Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Cyber Security Services
Showing posts in English
uuallan | 16 Jun 2011 | 0 comments

The current mantra from most business experts seems to be that your organization has to have a social media strategy.  They say you must have a regularly maintained Facebook Page, you must Twitter regularly and you should be using as many social media tools to reach your audience as possible.  If you Google the phrase “social media strategy” you’ll return more than 8.5 million hits.  What no one talks about is the necessary steps to ensure the security of your social media presence.

It is not enough to have a social media strategy, you must also have a social media security strategy, and that security must be interwoven into every aspect of your organization’s social media presence. 

The fact is, the more social media exposure your organization has the more your security risk increases.  Social media sites are a prime research vehicle and target for today’s attackers, and the more your organization...

uuallan | 23 May 2011 | 0 comments

By Allan Liska, Senior Solutions Engineer for Symantec Managed Security Services

Just about anyone who has a Facebook account has seen them: Innocuous-looking, yet dangerous links posted to the Wall of one of your friends inviting you to watch a video of a famous movie star caught cheating, the Osama bin Laden raid or any number of other topics.  On a bad day, you may see the same link posted on the Wall of several of your friends, each friend inadvertently passing on the infection to those gullible enough to click on the link.  This is what John Harrison, Manager of Symantec’s Security Technology and Response (STAR) team calls Likejacking, and it is on the rise.  According to the 2010 Internet Security Threat Report (ISTR), released in April 2011, web attacks were up 93% and social media sites are a big focus of those attacks.   The use of shortened URLs accentuates the effectiveness of these attacks; in fact, during a three...

SDP | 19 Apr 2011 | 0 comments

Note: This is the first in a series of blog postings by Steve Parrott, Director of Product Management for Symantec MSS regarding the on-going evolution of the security marketplace and customer threat environment.


One of the things that I am always asked by customers of Symantec MSS is how the MSS environment will evolve over the next three to five years. While most CISOs understand the threat environment of today, what keeps them up at night is trying to understand the threat environment of tomorrow and all of the implications and risks. And customers are desperate to understand. They are literally being attacked from all sides, constantly, and with tremendous potential for ever greater losses of information, money or reputation. With risks being as high as ever, the question is often how can Symantec MSS help them understand the...

Tim G. | 29 Mar 2011 | 0 comments

In part one of this blog we identified that intelligence can be of interest to organizational groups beyond security; now let’s look at the benefits of sharing intelligence. 

In contrast to traditional ‘security-as-an-island’ approaches, if we move the conversation from “block this, patch that” to something more meaningful to the business, and provide those other functional groups with insight into the state of the threat landscape, we can become more involved with the risk planning for our organizations and simultaneously enhance our “value.”

Now, let’s take this up a level.  Assume,  for instance, you are gathering security information about vulnerabilities and threats to your systems daily and want to provide an abstract to the various departmental leaders about what actions you have initiated, and why they are important.  A simple regular summary of the threats and vulnerabilities that affected...

Tim G. | 21 Mar 2011 | 0 comments

As security practitioners, one of the common misconceptions most of us have is that the alerts we receive about application or system vulnerabilities are really only of interest and use to us, and maybe to the extended IT team. 

Now I’m not advocating providing your CEO with detailed alerts about every application vulnerability out there, but there are specific use cases that can inform the directives of other internal teams, not to mention our ability to provide a high level summary of what the threat landscape looked like in the prior period to these business unit leaders who are likely involved in risk management tradeoffs.

For example, if you receive alerts about possible phishing sites exploiting your brand or campaigns against your customer base, as a security practitioner the common viewpoint has been “well it’s the end-user’s system and choice.”  But give that same information to your marketing, legal, and customer...

dstuart | 09 Mar 2011 | 0 comments

by David Stuart, Manager of Symantec MSS Product Marketing

Symantec’s Managed Security Services (MSS)EMEA Security Operations Centre (SOC) was recently highlighted in a 10-minute BBC Newsnight special on the subject of cyberwar.  As part of the feature, specifics are shared regarding the need for governments worldwide to call for ‘rules of engagement’ for cyber conflict and the new dimensions the Internet creates for international politics.

In preparation for this special, a Newsnight producer had an initial conversation with Symantec’s Liam O’Murchu on his analysis of Stuxnet. Following that conversation, three...

dstuart | 28 Feb 2011 | 0 comments

by David Stuart, Manager of Symantec MSS Product Marketing

Another RSA conference has come and gone so it feels appropriate to take a moment and summarize significant experiences from the event.   Overall, the conference activity level was busy as ever and seemed to match or surpass its former heydays – hopefully a sign of our strengthening economy.  Highlights of the week for Symantec and MSS were;

  • Symantec Managed Security Services (MSS) had its own demo/display area and over 100 customers/prospects stopped by to learn more during the three expo days.  If you would like to download MSS or other Symantec literature, visit the Symantec RSA Collateral Resource Center
  • Symantec launched the beta of Symantec Endpoint Protection 12, which will provide the only reputation-based security solution that is context-aware. With SEP 12,...
GGeyer | 14 Feb 2011

Welcome to the new Managed Security Services Blog!
by Grant Geyer, VP Global Managed Services

Welcome to the Symantec Managed Security Services (MSS) blog!  As practitioners are fully aware, while more and more of our critical assets are moving online, the threat landscape is bad and getting worse as threats are stealthy and hard-to-detect, motivated by financial gain.  Now more than ever, having  real-time awareness of threats, vulnerabilities, and an understanding of the impact of security incidents are key to an effective risk mitigation program.  Through our MSS blog, we will provide insight into how organizations such as yours can improve security effectiveness and enhance efficiency of security operations via a managed services model.  Contributing Symantec security experts will share their thoughts and experiences on how best to protect IT assets, people and information in the rapidly evolving threat environment. ...

dstuart | 14 Feb 2011 | 0 comments

Symantec MSS at RSA® Conference 2011
by David Stuart, Manager of Symantec MSS Product Marketing

We’re pleased this year to be participating in the Symantec booth (#1416) on the RSA show floor at the San Francisco Moscone Center,  Feb 14-17.   Symantec Managed Security Services (MSS) has its own demo kiosk so look for our sign. 

 Please stop by and talk to Symantec MSS security engineers and other experts and learn about the following;

  • How our ‘edge-to-endpoint’ managed service approach offers superior protection without breaking your security budget
  • See a demo of Symantec DeepSight™ early warning system for vulnerability and global threat intelligence
  • Experience how today’s stealthy exploits enter and infect your organization and what protections you should have in place to mitigate

In addition, Symantec MSS has been selected as a SC...

symc_seanm | 13 Feb 2011

In spite of mounting evidence to the contrary, many of the enterprise security leaders with whom I speak seem to still be living in a world where the greatest threat to their enterprise was the “hacker” trying to breach their firewall.  When the MSSP industry was born in the late 90’s, this may have been the case.  The entire industry rose in part as a result of the development of intrusion detection (IDS) technologies.  The earliest IDS sensors were signature-based and focused on, as the name implies, detecting intrusions to the network.  Because many enterprises were ill-prepared to deal with the volume of alerts and high rate of false positives, Managed Security Service providers emerged to provide a means to validate and evaluate the alerts generated by these sensors.  Over time, the IDS industry matured to incorporate technologies such as protocol anomaly...