This week at our Vision Conference in Las Vegas, we’ve had great opportunities to talk to customers and discuss some of the key issues that continue to plague them. A common theme we continue to hear about is how the risk of confidential information continues to grow and how our customers are facing an increasing number of threats to their information from both internal and external sources.
It’s a fact that today’s attacks are proving to be more sophisticated, well-organized and covert in nature than attacks seen in years past. No need to look any further than the recentHydraq attacks. The cybercriminals that are behind these attacks are targeting four key areas of weakness that are putting business environments at risk: poorly enforced IT policies, poorly protected information, poorly managed systems and poorly protected infrastructure.
These new attacks require a new approach to security. Businesses now require a focus on security continuity that allows them to continuously respond to internal and external changes. Moving forward, businesses need to develop a security strategy that is risk-based and policy driven, information-centric, and operationalized across a well managed infrastructure.
To address these customer pain points, Symantec today announced four security suites:
- Develop and Enforce IT Policies– Control Compliance Suite 10.0 will deliver greater visibility into an organization’s IT and compliance risks, to ultimately provide better intelligence at lower costs.
- Protect Information –Data Loss Prevention Suite 10.5 addresses key concerns about preventing data loss through social media and protecting information in private clouds.
- Manage Systems –Altiris IT Management Suite 7.0 offers complete IT management that enhances effectiveness through faster deployments and increased security, reduces costs by closing technology gaps, and improves manageability amidst the increasing information and infrastructure sprawl.
- Protect Infrastructure – Symantec Protection Suites will offer in-depth protection tailored to specific areas of the IT infrastructure and provide businesses with unified information security management across endpoints, servers and gateways.