be recovered from
recycled, retired or leased PCs
• Meets the highest industry standards for secure 
data disposal, including Department of Defense 
(DoD) standards